2025#
- Erik Buchholz, Natasha Fernandes, David D. Nguyen, Alsharif Abuadbba, Shuo Wang, Surya Nepal, and Salil S. Kanhere. What is the Cost of Differential Privacy for Deep Learning-Based Trajectory Generation?. arXiv – currently under review, June 2025.
2024#
Nicholas D’Silva, Toran Shahi, Øyvind Timian Dokk Husveg, Adith Sanjeeve, Erik Buchholz, and Salil S. Kanhere. Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement. In 2024 17th International Conference on Security of Information and Networks (SIN), volume 17, page 8, Sydney, NSW, Australia, December 2024. IEEE.
Jesse Merhi, Erik Buchholz, and Salil S. Kanhere. Synthetic Trajectory Generation through Convolutional Neural Networks. In 2024 21st Annual International Conference on Privacy, Security and Trust (PST), volume 21, pages 1-12, Sydney, NSW, Australia, August 2024. IEEE.
Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, and Salil S. Kanhere. SoK: Can Trajectory Generation Combine Privacy and Utility?. Proceedings on Privacy Enhancing Technologies, 2024(3):75-93, July 2024.
2022#
- Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, and Salil S. Kanhere. Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. In Proceedings of the 38th Annual Computer Security Applications Conference, pages 279-292, New York, NY, USA, December 2022. Association for Computing Machinery.
2021#
- Jan Pennekamp, Erik Buchholz, Markus Dahlmanns, Ike Kunze, Stefan Braun, Eric Wagner, Matthias Brockmann, Klaus Wehrle, and Martin Henze. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use. In Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER ’20), 12 2021.
2020#
Jan Pennekamp, Erik Buchholz, Yannik Lockner, Markus Dahlmanns, Tiandong Xi, Marcel Fey, Christian Brecher, Christian Hopmann, and Klaus Wehrle. Privacy-Preserving Production Process Parameter Exchange. In Proceedings of the 36th Annual Computer Security Applications Conference (ACSAC ’20), 12 2020.
Roman Matzutt, Jan Pennekamp, Erik Buchholz, and Klaus Wehrle. Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services. In Proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS ’20), 10 2020.
University Papers#
Master Thesis: Privacy-Preserving Exchange of Process Parameters
Advised by Jan Pennekamp (COMSYS, RWTH Aachen University) and Yannik Lockner (IKV at RWTH Aachen University)
Examined by Prof. Dr.-Ing. Klaus Wehrle (COMSYS, RWTH Aachen University) and Prof. Dr.-Ing. Christian Hopmann (IKV at RWTH Aachen University)Master Seminar: App Fingerprinting (ITSEC, RWTH Aachen University)
Bachelor Thesis: A User-controlled Data Market for Privacy-preserving Data Analyses
Advised by Roman Matzutt and Jan Henrik Ziegeldorf (both COMSYS, RWTH Aachen University)
Examined by Prof. Dr.-Ing. Klaus Wehrle (COMSYS, RWTH Aachen University) and Prof. Dr. Bernhard Rumpe (SE, RWTH Aachen University)Bachelor Seminar: Bloom Cookies - FOLKS Best Paper Award (COMSYS, RWTH Aachen University)