Publications


2020

N. Fernandes, Y. Kawamoto, and T. Murakami: Locality Sensitive Hashing with Extended Differential Privacy. Submitted to a conference. https://arxiv.org/pdf/2010.09393.pdf

M. S. Alvim, K. Chatzikokolakis, Y. Kawamoto and C. Palamidessi. Information Leakage Games: Exploring Information as a Utility Function. Submitted to a journal.

V. Castiglioni, K. Chatzikokolakis, C. Palamidessi: A logical characterization of differential privacy. Science of Computer Programming 188: 102388 (2020)

M. Romanelli, K. Chatzikokolakis, C. Palamidessi, P. Piantanida: Estimating g-Leakage via Machine Learning. ACM CCS 2020: 697-716

C. Palamidessi, M. Romanelli: Modern Applications of Game-Theoretic Principles (Invited Paper). CONCUR 2020: 4:1-4:9

M. Romanelli, K. Chatzikokolakis, C. Palamidessi: Optimal Obfuscation Mechanisms via Machine Learning. IEEE CSF 2020: 153-168

E. ElSalamouny, C. Palamidessi: Generalized Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection. IEEE EuroS&P 2020: 490-507

Y. Kawamoto: An Epistemic Approach to the Formal Specification of Statistical Machine Learning. Software and Systems Modeling (2020)

S. Hidano, T. Murakami, S. Katsumata, S. Kiyomoto, G. Hanaoka: Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. PETS 2020(3): 264-283 

T. Murakami, K. Takahashi: Toward Evaluating Re-identification Risks in the Local Privacy Model. CoRR abs/2010.08238 (2020)

H. Comon, C. Jacomme, G. Scerri: Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets. ACM CCS 2020

F. Blanqui, J.-P. Jouannaud, M. Okada: Corrigendum to "Inductive-data-type systems" [Theoret. Comput. Sci. 272 (1-2) (2002) 41-68]. Theor. Comput. Sci. 817: 81-82 (2020)

G. Bana, R. Chadha, A. Kumar Eeralla, M. Okada: Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability. ACM Trans. Comput. Log. 21(1): 2:1-2:44 (2020)

T. Ideno, Ma. Morii, K. Takemura, M. Okada: On Effects of Changing Multi-attribute Table Design on Decision Making: An Eye-Tracking Study. Diagrams 2020: 365-381


2019

G. Bana, R.Chadha, A. K. Eeralla, M. Okada: Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability, ACM Transactions on Computational Logic. Volume 21 Issue 1, October 2019

Mário S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith: An axiomatization of information flow measures. Theor. Comput. Sci. 777: 32-54 (2019)

Natasha Fernandes, Lefki Kacem, Catuscia Palamidessi: Utility-Preserving Privacy Mechanisms for Counting Queries. Models, Languages, and Tools for Concurrent and Distributed Programming 2019: 487-495

Konstantinos Chatzikokolakis, Natasha Fernandes, Catuscia Palamidessi: Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy. CSF 2019: 442-457

Ali Kassem, Gergely Ács, Claude Castelluccia, Catuscia Palamidessi: Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets. IEEE Symposium on Security and Privacy Workshops 2019: 72-79

Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi: F-BLEAU: Fast Black-Box Leakage Estimation. IEEE Symposium on Security and Privacy 2019: 835-852

Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez: Hybrid statistical estimation of mutual information and its application to information flow. Formal Asp. Comput. 31(2): 165-206 (2019)

Timos Antonopoulos, Tachio Terauchi: Games for Security Under Adaptive Adversaries. CSF 2019: 216-229

Tachio Terauchi, Timos Antonopoulos: A Formal Analysis of Timing Channel Security via Bucketing. POST 2019: 29-50

Yusuke Kawamoto, Takao Murakami: Local Obfuscation Mechanisms for Hiding Probability Distributions. ESORICS (1) 2019: 128-148

Yusuke Kawamoto: Towards Logical Specification of Statistical Machine Learning. SEFM 2019: 293-311

Takao Murakami, Yusuke Kawamoto: Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation. USENIX Security Symposium 2019: 1877-1894

Yusuke Kawamoto, Takao Murakami: Local Distribution Obfuscation via Probability Coupling. Allerton 2019, to appear.

Yusuke Kawamoto: Statistical Epistemic Logic. CoRR abs/1907.05995 (2019)

M. Alvim, K. Chatzikokolakis, Y. Kawamoto, C. Palamidessi: A Game-Theoretic Approach to Information-Flow Control via Protocol Composition. Entropy 20(5), MDPI, pp. 382, 2018.

Mario S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi. Leakage and Protocol Composition in a Game-Theoretic Perspective. In Proc. of the 7th International Conference on Principles of Security and Trust (POST 2018), Lecture Notes in Computer Science, Vol. 10804, pp. 134-159, April 2018.

Mitsuhiro Okada, Yuta Takahashi: On Quasi Ordinal Diagram Systems. TERMGRAPH@FSCD 2018: 38-49