Carmela Troncoso
Assistant professor in computer security and privacy
Carmela Troncoso's AcademicInfluence.com Rankings
Download Badge
Criminal Justice Computer Science
Carmela Troncoso's Degrees
- Bachelors Computer Science University of the Philippines
Similar Degrees You Can Earn
Why Is Carmela Troncoso Influential?
(Suggest an Edit or Addition)According to Wikipedia, Carmela González Troncoso is a Spanish telecommunication engineer and researcher specialized in privacy issues, and an LGBT+ activist. She is currently a tenure track assistant professor at École Polytechnique Fédérale de Lausanne in Switzerland and the head of the SPRING lab . Troncoso gained recognition for her leadership of the European team developing the DP-3T protocol that aims at the creation of an application to facilitate the tracing of COVID-19 infected persons without compromising on the privacy of citizens. Currently she is also member of the Swiss National COVID-19 Science Task Force in the expert group on Digital Epidemiology. In 2020, she was listed among Fortune magazine's 40 Under 40.
Carmela Troncoso's Published Works
Published Works
- Protecting location privacy: optimal strategy against localization attacks (2012) (386)
- Decentralized Privacy-Preserving Proximity Tracing (2020) (279)
- Engineering Privacy by Design (2011) (267)
- Knock Knock, Who's There? Membership Inference on Aggregate Location Data (2017) (201)
- PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance (2007) (160)
- Unraveling an old cloak: k-anonymity for location privacy (2010) (154)
- PrETP: Privacy-Preserving Electronic Toll Pricing (2010) (125)
- PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval (2011) (93)
- Early Evidence of Effectiveness of Digital Contact Tracing for SARS-CoV-2 in Switzerland (2020) (83)
- OB-PWS: Obfuscation-Based Private Web Search (2012) (81)
- Encrypted DNS -> Privacy? A Traffic Analysis Perspective (2019) (76)
- Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments (2017) (76)
- Drac: An Architecture for Anonymous Low-Volume Communications (2010) (74)
- Two-Sided Statistical Disclosure Attack (2007) (73)
- Perfect Matching Disclosure Attacks (2008) (66)
- Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services (2014) (61)
- Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms (2017) (59)
- POTs: protective optimization technologies (2018) (57)
- Revisiting a combinatorial approach toward measuring anonymity (2008) (55)
- A research agenda for digital proximity tracing apps. (2020) (52)
- What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy (2017) (50)
- Synthetic Data - Anonymisation Groundhog Day (2020) (49)
- On the Impact of Social Network Profiling on Anonymity (2008) (48)
- Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications (2009) (47)
- The bayesian traffic analysis of mix networks (2009) (43)
- Privacy Games Along Location Traces (2016) (43)
- Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks (2010) (37)
- TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer (2018) (34)
- Is Geo-Indistinguishability What You Are Looking for? (2017) (31)
- Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications (2014) (31)
- Angel or Devil? A Privacy Study of Mobile Parental Control Apps (2020) (29)
- Privacy Games along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy (2021) (29)
- Disparate Vulnerability: on the Unfairness of Privacy Attacks Against Machine Learning (2019) (28)
- Optimal sporadic location privacy preserving systems in presence of bandwidth constraints (2013) (27)
- Does additional information always reduce anonymity? (2007) (27)
- Understanding Statistical Disclosure: A Least Squares Approach (2012) (25)
- The Wisdom of Crowds: Attacks and Optimal Constructions (2009) (24)
- You cannot hide for long: de-anonymization of real-world dynamic behaviour (2013) (24)
- Efficient Negative Databases from Cryptographic Hash Functions (2007) (23)
- On (The Lack Of) Location Privacy in Crowdsourcing Applications (2019) (21)
- Questioning the assumptions behind fairness solutions (2018) (19)
- PRIPARE: A New Vision on Engineering Privacy and Security by Design (2014) (19)
- Traffic Analysis Attacks on a Continuously-Observable Steganographic File System (2007) (19)
- Small Data (2017) (18)
- A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems (2014) (17)
- Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures (2017) (17)
- Synthetic Data - A Privacy Mirage (2020) (16)
- Disparate Vulnerability to Membership Inference Attacks (2019) (16)
- ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging (2017) (15)
- Improving secure long-term archival of digitally signed documents (2008) (15)
- On the difficulty of achieving anonymity for Vehicle-2-X communication (2011) (15)
- Under the Underground: Predicting Private Interactions in Underground Forums (2018) (14)
- Evading classifiers in discrete domains with provable optimality guarantees (2018) (14)
- Under the Hood of Membership Inference Attacks on Aggregate Location Time-Series (2019) (13)
- A Metric to Evaluate Interaction Obfuscation in Online Social Networks (2012) (12)
- Bugs in our Pockets: The Risks of Client-Side Scanning (2021) (12)
- Scalable Anonymous Communication with Provable Security (2010) (11)
- DNS Privacy not so private: the traffic analysis perspective (2018) (10)
- Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications (2020) (10)
- Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign (2020) (10)
- CrowdNotifier: Decentralized Privacy-Preserving Presence Tracing (2021) (9)
- Measuring Membership Privacy on Aggregate Location Time-Series (2019) (8)
- Fingerprinting Tor's hidden service log files using a timing channel (2011) (8)
- WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking (2021) (8)
- The Bayes Security Measure (2020) (7)
- Meet the family of statistical disclosure attacks (2013) (7)
- ClaimChain: Decentralized Public Key Infrastructure (2017) (7)
- The watchful forensic analyst: Multi-clue information fusion with background knowledge (2013) (7)
- A Framework for the Analysis of Mix-Based Steganographic File Systems (2008) (7)
- VoteAgain: A scalable coercion-resistant voting system (2020) (6)
- The Application of Bayesian Inference to Traffic Analysis (2009) (6)
- Rethinking Location Privacy for Unknown Mobility Behaviors (2018) (6)
- A Tabula Rasa Approach to Sporadic Location Privacy (2018) (5)
- A Least Squares approach to user profiling in pool mix-based anonymous communication systems (2012) (5)
- Feature importance scores and lossless feature pruning using Banzhaf power indices (2017) (5)
- On the Privacy of Decentralized Machine Learning (2022) (5)
- DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists (2020) (5)
- Preliminary Analysis of Potential Harms in the Luca Tracing System (2021) (4)
- GenoShare: Supporting Privacy-Informed Decisions for Sharing Exact Genomic Data (2017) (4)
- Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World (2022) (4)
- GenoShare: Supporting Privacy-Informed Decisions for Sharing Individual-Level Genetic Data (2020) (4)
- zksk: A Library for Composable Zero-Knowledge Proofs (2019) (3)
- Deploying decentralized, privacy-preserving proximity tracing (2022) (3)
- This is not the padding you are looking for! On the ineffectiveness of QUIC PADDING against website fingerprinting (2022) (3)
- The Bayesian Analysis of Mix Networks (2009) (3)
- Algorithmic Principles for Building Efficient Overlay Computers (2008) (3)
- Design and Analysis Methods for Privacy Technologies (Ontwerp- en analysemethodes van privacytechnologieën) (2011) (3)
- POTs (2020) (2)
- PPML '19: Privacy Preserving Machine Learning (2019) (2)
- Technical Report for ID TNET-2015-00294 “ Optimal delay characteristic when the number of users is comparable to the number of rounds ” (2016) (2)
- Contact Tracing Apps: Engineering Privacy in Quicksand (2021) (2)
- On the the design of optimal location privacy-preserving mechanisms (2017) (2)
- Understanding the effects of real-world behavior in statistical disclosure attacks (2014) (2)
- Tandem: Securing Keys by Using a Central Server While Preserving Privacy (2018) (1)
- TASP: Towards Anonymity Sets that Persist (2016) (1)
- Advanced applications for e-ID cards in Flanders: basic research 2 (2009) (1)
- Keynote Address: PETs, POTs, and Pitfalls: Rethinking the Protection of Users against Machine Learning (2019) (1)
- ADAPID D15: E-Government II (2010) (1)
- Datashare: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists (2020) (1)
- COOKIEGRAPH: Measuring and Countering First-Party Tracking Cookies (2022) (1)
- Measuring Membership Privacy on Aggregate Location Time-Series (2020) (1)
- Design of Pool Mixes Against Profiling Attacks in Real Conditions (2016) (1)
- Decentralizing Public Key Infrastructures with ClaimChains (2017) (1)
- Why the search for a privacy-preserving data sharing mechanism is failing (2022) (1)
- Proceedings of IEEE Workshop on Information Forensics and Security, WIFS 2017 (2017) (1)
- Measuring Membership Privacy on Aggregate Location Time-Series (2020) (1)
- You get PADDING, everybody gets PADDING! You get privacy? Evaluating practical QUIC website fingerprinting protections for the masses (2022) (1)
- Why Johnny Can't Develop Mobile Crowdsourcing Applications with Location Privacy (2019) (1)
- Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data (2023) (0)
- COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies (2022) (0)
- Editors’ Introduction (2019) (0)
- G ENO S HARE : Using Avatars to Preserve Privacy on Genomics Pandora (2017) (0)
- Provable Security (2018) (0)
- On the (In)security of Peer-to-Peer Decentralized Machine Learning (2022) (0)
- Advanced Applications for eID Cards in Flanders ADAPID Deliverable D 9 A Framework (2006) (0)
- Privacy and Online Rights (0)
- Method and system authentication (2014) (0)
- Editors’ Introduction (2018) (0)
- Editors’ Introduction (2018) (0)
- Editors’ Introduction (2018) (0)
- Editors’ Introduction (2019) (0)
- Editors’ Introduction (2018) (0)
- Arbitrary Decisions are a Hidden Cost of Differentially-Private Training (2023) (0)
- Not Yet Another Digital ID: Privacy-preserving Humanitarian Aid Distribution (2023) (0)
- Panel: Adversarial {AI}: Perspectives from Academia and Industry (2019) (0)
- Can Decentralized Learning be more robust than Federated Learning? (2023) (0)
- Editors’ Introduction (2018) (0)
- Filter design for delay-based anonymous communications (2017) (0)
- Private Set Matching Protocols (2022) (0)
- Private Collection Matching Protocols (2022) (0)
- Lightnion: seamless anonymous communication from any web browser (2019) (0)
- GenoShare: (cid:1) Supporting (cid:1) Privacy-Informed Decisions (cid:1) for (cid:1) Sharing (cid:1) Individual-Level Genetic (cid:1) Data (2020) (0)
- Surveillance and privacy in the public and private sectors: panel (2019) (0)
- Algorithmic Solutions for Privacy, Anonymity and Identity (2007) (0)
- Using Private Information Retrieval (2011) (0)
- Adversarial Robustness for Tabular Data through Cost and Utility Awareness (2022) (0)
- Bayesian inference to evaluate information leakage in complex scenarios (2013) (0)
- Editors’ Introduction (2019) (0)
This paper list is powered by the following services:
Other Resources About Carmela Troncoso
What Schools Are Affiliated With Carmela Troncoso?
Carmela Troncoso is affiliated with the following schools: