Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run. Xiang, Z., Wang, T., & Wang, D. In USENIX Security, 2025. bibtex @inproceedings{xiang2025privacy,
title={Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run},
author={Xiang, Zihang and Wang, Tianhao and Wang, Di},
year={2025},
booktitle={USENIX Security},
}
Downloads: 0
{"_id":"LkgLSnsDZjnmMMkMx","bibbaseid":"xiang-wang-wang-privacyauditasbitstransmissionimpossibilitiesforauditbyonerun-2025","author_short":["Xiang, Z.","Wang, T.","Wang, D."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run","author":[{"propositions":[],"lastnames":["Xiang"],"firstnames":["Zihang"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Tianhao"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Di"],"suffixes":[]}],"year":"2025","booktitle":"USENIX Security","bibtex":"@inproceedings{xiang2025privacy,\n title={Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run},\n author={Xiang, Zihang and Wang, Tianhao and Wang, Di},\n year={2025},\n booktitle={USENIX Security},\n}\n\n","author_short":["Xiang, Z.","Wang, T.","Wang, D."],"key":"xiang2025privacy","id":"xiang2025privacy","bibbaseid":"xiang-wang-wang-privacyauditasbitstransmissionimpossibilitiesforauditbyonerun-2025","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://tianhao.wang/files/tianhao.bib","dataSources":["9JysS8QexwC3GJ3Ct"],"keywords":[],"search_terms":["privacy","audit","bits","transmission","possibilities","audit","one","run","xiang","wang","wang"],"title":"Privacy Audit as Bits Transmission: (Im)possibilities for Audit by One Run","year":2025}