Select Publications

Conference Papers

D'Silva N; Shahi T; Dokk Husveg OT; Sanjeeve A; Buchholz E; Kanhere SS, 2024, 'Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement', in 2024 17th International Conference on Security of Information and Networks Sin 2024, http://dx.doi.org/10.1109/SIN63213.2024.10871881

Merhi J; Buchholz E; Kanhere SS, 2024, 'Synthetic Trajectory Generation Through Convolutional Neural Networks', in 2024 21st Annual International Conference on Privacy Security and Trust Pst 2024, http://dx.doi.org/10.1109/PST62714.2024.10788061

Buchholz E; Abuadbba A; Wang S; Nepal S; Kanhere SS, 2022, 'Reconstruction Attack on Differential Private Trajectory Protection Mechanisms', in ACM International Conference Proceeding Series, pp. 279 - 292, http://dx.doi.org/10.1145/3564625.3564628

Pennekamp J; Buchholz E; Lockner Y; Dahlmanns M; Xi T; Fey M; Brecher C; Hopmann C; Wehrle K, 2020, 'Privacy-Preserving Production Process Parameter Exchange', in ACM International Conference Proceeding Series, pp. 510 - 525, http://dx.doi.org/10.1145/3427228.3427248

Matzutt R; Pennekamp J; Buchholz E; Wehrle K, 2020, 'Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services', in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security Asia Ccs 2020, pp. 531 - 542, http://dx.doi.org/10.1145/3320269.3384729

Pennekamp J; Buchholz E; Dahlmanns M; Kunze I; Braun S; Wagner E; Brockmann M; Wehrle K; Henze M, 2020, 'Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use', in Proceedings 2020 Learning from Authoritative Security Experiment Results Workshop, Applied Computer Security Associates, presented at Learning from Authoritative Security Experiment Results, http://dx.doi.org/10.14722/laser-acsac.2020.23088


Back to profile page