Publications

(2023). Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow. 36th IEEE Computer Security Foundations Symposium, CSF 2023, Dubrovnik, Croatia, July 10-14, 2023.

Cite DOI URL

(2023). Analyzing the Shuffle Model through the Lens of Quantitative Information Flow. CoRR.

Cite DOI URL

(2023). A Quantitative Information Flow Analysis of the Topics API. CoRR.

Cite DOI URL

(2023). A Quantitative Information Flow Analysis of the Topics API. Proceedings of the 22nd Workshop on Privacy in the Electronic Society, WPES 2023, Copenhagen, Denmark, 26 November 2023.

Cite DOI URL

(2023). A Novel Analysis of Utility in Privacy Pipelines, Using Kronecker Products and Quantitative Information Flow. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023.

Cite DOI URL

(2023). A novel analysis of utility in privacy pipelines, using Kronecker products and quantitative information flow. CoRR.

Cite DOI URL

(2023). A Formal Model for Polarization under Confirmation Bias in Social Networks. Log. Methods Comput. Sci..

Cite DOI URL

(2022). Information Leakage Games: Exploring Information as a Utility Function. ACM Trans. Priv. Secur..

Cite DOI URL

(2022). How to build high quality L2R training data: Unsupervised compression-based selective sampling for learning to rank. Inf. Sci..

Cite DOI URL

(2022). Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata. Proc. Priv. Enhancing Technol..

Cite DOI URL

(2022). Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata. CoRR.

Cite DOI URL

(2022). A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study. Proc. Priv. Enhancing Technol..

Cite DOI URL

(2022). A novel reconstruction attack on foreign-trade official statistics, with a Brazilian case study. CoRR.

Cite DOI URL

(2021). The Impact of Stationarity, Regularity, and Context on the Predictability of Individual Human Mobility. ACM Trans. Spatial Algorithms Syst..

Cite DOI URL

(2021). A Multi-Agent Model for Polarization under Confirmation Bias in Social Networks. CoRR.

Cite URL

(2021). A Multi-agent Model for Polarization Under Confirmation Bias in Social Networks. Formal Techniques for Distributed Objects, Components, and Systems - 41st IFIP WG 6.1 International Conference, FORTE 2021, Held as Part of the 16th International Federated Conference on Distributed Computing Techniques, DisCoTec 2021, Valletta, Malta, June 14-18, 2021, Proceedings.

Cite DOI URL

(2021). A Formal Model for Polarization under Confirmation Bias in Social Networks. CoRR.

Cite URL

(2020). The Science of Quantitative Information Flow. Springer.

Cite DOI URL

(2020). Polarization and Belief Convergence of Agents in Strongly-Connected Influence Graphs. CoRR.

Cite URL

(2020). On Privacy and Accuracy in Data Releases (Invited Paper). 31st International Conference on Concurrency Theory, CONCUR 2020, September 1-4, 2020, Vienna, Austria (Virtual Conference).

Cite DOI URL

(2020). Information Leakage Games: Exploring Information as a Utility Function. CoRR.

Cite URL

(2020). Exploiting semantic relationships for unsupervised expansion of sentiment lexicons. Inf. Syst..

Cite DOI URL

(2020). Catuscia Palamidessi: a journey from logic and concurrency to security and privacy. ACM SIGLOG News.

Cite DOI URL

(2020). BrazilDAM: A Benchmark dataset for Tailings Dam Detection. CoRR.

Cite URL

(2019). Toward a Formal Model for Group Polarization in Social Networks. The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy - Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday.

Cite DOI URL

(2019). Deciphering Predictability Limits in Human Mobility. Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, SIGSPATIAL 2019, Chicago, IL, USA, November 5-8, 2019.

Cite DOI URL

(2019). An axiomatization of information flow measures. Theor. Comput. Sci..

Cite DOI URL

(2019). A Probabilistic Algorithm to Predict Missing Facts from Knowledge Graphs. Database and Expert Systems Applications - 30th International Conference, DEXA 2019, Linz, Austria, August 26-29, 2019, Proceedings, Part I.

Cite DOI URL

(2018). PLAS 2018 - ACM SIGSAC Workshop on Programming Languages and Analysis for Security. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018.

Cite DOI URL

(2018). On the Predictability of a User's Next Check-in Using Data from Different Social Networks. Proceedings of the 2nd ACM SIGSPATIAL Workshop on Prediction of Human Mobility, PredictGIS 2018, Seattle, WA, USA, November 6, 2018.

Cite DOI URL

(2018). Metric-based local differential privacy for statistical applications. CoRR.

Cite URL

(2018). Leakage and Protocol Composition in a Game-Theoretic Perspective. CoRR.

Cite URL

(2018). Leakage and Protocol Composition in a Game-Theoretic Perspective. Principles of Security and Trust - 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings.

Cite DOI URL

(2018). Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility. 31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018.

Cite DOI URL

(2018). Information-Driven Rapidly-Exploring Random Tree for Efficient Environment Exploration. J. Intell. Robotic Syst..

Cite DOI URL

(2018). An Algebraic Approach for Reasoning About Information Flow. CoRR.

Cite URL

(2018). An Algebraic Approach for Reasoning About Information Flow. Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 15-17, 2018, Proceedings.

Cite DOI URL

(2018). A Game-Theoretic Approach to Information-Flow Control via Protocol Composition. Entropy.

Cite DOI URL

(2018). A Game-Theoretic Approach to Information-Flow Control via Protocol Composition. CoRR.

Cite URL

(2018). A Comparative Study on Unsupervised Domain Adaptation for Coffee Crop Mapping. Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications - 23rd Iberoamerican Congress, CIARP 2018, Madrid, Spain, November 19-22, 2018, Proceedings.

Cite DOI URL

(2018). A Comparative Study on Unsupervised Domain Adaptation Approaches for Coffee Crop Mapping. CoRR.

Cite URL

(2017). Quantifying vulnerability of secret generation using hyper-distributions (extended version). CoRR.

Cite URL

(2017). Quantifying Vulnerability of Secret Generation Using Hyper-Distributions. Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings.

Cite DOI URL

(2017). Proof-Carrying Sensing: Towards Real-World Authentication in Cyber-Physical Systems. Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, SenSys 2017, Delft, Netherlands, November 06-08, 2017.

Cite DOI URL

(2017). Modeling Information Flow in Dynamic Information Retrieval. Proceedings of the ACM SIGIR International Conference on Theory of Information Retrieval, ICTIR 2017, Amsterdam, The Netherlands, October 1-4, 2017.

Cite DOI URL

(2017). Information Leakage Games. CoRR.

Cite URL

(2017). Information Leakage Games. Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings.

Cite DOI URL

(2017). Formal Analysis of the Information Leakage of the DC-Nets and Crowds Anonymity Protocols. Formal Methods: Foundations and Applications - 20th Brazilian Symposium, SBMF 2017, Recife, Brazil, November 29 - December 1, 2017, Proceedings.

Cite DOI URL

(2016). Compression-Based Selective Sampling for Learning to Rank. Proceedings of the 25th ACM International Conference on Information and Knowledge Management, CIKM 2016, Indianapolis, IN, USA, October 24-28, 2016.

Cite DOI URL

(2016). Axioms for Information Leakage. IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016.

Cite DOI URL

(2015). On the information leakage of differentially-private mechanisms. J. Comput. Secur..

Cite DOI URL

(2014). When Not All Bits Are Equal: Worth-Based Information Flow. Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings.

Cite DOI URL

(2014). Quantifying Information Flow for Dynamic Secrets. 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014.

Cite DOI URL

(2014). Additive and Multiplicative Notions of Leakage, and Their Capacities. IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014.

Cite DOI URL

(2012). Quantitative information flow in interactive systems. J. Comput. Secur..

Cite DOI URL

(2012). Measuring Information Leakage Using Generalized Gain Functions. 25th IEEE Computer Security Foundations Symposium, CSF 2012, Cambridge, MA, USA, June 25-27, 2012.

Cite DOI URL

(2011). Quantitative Information Flow and Applications to Differential Privacy. Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures.

Cite DOI URL

(2011). On the Relation between Differential Privacy and Quantitative Information Flow. Automata, Languages and Programming - 38th International Colloquium, ICALP 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part II.

Cite DOI URL

(2011). On the relation between Differential Privacy and Quantitative Information Flow. CoRR.

Cite URL

(2011). Differential Privacy: On the Trade-Off between Utility and Information Leakage. Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers.

Cite DOI URL

(2011). Differential Privacy: on the trade-off between Utility and Information Leakage. CoRR.

Cite URL

(2010). Safe Equivalences for Security Properties. Theoretical Computer Science - 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings.

Cite DOI URL

(2010). Probabilistic Information Flow. Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, LICS 2010, 11-14 July 2010, Edinburgh, United Kingdom.

Cite DOI URL

(2010). Interactive Information Flow - (Invited Talk). Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers.

Cite DOI URL

(2010). Information Flow in Interactive Systems. CONCUR 2010 - Concurrency Theory, 21th International Conference, CONCUR 2010, Paris, France, August 31-September 3, 2010. Proceedings.

Cite DOI URL

(2010). Entropy and Attack Models in Information Flow - (Invited Talk). Theoretical Computer Science - 6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings.

Cite DOI URL

(2010). Differential Privacy versus Quantitative Information Flow. CoRR.

Cite URL