Skip to main content

Showing 1–8 of 8 results for author: Buchholz, E

.
  1. Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement

    Authors: Nicholas D'Silva, Toran Shahi, Øyvind Timian Dokk Husveg, Adith Sanjeeve, Erik Buchholz, Salil S. Kanhere

    Abstract: Once analysed, location trajectories can provide valuable insights beneficial to various applications. However, such data is also highly sensitive, rendering them susceptible to privacy risks in the event of mismanagement, for example, revealing an individual's identity, home address, or political affiliations. Hence, ensuring that privacy is preserved for this data is a priority. One commonly tak… ▽ More

    Submitted 1 October, 2024; v1 submitted 22 September, 2024; originally announced September 2024.

    Comments: Accepted at the 17th International Conference on Security of Information and Networks (SIN'24). DOI will be added once available

  2. Synthetic Trajectory Generation Through Convolutional Neural Networks

    Authors: Jesse Merhi, Erik Buchholz, Salil S. Kanhere

    Abstract: Location trajectories provide valuable insights for applications from urban planning to pandemic control. However, mobility data can also reveal sensitive information about individuals, such as political opinions, religious beliefs, or sexual orientations. Existing privacy-preserving approaches for publishing this data face a significant utility-privacy trade-off. Releasing synthetic trajectory da… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

    Comments: To appear in the proceedings of the 21st Annual International Conference on Privacy, Security & Trust (PST 2024)

  3. SoK: Can Trajectory Generation Combine Privacy and Utility?

    Authors: Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere

    Abstract: While location trajectories represent a valuable data source for analyses and location-based services, they can reveal sensitive information, such as political and religious preferences. Differentially private publication mechanisms have been proposed to allow for analyses under rigorous privacy guarantees. However, the traditional protection schemes suffer from a limiting privacy-utility trade-of… ▽ More

    Submitted 27 June, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: Added DOI: 10.56553/popets-2024-0068

  4. Reconstruction Attack on Differential Private Trajectory Protection Mechanisms

    Authors: Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere

    Abstract: Location trajectories collected by smartphones and other devices represent a valuable data source for applications such as location-based services. Likewise, trajectories have the potential to reveal sensitive information about individuals, e.g., religious beliefs or sexual orientations. Accordingly, trajectory datasets require appropriate sanitization. Due to their strong theoretical privacy guar… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: To be published in the proceedings of the 38th Annual Computer Security Applications Conference (ACSAC '22)

  5. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use

    Authors: Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, Martin Henze

    Abstract: Following the recent Internet of Things-induced trends on digitization in general, industrial applications will further evolve as well. With a focus on the domains of manufacturing and production, the Internet of Production pursues the vision of a digitized, globally interconnected, yet secure environment by establishing a distributed knowledge base. Background. As part of our collaborative resear… ▽ More

    Submitted 21 December, 2021; originally announced December 2021.

    Comments: 16 pages, 2 figures

    Journal ref: Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER '20), 2021, ACSAC

  6. arXiv:2101.07001  [pdf, other

    cs.NE cs.RO

    A Spiking Central Pattern Generator for the control of a simulated lamprey robot running on SpiNNaker and Loihi neuromorphic boards

    Authors: Emmanouil Angelidis, Emanuel Buchholz, Jonathan Patrick Arreguit O'Neil, Alexis Rougè, Terrence Stewart, Axel von Arnim, Alois Knoll, Auke Ijspeert

    Abstract: Central Pattern Generators (CPGs) models have been long used to investigate both the neural mechanisms that underlie animal locomotion as well as a tool for robotic research. In this work we propose a spiking CPG neural network and its implementation on neuromorphic hardware as a means to control a simulated lamprey model. To construct our CPG model, we employ the naturally emerging dynamical syst… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 25 pages, 15 figures

  7. Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services

    Authors: Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle

    Abstract: Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties. While the security of these services is often well-researched, security implications of their required bootstrapping processes are usually neglected: Users either jointly conduct the anonymization themselves, or they need to rely on a set of non-collu… ▽ More

    Submitted 21 April, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: To be published in the proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS'20)

  8. Evaluating the geometric measure of multiparticle entanglement

    Authors: Lars Erik Buchholz, Tobias Moroder, Otfried Gühne

    Abstract: We present an analytical approach to evaluate the geometric measure of multiparticle entanglement for mixed quantum states. Our method allows the computation of this measure for a family of multiparticle states with a certain symmetry and delivers lower bounds on the measure for general states. It works for an arbitrary number of particles, for arbitrary classes of multiparticle entanglement, an… ▽ More

    Submitted 7 January, 2016; v1 submitted 23 December, 2014; originally announced December 2014.

    Comments: 9 pages, 3 figures, v2: small changes, final version

    Journal ref: Ann. Phys. (Berlin) 528, 278 (2016)