Aggarwal, D.
, Obremski, M., Ribeiro, J.
, Simkin, M. & Siniscalchi, L. (2022).
Privacy Amplification with Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Transactions on Information Theory,
68(8), 5475-5495.
https://doi.org/10.1109/TIT.2022.3167404
Strydonck, T. V.
, Georges, A. L., Guéneau, A., Trieu, A., Timany, A., Piessens, F.
, Birkedal, L. & Devriese, D. (2022).
Proving full-system security properties under multiple attacker models on capability machines. I
Proceedings - 2022 IEEE 35th Computer Security Foundations Symposium, CSF 2022 (s. 80-95). IEEE.
https://doi.org/10.1109/CSF54842.2022.9919645
Ganardi, M., Majumdar, R.
, Pavlogiannis, A., Schütze, L. & Zetzsche, G. (2022).
Reachability in Bidirected Pushdown VASS. I M. Bojanczyk, E. Merelli & D. P. Woodruff (red.),
49th EATCS International Conference on Automata, Languages, and Programming, ICALP 2022 Artikel 124 Dagstuhl Publishing.
https://doi.org/10.4230/LIPIcs.ICALP.2022.124
Caragiannis, I., Gravin, N., Lu, P. & Wang, Z. (2022).
Relaxing the Independence Assumption in Sequential Posted Pricing, Prophet Inequality, and Random Bipartite Matching. I M. Feldman, H. Fu & I. Talgam-Cohen (red.),
Web and Internet Economics : 17th International Conference, WINE 2021 (s. 131-148). Springer.
https://doi.org/10.1007/978-3-030-94676-0_8
Seisenberger, M., ter Beek, M. H., Fan, X., Ferrari, A., Haxthausen, A. E., James, P., Lawrence, A., Luttik, B.
, van de Pol, J. & Wimmer, S. (2022).
Safe and Secure Future AI-Driven Railway Technologies: Challenges for Formal Methods in Railway. I T. Margaria & B. Steffen (red.),
Leveraging Applications of Formal Methods, Verification and Validation. Practice - 11th International Symposium, ISoLA 2022, Proceedings (s. 246-268). Springer.
https://doi.org/10.1007/978-3-031-19762-8_20
Chillotti, I., Orsini, E.
, Scholl, P., Smart, N. P. & Leeuwen, B. V. (2022).
Scooby: Improved Multi-party Homomorphic Secret Sharing Based on FHE. I C. Galdi & S. Jarecki (red.),
Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings (s. 540-563). Springer.
https://doi.org/10.1007/978-3-031-14791-3_24
Skitsas, K., Papageorgiou, I. G., Talebi, M. S., Kantere, V., Katehakis, M. N.
& Karras, P. (2022).
SIFTER: Space-Efficient Value Iteration for Finite-Horizon MDPs.
Proceedings of the VLDB Endowment,
16(1), 90-98.
https://doi.org/10.14778/3561261.3561269
Chatterjee, K., Svoboda, J., Žikelić, Đ.
, Pavlogiannis, A. & Tkadlec, J. (2022).
Social balance on networks: Local minima and best-edge dynamics.
Physical Review E,
106(3), Artikel 034321.
https://doi.org/10.1103/PhysRevE.106.034321
Bilstrup, K.-E. K., Kaspersen, M. H., Lunding, M. S., Schaper, M.-M. A., Van Mechelen, M., Tamashiro, M. A., Smith, R. C., Iversen, O. S. & Petersen, M. G. (2022).
Supporting Critical Data Literacy in K-9 Education: Three Principles for Enriching Pupils’ Relationship to Data. I
Proceedings of Interaction Design and Children, IDC 2022 (s. 225-236). Association for Computing Machinery.
https://doi.org/10.1145/3501712.3530783
Brian, G.
, Faonio, A., Obremski, M., Ribeiro, J.
, Simkin, M., Skorski, M.
& Venturi, D. (2022).
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
IEEE Transactions on Information Theory,
68(12), 8197-8227.
https://doi.org/10.1109/TIT.2022.3193848
Braverman, V., Cohen-Addad, V., Jiang, S. H.-C., Krauthgamer, R.
, Schwiegelshohn, C., Toftrup, M. B. & Wu, X. (2022).
The Power of Uniform Sampling for Coresets. I
Proceedings - 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science, FOCS 2022 (s. 462-473). IEEE.
https://doi.org/10.1109/FOCS54457.2022.00051
Mascheroni, G., Zaman, B.
, Eriksson, E., Cino, D., Brandsen, S.
& Bressa, N. A. (2022).
Towards Computational Empowerment of Disadvantaged Children and Youth in Non-Formal Learning Contexts. Abstract fra ICA annual conference, Paris, Frankrig.