ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1705.05030
  4. Cited By
Information Leakage Games
v1v2 (latest)

Information Leakage Games

14 May 2017
Mário S. Alvim
K. Chatzikokolakis
Yusuke Kawamoto
C. Palamidessi
    AAML
ArXiv (abs)PDFHTML

Papers citing "Information Leakage Games"

12 / 12 papers shown
Beware of Greeks bearing entanglement? Quantum covert channels,
  information flow and non-local games
Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local gamesIEEE Computer Security Foundations Symposium (CSF), 2022
David Mestel
60
0
0
04 Feb 2022
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural
  Network: A Survey
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey
Xiaoyu Zhang
Chao Chen
Yi Xie
Xiaofeng Chen
Jun Zhang
Yang Xiang
FedML
206
9
0
13 May 2021
TransMIA: Membership Inference Attacks Using Transfer Shadow Training
TransMIA: Membership Inference Attacks Using Transfer Shadow TrainingIEEE International Joint Conference on Neural Network (IJCNN), 2020
Seira Hidano
Takao Murakami
Yusuke Kawamoto
MIACV
334
16
0
30 Nov 2020
Against Membership Inference Attack: Pruning is All You Need
Against Membership Inference Attack: Pruning is All You NeedInternational Joint Conference on Artificial Intelligence (IJCAI), 2020
Yijue Wang
Chenghong Wang
Zigeng Wang
Shangli Zhou
Hang Liu
J. Bi
Caiwen Ding
Sanguthevar Rajasekaran
MIACV
354
57
0
28 Aug 2020
Hybrid Statistical Estimation of Mutual Information and its Application
  to Information Flow
Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow
Fabrizio Biondi
Yusuke Kawamoto
Axel Legay
Louis-Marie Traonouez
94
10
0
08 Sep 2018
Machine Learning with Membership Privacy using Adversarial
  Regularization
Machine Learning with Membership Privacy using Adversarial RegularizationConference on Computer and Communications Security (CCS), 2018
Milad Nasr
Reza Shokri
Amir Houmansadr
FedMLMIACV
371
543
0
16 Jul 2018
A Game-Theoretic Taxonomy and Survey of Defensive Deception for
  Cybersecurity and Privacy
A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
J. Pawlick
Edward Colbert
Quanyan Zhu
AAML
359
183
0
14 Dec 2017
Quantitative information flow under generic leakage functions and
  adaptive adversaries
Quantitative information flow under generic leakage functions and adaptive adversaries
Michele Boreale
F. Pampaloni
127
28
0
21 Jul 2015
Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical
  Report)
Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report)
M. Khouzani
Piotr (Peter) Mardziel
C. Cid
Mudhakar Srivatsa
181
10
0
09 May 2015
Security Games with Information Leakage: Modeling and Computation
Security Games with Information Leakage: Modeling and Computation
Haifeng Xu
A. Jiang
Arunesh Sinha
Zinovi Rabinovich
S. Dughmi
Milind Tambe
208
19
0
23 Apr 2015
Projection onto the probability simplex: An efficient algorithm with a
  simple proof, and an application
Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application
Weiran Wang
M. A. Carreira-Perpiñán
333
314
0
06 Sep 2013
Quantitative Information Flow as Safety and Liveness Hyperproperties
Quantitative Information Flow as Safety and Liveness HyperpropertiesTheoretical Computer Science (TCS), 2012
Hirotoshi Yasuoka
Tachio Terauchi
168
32
0
04 Jul 2012
1
Page 1 of 1