![]() |
Lun. 09 | Mar. 10 | Mer. 11 | Jeu. 12 |
08:00
09:00
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
|
20:00 - 21:30 (1h30)
Dîner
|
8:45 - 9:00 (15min)
Introduction
C. Palamidessi
9:00 - 10:45 (1h45)
Session A: Location Privacy and Risk Detection
(chair: C. Palamidessi)
› Demographic survey data anonymization with metric privacy
- Sz. Lestyan, E. Elsalamouny, Inria Saclay & INED
09:00-09:20 (20min)
› Hiding where and when is not enough : a preliminary analysis of mobility trace protection in the YJ100K dataset.
- M. Cunche, CITI
09:20-09:40 (20min)
› Tau-Eval: A Unified Evaluation Framework for Useful and Private Text Anonymization
- G. Loiseau, Inria Lille
09:40-10:00 (20min)
› Protecting isolated points' privacy for textual data
- A. Sébert, École polytechnique
10:00-10:20 (20min)
› Demonstration of TELESAFE: Detecting Private/Work Boundary crossings in Energy Consumption Time series in Telework
- H. Zhang, Inria Saclay
10:20-10:40 (20min)
10:45 - 11:15 (30min)
Pause café
11:15 - 13:00 (1h45)
Session B: Web Tracking and Fingerprinting
(chair E. ElSalamouny)
› Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting
- A. Athanasiou, K. Chatzikokolakis, Catuscia Palamidessi, Inria Saclay
11:15-11:35 (20min)
› Auditing Web Trackers with the EDPB's Open-Source Website Compliance Tool
- J. Gorin, GeNumEr
11:35-11:55 (20min)
› Gotta Catch'em all: Analyzing Web Tracking Practices onDeal-Sharing Platforms
- S. Roux, Univ. Rennes & Inria
11:55-12:15 (20min)
› FP-Rainbow: Fingerprint-Based Browser Configuration Identification
- M. Huyghe, CRIStAL Lille
12:15-12:35 (20min)
› Users Pay Twice: The Hidden Cost of Data Collection on the Web
- S. Pélissier, IRISA
12:35-12:55 (20min)
13:00 - 14:30 (1h30)
Déjeuner
14:30 - 15:30 (1h)
Keynote A: Gergely Biczók
(chair Sz. Lestyán)
15:30 - 16:15 (45min)
Session C: Privacy in ML 1
(chair Sz. Lestyán)
› bench-MIA: Towards automatic multi lever benchmark construction for MIA evaluation (WIP)
- Y. Li, Inria Saclay
15:30-15:50 (20min)
› Protection Against Source Inference Attacks in Federated Learning
- K. Jung, Inria
15:50-16:10 (20min)
16:15 - 16:45 (30min)
Pause café
16:45 - 18:30 (1h45)
Session D: User Awareness and Regulation
› How Usable is Consent Withdrawal on the Web? UI Requirements and Expert Evaluation
- S. Ahuja, Inria Université Côte d'Azur
16:45-17:05 (20min)
› Guidance in anonymization: When Ambiguity Meets Privacy-Washing
- Sz. Lestyan, Inria Saclay & INED
17:05-17:25 (20min)
› [PROJET] Chaire Fondation Université de Rennes Cybersécurité : Protection des Données et Droits Fondamentaux
- T. Allard, CNRS & IRISA
17:25-17:45 (20min)
› "I'm not for sale" – Perceptions and limited awareness of privacy risks by digital natives about location data
- A. Boutet, Victor Morel, CITI & University of Gothenburg
17:45-18:05 (20min)
› Déléguée à la Protection des Données : retour d'expérience d'une enseignante-chercheuse
- E. Pawlowski, GREYC
18:05-18:25 (20min)
20:00 - 21:30 (1h30)
Dîner
|
9:00 - 10:00 (1h)
Keynote B: Thorsten Strufe
(chair A. Athanasiou)
10:00 - 10:45 (45min)
Session E: Mobile Privacy
(chair A. Athanasiou)
› L'écosystème des Stalkerware
- S. Larinier, ESIEA
10:00-10:20 (20min)
› EXADPrinter: Exhaustive Permission-less Data Collection For Characterizing Device Fingerprinting Within the Android Ecosystem
- S. Bouhenniche, Univ. Lille
10:20-10:40 (20min)
10:45 - 11:15 (30min)
Pause café
11:15 - 13:00 (1h45)
Session F: Privacy in ML 2
(chair: G. Zeong)
› Comparing privacy notions for protection against reconstruction attacks in machine learning
- N. Fernandes, S. Biswas Macquarie University & EPFL
11:15-11:35 (20min)
› Exploiting Vulnerabilities in Time Series Imputation Models: A Study on Unintended Memorization and Information Leakage
- B. Taleb, EDF
11:35-11:55 (20min)
› Towards Privacy-preserving and Fairness-aware Federated Learning Framework
- A. Bendoukha, Samovar, Télécom SudParis & Insititut Polytechnique de Paris
11:55-12:15 (20min)
› TAMIS: Tailored Membership Inference Attacks on Synthetic Data
- P. Andrey, Inria Lille
12:15-12:35 (20min)
› Conformal Prediction for LLMs in the Black-Box Model
- L. Biéchy, Inria Saclay
12:35-12:55 (20min)
13:00 - 14:30 (1h30)
Déjeuner
14:30 - 18:00 (3h30)
Social Event
More info TBA
19:00 - 22:00 (3h)
Cocktail Dînatoire
|
9:00 - 11:00 (2h)
Session G: Theory of Privacy
(chair: A. Sébert)
› Closed form maximum likelihood estimation for the randomized response protocol
- C. Pinzón, École polytechnique
09:00-09:20 (20min)
› Information Density Bounds for Privacy
- S. Saeidian, KTH Royal Institute of Technology
09:20-09:40 (20min)
› A non comparison oblivious sort and its application to private k-NN
- S. Azogagh, Université du Québec à Montréal
09:40-10:00 (20min)
› RevoLUT: Rust Efficient Versatile Oblivious Look-Up-Tables
- F. Larose-Gervais, Université du Québec à Montréal
10:00-10:20 (20min)
› Formal Privacy Analyses for Open Banking
- N. Fernandes, Macquarie University
10:20-10:40 (20min)
› Classification of privacy systems by sanitizing SQL queries
- L. Ecoffet, FEMTO-ST
10:40-11:00 (20min)
11:00 - 11:30 (30min)
Pause café
11:30 - 13:15 (1h45)
Session H: Differential Privacy
(chair: S. Saeidian)
› Evaluating U-ReRo as an Effective Attack Metric for Epsilon Calibration in Differential Privacy
- A. Sauer, Karlsruhe Institute of Technology
11:30-11:50 (20min)
› I knew you knew: Differential privacy for knowledge graphs under semantic-aware attacks
- Y. Hayder, INSA Centre Val de Loire
11:50-12:10 (20min)
› Privacy-preserving computation of U-statistics
- Q. Sinh, Inria Lille
12:10-12:30 (20min)
› Where to Intervene? Benchmarking Fairness Mechanisms on Differentially Private Synthetic Data
- V. Resende, Inria
12:30-12:50 (20min)
› Understanding the bias induced by Local Differential Privacy
- J. Dufraiche, Inria Lille
12:50-13:10 (20min)
13:15 - 14:45 (1h30)
Déjeuner
|