Programme
Heures |
événement |
(+)
|
20:00 - 21:30
|
Dîner |
|
Heures |
événement |
(+)
|
08:45 - 09:00
|
Introduction - C. Palamidessi |
|
09:00 - 10:45
|
Session A: Location Privacy and Risk Detection - (chair: C. Palamidessi) |
(+)
|
09:00 - 09:20 |
› Demographic survey data anonymization with metric privacy - Sz. Lestyan, E. Elsalamouny, Inria Saclay & INED |
|
09:20 - 09:40 |
› Hiding where and when is not enough : a preliminary analysis of mobility trace protection in the YJ100K dataset. - M. Cunche, CITI |
|
09:40 - 10:00 |
› Tau-Eval: A Unified Evaluation Framework for Useful and Private Text Anonymization - G. Loiseau, Inria Lille |
|
10:00 - 10:20 |
› Protecting isolated points' privacy for textual data - A. Sébert, École polytechnique |
|
10:20 - 10:40 |
› Demonstration of TELESAFE: Detecting Private/Work Boundary crossings in Energy Consumption Time series in Telework - H. Zhang, Inria Saclay |
|
10:45 - 11:15
|
Pause café |
|
11:15 - 13:00
|
Session B: Web Tracking and Fingerprinting - (chair E. ElSalamouny) |
(+)
|
11:15 - 11:35 |
› Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting - A. Athanasiou, K. Chatzikokolakis, Catuscia Palamidessi, Inria Saclay |
|
11:35 - 11:55 |
› Auditing Web Trackers with the EDPB's Open-Source Website Compliance Tool - J. Gorin, GeNumEr |
|
11:55 - 12:15 |
› Gotta Catch'em all: Analyzing Web Tracking Practices onDeal-Sharing Platforms - S. Roux, Univ. Rennes & Inria |
|
12:15 - 12:35 |
› FP-Rainbow: Fingerprint-Based Browser Configuration Identification - M. Huyghe, CRIStAL Lille |
|
12:35 - 12:55 |
› Users Pay Twice: The Hidden Cost of Data Collection on the Web - S. Pélissier, IRISA |
|
13:00 - 14:30
|
Déjeuner |
|
14:30 - 15:30
|
Keynote A: Gergely Biczók - (chair Sz. Lestyán) |
|
15:30 - 16:15
|
Session C: Privacy in ML 1 - (chair Sz. Lestyán) |
(+)
|
15:30 - 15:50 |
› bench-MIA: Towards automatic multi lever benchmark construction for MIA evaluation (WIP) - Y. Li, Inria Saclay |
|
15:50 - 16:10 |
› Protection Against Source Inference Attacks in Federated Learning - K. Jung, Inria |
|
16:15 - 16:45
|
Pause café |
|
16:45 - 18:30
|
Session D: User Awareness and Regulation |
(+)
|
16:45 - 17:05 |
› How Usable is Consent Withdrawal on the Web? UI Requirements and Expert Evaluation - S. Ahuja, Inria Université Côte d'Azur |
|
17:05 - 17:25 |
› Guidance in anonymization: When Ambiguity Meets Privacy-Washing - Sz. Lestyan, Inria Saclay & INED |
|
17:25 - 17:45 |
› [PROJET] Chaire Fondation Université de Rennes Cybersécurité : Protection des Données et Droits Fondamentaux - T. Allard, CNRS & IRISA |
|
17:45 - 18:05 |
› "I'm not for sale" – Perceptions and limited awareness of privacy risks by digital natives about location data - A. Boutet, Victor Morel, CITI & University of Gothenburg |
|
18:05 - 18:25 |
› Déléguée à la Protection des Données : retour d'expérience d'une enseignante-chercheuse - E. Pawlowski, GREYC |
|
20:00 - 21:30
|
Dîner |
|
Heures |
événement |
(+)
|
09:00 - 10:00
|
Keynote B: Thorsten Strufe - (chair A. Athanasiou) |
|
10:00 - 10:45
|
Session E: Mobile Privacy - (chair A. Athanasiou) |
(+)
|
10:00 - 10:20 |
› L'écosystème des Stalkerware - S. Larinier, ESIEA |
|
10:20 - 10:40 |
› EXADPrinter: Exhaustive Permission-less Data Collection For Characterizing Device Fingerprinting Within the Android Ecosystem - S. Bouhenniche, Univ. Lille |
|
10:45 - 11:15
|
Pause café |
|
11:15 - 13:00
|
Session F: Privacy in ML 2 - (chair: G. Zeong) |
(+)
|
11:15 - 11:35 |
› Comparing privacy notions for protection against reconstruction attacks in machine learning - N. Fernandes, S. Biswas Macquarie University & EPFL |
|
11:35 - 11:55 |
› Exploiting Vulnerabilities in Time Series Imputation Models: A Study on Unintended Memorization and Information Leakage - B. Taleb, EDF |
|
11:55 - 12:15 |
› Towards Privacy-preserving and Fairness-aware Federated Learning Framework - A. Bendoukha, Samovar, Télécom SudParis & Insititut Polytechnique de Paris |
|
12:15 - 12:35 |
› TAMIS: Tailored Membership Inference Attacks on Synthetic Data - P. Andrey, Inria Lille |
|
12:35 - 12:55 |
› Conformal Prediction for LLMs in the Black-Box Model - L. Biéchy, Inria Saclay |
|
13:00 - 14:30
|
Déjeuner |
|
14:30 - 18:00
|
Social Event - More info TBA |
|
19:00 - 22:00
|
Cocktail Dînatoire |
|
Heures |
événement |
(+)
|
09:00 - 11:00
|
Session G: Theory of Privacy - (chair: A. Sébert) |
(+)
|
09:00 - 09:20 |
› Closed form maximum likelihood estimation for the randomized response protocol - C. Pinzón, École polytechnique |
|
09:20 - 09:40 |
› Information Density Bounds for Privacy - S. Saeidian, KTH Royal Institute of Technology |
|
09:40 - 10:00 |
› A non comparison oblivious sort and its application to private k-NN - S. Azogagh, Université du Québec à Montréal |
|
10:00 - 10:20 |
› RevoLUT: Rust Efficient Versatile Oblivious Look-Up-Tables - F. Larose-Gervais, Université du Québec à Montréal |
|
10:20 - 10:40 |
› Formal Privacy Analyses for Open Banking - N. Fernandes, Macquarie University |
|
10:40 - 11:00 |
› Classification of privacy systems by sanitizing SQL queries - L. Ecoffet, FEMTO-ST |
|
11:00 - 11:30
|
Pause café |
|
11:30 - 13:15
|
Session H: Differential Privacy - (chair: S. Saeidian) |
(+)
|
11:30 - 11:50 |
› Evaluating U-ReRo as an Effective Attack Metric for Epsilon Calibration in Differential Privacy - A. Sauer, Karlsruhe Institute of Technology |
|
11:50 - 12:10 |
› I knew you knew: Differential privacy for knowledge graphs under semantic-aware attacks - Y. Hayder, INSA Centre Val de Loire |
|
12:10 - 12:30 |
› Privacy-preserving computation of U-statistics - Q. Sinh, Inria Lille |
|
12:30 - 12:50 |
› Where to Intervene? Benchmarking Fairness Mechanisms on Differentially Private Synthetic Data - V. Resende, Inria |
|
12:50 - 13:10 |
› Understanding the bias induced by Local Differential Privacy - J. Dufraiche, Inria Lille |
|
13:15 - 14:45
|
Déjeuner |
|
|