R. Kerkouche, G. Acs, M. Fritz
Client-specific Property Inference against Secure Aggregation in Federated Learning
ACM Workshop on Privacy in the Electronic Society (WPES), 2023
arXiv:2303.03908
M. Oldenhof et al.
Industry-Scale Orchestrated Federated Learning for Drug Discovery
35th Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-23), 2023
arXiv:2210.08871
D. Papp, G. Acs, R. Nagy, L. Buttyán
SIMBIoTA-ML: Light-weight, Machine Learning-based Malware Detection for Embedded IoT Devices
7th International Conference on Internet of Things, Big Data, and Security (IoTBDS), 2022
Sz. Lestyán, G. Acs, G. Biczók
In Search of Lost Utility: Private Location Data
The 22nd Privacy Enhancing Technologies Symposium (PETS), 2022
arXiv:2008.01665
R. Kerkouche, G. Acs, C. Castelluccia, P. Geneves
Constrained Differentially Private Federated Learning for Low-bandwidth Devices
Conference on Uncertainty in Artificial Intellgience (UAI), 2021
arXiv:2011.05578
R. Kerkouche, G. Acs, C. Castelluccia, P. Geneves
Privacy-Preserving and Bandwidth-Efficient Federated Learning: An Application to In-Hospital Mortality Prediction
ACM Conference on Health, Inference, and Learning (CHIL), 2021
hal-03160473
R. Kerkouche, G. Acs, C. Castelluccia, P. Geneves
Compression Boosts Differentially Private Federated Learning
IEEE European Symposium on Security and Privacy (Euro S&P), 2021
arXiv:2011.05578
M. Remeli, Sz. Lestyán, G. Acs, G. Biczók
Automatic Driver Identification from In-Vehicle Network Log
IEEE Intelligent Transportation Systems Conference (ITSC), 2019
PDF
A. Kassem, G. Ács, C. Castelluccia, C. Palamidessi
Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets
International Workshop on Privacy Engineering (IWPE), 2019
PDF
Sz. Lestyán, G. Ács ,G. Biczók, Zs. Szalay
Extracting vehicle sensor signals from CAN logs for driver re-identification
5th International Conference on Information Security and Privacy (ICISSP), 2019
arXiv:1902.08956
G. Ács, L. Melis, C. Castelluccia, E. De Cristofaro
Differentially Private Mixture of Generative Neural Networks
IEEE International Conference on Data Mining (ICDM), 2017.
arXiv:1709.04514
G. Gy. Gulyás, G. Ács, C. Castelluccia
Near-Optimal Fingerprinting with Constraints
PET Symposium, 2016.
arXiv:1605.08664
G. Ács, J. P. Achara, C. Castelluccia
Probabilistic km-anonymity (Efficient Anonymization of Large Set-Valued Datasets)
IEEE International Conference on Big Data (Big Data), 2015.
PDF
J. P. Achara, G. Ács, C. Castelluccia
On the Unicity of Smartphone Applications
ACM Workshop on Privacy in the Electronic Society (WPES), 2015.
arXiv:1507.07851
G. Ács, C. Castelluccia
A Case Study: Privacy Preserving Release of Spatio-temporal Density in Paris
The 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), 2014.
PDF
M.-D. Tran, G. Ács, C. Castelluccia
Retargeting Without Tracking
Technical Report, INRIA, 2014.
arXiv:1404.4533
G. Ács, M. Conti, P. Gasti, C. Ghali, G. Tsudik
Cache Privacy in Named-Data Networking
The 33rd International Conference on Distributed Computing Systems
(ICDCS), 2013.
PDF
G. Ács, R. Chen, C. Castelluccia
Differentially Private Histogram Publishing through Lossy Compression
IEEE International Conference on Data Mining (ICDM), 2012.
PDF, code (in Python)
© IEEE
R. Chen, G. Ács, C. Castelluccia
Differentially Private Sequential Data Publication via Variable-Length N-Grams
In 19th ACM Conference on Computer and Communications Security (CCS), 2012.
PDF, code (in Python)
A. Chaabane, G. Ács, M. Ali Kaafar
You Are What You Like! Information Leakage
Through Users' Interests
In 19th Annual Network & Distributed System Security Symposium (NDSS), 2012.
PDF
G. Ács, C. Castelluccia, W. Lecat
Protecting against Physical Resource Monitoring
The 10th ACM Workshop on Privacy in the Electronic Society (WPES), 2011.
PDF
© ACM
G. Ács, C. Castelluccia
I have a DREAM! (DiffeRentially privatE smArt Metering)
The 13th Information Hiding Conference (IH), 2011.
PDF
Technical Report: arXiv:1201.2531
G. Ács, L. Buttyán, L. Dóra
Misbehaving Router Detection in Link-state Routing for Wireless Mesh Networks
The 2nd IEEE WoWMoM Workshop on Hot Topics in Mesh Networking (HotMESH), 2010.
PDF
© IEEE
G. Ács, L. Buttyán
Design Principles of Routing Protocols in Wireless Sensor Networks
Technical Report, CrySyS Lab, Budapest University of Technology and Economics,
February 2010.
PDF
G. Ács, L. Buttyán, and I. Vajda,
The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks,
The 3rd IEEE Workshop on Wireless and Sensor Networks Security (WSNS 2007), Pisa, Italy, October 2007.
PDF
© IEEE
G. Ács, L. Buttyán, and I. Vajda,
Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks,
The Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), Alexandria, VA, October 2006.
PDF
© ACM
G. Ács, L. Buttyán, and I. Vajda,
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks,
Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005)
Visegrád, Hungary, July 13-14, 2005.
PDF
© Springer-Verlag
Journal papers:
-
W. Heyndrickx et al.
MELLODDY: Cross-pharma Federated Learning at Unprecedented Scale Unlocks Benefits in QSAR without Compromising Proprietary Information
Journal of Chemical Information and Modeling (JCIM), 2023
https://pubs.acs.org/doi/10.1021/acs.jcim.3c00799
-
A. Gazdag, Sz. Lestyán, M. Remeli, G. Ács, T. Holczer, G. Biczók
Privacy pitfalls of releasing in-vehicle network data
Vehicular Communications, 2022
https://doi.org/10.1016/j.vehcom.2022.100565
-
N. Hajdu et al.
Contextual factors predicting compliance behavior during the COVID-19 pandemic: A machine learning analysis on survey data from 16 countries
PLOS ONE 17(11), 2022
https://doi.org/10.1371/journal.pone.0276970
-
B. Pejo, M. Remeli, A. Arany, M. Galtier, G. Acs
Collaborative Drug Discovery: Inference-level Data Protection Perspective
Transactions on Data Privacy, 2022.
arXiv:2205.06506
-
G. Ács, L. Melis, C. Castelluccia, E. De Cristofaro
Differentially Private Mixture of Generative Neural Networks
IEEE Transactions on Knowledge and Data Engineering, 2018.
-
G. Ács, M. Conti, P. Gasti, C. Ghali, G. Tsudik, C. A. Wood
Privacy-Aware Caching in Information-Centric Networking
IEEE Transactions on Dependable Computing, Vol. 16, No. 2, 2017.
-
G. Ács, L. Buttyán, and I. Vajda,
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks,
IEEE Transactions on Mobile Computing, Vol. 5, No. 11, November 2006.
PDF
© IEEE
-
G. Ács, L. Buttyán,
A Taxonomy of Routing Protocols for Wireless Sensor Networks
Hiradástechnika, January 2007.
PDF
(Pollák-Virág Award of the Hungarian Telecommunication Scientific Society)
-
G. Ács, L. Buttyán,
Designing a Secure Label-switching Routing Protocol for Wireless Sensor
Networks
Periodica Polytechnica, Budapest University of Technology and Economics, December 2008.
PDF
Book chapters:
-
G. Acs, G. Biczok, C. Castelluccia
Privacy-Preserving Release of Spatio-Temporal Density,
Book chapter in Handbook of Mobile Data Privacy, ISBN: 978-3-319-98161-1, Springer, 2018.
Editors: A. Gkoulalas-Divanis, C. Bettini
-
G. Ács, L. Buttyán,
Secure Routing in Wireless Sensor Networks,
Book chapter in Wireless Sensor Network Security, ISBN: 978-1-58603-813-7, IOS Press, Cryptology and Information Security Series, 2007.
Editors: J. Lopez and J. Zhou
Theses:
-
G. Ács,
Secure Routing in Multi-hop Wireless Networks,
PhD Thesis, CrySyS Lab, Budapest University of Technology and Economics, 2009.
PDF
-
G. Ács,
Secure Routing in Ad hoc Networks,
Master's Thesis, CrySyS Lab, Budapest University of Technology and Economics, 2005. (in Hungarian)
PDF
Teaching:
Blog:
Curriculum Vitae:
- Language skills: English (written and spoken fluently), French (elementary), German (elementary), Hungarian (native)
Miscellaneous:
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |