Expertise

  • Computer Science

    • Link Establishment
    • Authentication
    • Identifier
    • Mobile Device
    • Communication
    • Models
    • Vectors
    • Visualization

Organisations

Publications

2025

Fully Homomorphic Encryption for Privacy-Preserving Collaborative Machine Learning (2025)[Thesis › PhD Thesis - Research UT, graduation UT]. University of Twente. Mazzone, F.https://doi.org/10.3990/1.9789036568067Efficient Ranking, Order Statistics, and Sorting under CKKS (2025)In SEC '25: Proceedings of the 34th USENIX Conference on Security Symposium (pp. 8541-8558). Article 438. USENIX Association. Mazzone, F., Everts, M. H., Hahn, F. & Peter, A.https://www.usenix.org/system/files/conference/usenixsecurity25/sec25cycle1-prepub-165-mazzone.pdfPrivacy-Preserving Vertical K-Means Clustering (2025)[Working paper › Preprint]. ArXiv.org. Mazzone, F., Brown, T., Kerschbaum, F., Wilson, K. H., Everts, M., Hahn, F. & Peter, A.https://doi.org/10.48550/arXiv.2504.07578Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning (2025)In Data and Applications Security and Privacy XXXIX: 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025, Proceedings (pp. 96-115) (Lecture Notes in Computer Science; Vol. 15722). Springer. Mazzone, F., Badawi, A. A., Polyakov, Y., Everts, M., Hahn, F. & Peter, A.https://doi.org/10.1007/978-3-031-96590-6_6

2024

Efficient Ranking, Order Statistics, and Sorting under CKKS (2024)[Working paper › Preprint]. ArXiv.org. Mazzone, F., Everts, M., Hahn, F. & Peter, A.https://doi.org/10.48550/arXiv.2412.15126Investigating Privacy Attacks in the Gray-Box Setting to Enhance Collaborative Learning Schemes (2024)[Working paper › Preprint]. ArXiv.org. Mazzone, F., Badawi, A. A., Polyakov, Y., Everts, M., Hahn, F. & Peter, A.https://doi.org/10.48550/arXiv.2409.17283

2022

Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks (2022)In AISec 2022 - Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2022 (pp. 13-24). Association for Computing Machinery. Mazzone, F., van den Heuvel, L., Huber, M., Verdecchia, C., Everts, M. H., Hahn, F. & Peter, A.https://doi.org/10.1145/3560830.3563721Descubrimiento de proximidad asistido por la red, autenticación y establecimiento de enlace entre dispositivos móviles de comunicación en LTE 3GPP (2022)[Patent › Patent]. Fransen, F., Veugen, P., De Kievit, S. & Everts, M.https://patentscope.wipo.int/search/es/detail.jsf;jsessionid=9024B6F2E65CCCD2173B43BE4084C1C8.wapp2nB?docId=ES373411884&_cid=P21-LA6XSB-88914-16Balancing privacy and accountability in digital payment methods using zk-SNARKs (2022)In 2022 19th Annual International Conference on Privacy, Security and Trust, PST 2022. IEEE. Bontekoe, T., Everts, M. & Peter, A.https://doi.org/10.1109/PST55820.2022.9851987Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC (2022)In Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings (pp. 663-683) (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 13269 LNCS). Springer. Attema, T., Dunning, V., Everts, M. & Langenkamp, P.https://doi.org/10.1007/978-3-031-09234-3_33

Research profiles

Address

University of Twente

Zilverling (building no. 11), room 2031
Hallenweg 19
7522 NH Enschede
Netherlands

Navigate to location

Organisations

Scan the QR code or
Download vCard