![](https://dblp1.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Proceedings on Privacy Enhancing Technologies, Volume 2023
Volume 2023, Number 1, January 2023
- Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. 1-4 - Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub:
Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites. 5-28 - Amogh Pradeep, Álvaro Feal, Julien Gamba, Ashwin Rao
, Martina Lindorfer, Narseo Vallina-Rodriguez, David R. Choffnes:
Not Your Average App: A Large-scale Privacy Analysis of Android Browsers. 29-46 - Noé Zufferey, Kavous Salehzadeh Niksirat, Mathias Humbert, Kévin Huguenin
:
"Revoked just now!" Users' Behaviors Toward Fitness-Data Sharing with Third-Party Applications. 47-67 - Yunhao Yang, Parham Gohari, Ufuk Topcu:
On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models. 68-84 - Travis Mayberry, Erik-Oliver Blass, Ellis Fenske:
Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network. 85-97 - Ali Shahin Shamsabadi, Brij Mohan Lal Srivastava, Aurélien Bellet, Nathalie Vauquier, Emmanuel Vincent, Mohamed Maouche, Marc Tommasi, Nicolas Papernot:
Differentially Private Speaker Anonymization. 98-114 - Arnab Bag, Debadrita Talapatra, Ayushi Rastogi, Sikhar Patranabis, Debdeep Mukhopadhyay:
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries. 115-139 - Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti
:
SoK: Secure Aggregation Based on Cryptographic Schemes for Federated Learning. 140-157 - Franziska Boenisch, Christopher Mühl, Roy Rinberg, Jannis Ihrig, Adam Dziedzic:
Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees. 158-176 - Simon Hanisch, Evelyn Muschter, Admantini Hatzipanayioti, Shu-Chen Li, Thorsten Strufe:
Understanding Person Identification Through Gait. 177-189 - Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos:
Exploring Model Inversion Attacks in the Black-box Setting. 190-206 - Enze Liu
, Sumanth Rao
, Sam Havron, Grant Ho, Stefan Savage, Geoffrey M. Voelker, Damon McCoy:
No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. 207-224 - Takao Murakami, Hiromi Arai, Koki Hamada, Takuma Hatano, Makoto Iguchi, Hiroaki Kikuchi, Atsushi Kuromasa, Hiroshi Nakagawa, Yuichi Nakamura
, Kenshiro Nishiyama, Ryo Nojima, Hidenobu Oguri, Chiemi Watanabe, Akira Yamada, Takayasu Yamaguchi, Yuji Yamaoka:
Designing a Location Trace Anonymization Contest. 225-243 - Yerim Kim, Minjae Kim, Myungjae Chung, Junbeom Hur:
Detect Your Fingerprint in Your Photographs: Photography-based Multi-Feature Sybil Detection. 244-263 - Minh-Ha Le, Niklas Carlsson:
StyleID: Identity Disentanglement for Anonymizing Faces. 264-278 - Thomas Haines, Rafieh Mosaheb, Johannes Müller, Ivan Pryvalov
:
SoK: Secure E-Voting with Everlasting Privacy. 279-293 - Victor Yisa, Reza Ghaiumy Anaraky, Bart P. Knijnenburg, Rita Orji:
Investigating Privacy Decision-Making Processes Among Nigerian Men and Women. 294-308 - Zixiao Zong, Mengwei Yang, Justin Ley, Athina Markopoulou, Carter T. Butts:
Privacy by Projection: Federated Population Density Estimation by Projecting on Random Features. 309-324 - Ehud Aharoni
, Allon Adir, Moran Baruch, Nir Drucker
, Gilad Ezov, Ariel Farkash, Lev Greenberg, Ramy Masalha, Guy Moshkowich, Dov Murik, Hayim Shaul, Omri Soceanu:
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data. 325-342 - Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Koji Chida:
Efficient decision tree training with new data structure for secure multi-party computation. 343-364 - Alex Davidson, Gonçalo Pestana, Sofía Celi
:
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval. 365-383 - Patricia Arias Cabarcos
, Saina Khalili, Thorsten Strufe:
'Surprised, Shocked, Worried'}: User Reactions to Facebook Data Collection from Third Parties. 384-399 - Ismat Jarin, Birhanu Eshete
:
MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members. 400-416 - Ghous Amjad, Sarvar Patel, Giuseppe Persiano
, Kevin Yeo, Moti Yung:
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption. 417-436 - Túlio A. Pascoal, Jérémie Decouchant
, Antoine Boutet, Marcus Völp
:
I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies. 437-454 - Jessica Colnago, Lorrie Faith Cranor
, Alessandro Acquisti
:
Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors. 455-476 - Thea Riebe, Tom Biselli, Marc-André Kaufhold, Christian Reuter:
Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey. 477-493 - Lindsey Tulloch, Ian Goldberg:
Lox: Protecting the Social Graph in Bridge Distribution. 494-509 - Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr:
How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? 510-526 - Adam Dziedzic, Christopher A. Choquette-Choo, Natalie Dullerud, Vinith M. Suriyakumar, Ali Shahin Shamsabadi, Muhammad Ahmad Kaleem, Somesh Jha, Nicolas Papernot, Xiao Wang:
Private Multi-Winner Voting for Machine Learning. 527-555 - Yuting Zhan, Hamed Haddadi, Afra Mashhadi:
Privacy-Aware Adversarial Network in Human Mobility Prediction. 556-570 - Madiha Tabassum
, Heather Lipford:
Exploring privacy implications of awareness and control mechanisms in smart home devices. 571-588 - Piyush Kumar Sharma, Rishi Sharma, Kartikey Singh, Mukulika Maity, Sambuddho Chakravarty:
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System. 589-607 - Alessandro N. Baccarini, Marina Blanton, Chen Yuan:
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning. 608-626 - Matthew Green, Mathias Hall-Andersen, Eric Hennenfent, Gabriel Kaptchuk, Benjamin Perez, Gijs Van Laer:
Efficient Proofs of Software Exploitability for Real-world Processors. 627-640
Volume 2023, Number 2, April 2023
- Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. 1-4 - Sahar Mazloom, Benjamin E. Diamond, Antigoni Polychroniadou, Tucker Balch:
An Efficient Data-Independent Priority Queue and its Application to Dark Pools. 5-22 - Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Find Thy Neighbourhood: Privacy-Preserving Local Clustering. 23-39 - Dandan Yuan, Cong Zuo, Shujie Cui, Giovanni Russello:
Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy. 40-58 - Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla:
Private Graph Extraction via Feature Explanations. 59-78 - Reham Mohamed, Habiba Farrukh, Yidong Lu, He Wang, Z. Berkay Celik:
iSTELAN: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches. 79-96 - Jovan Powar, Alastair R. Beresford:
SoK: Managing risks of linkage attacks on data privacy. 97-116 - Tobias Fiebig
, Seda F. Gürses, Carlos Gañán, Erna Kotkamp, Fernando Kuipers, Martina Lindorfer, Menghua Prisse, Taritha Sari:
Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom. 117-150 - Gonzalo Munilla Garrido, Xiaoyuan Liu, Florian Matthes, Dawn Song:
Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry. 151-170 - Immanuel Kunz, Konrad Weiss, Angelika Schneider, Christian Banse:
Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph-based Analysis. 171-187 - Alexander Veicht, Cédric Renggli, Diogo Barradas:
DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses. 188-205 - Akshaye Shenoi, Prasanna Karthik Vairam, Kanav Sabharwal, Jialin Li, Dinil Mon Divakaran:
iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications. 206-220 - Nico Ebert
, Tim Geppert, Joanna Strycharz, Melanie Knieps, Michael Hönig, Elke Brucker-Kley
:
Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok. 221-235 - Xue Jiang, Yufei Zhang, Xuebing Zhou, Jens Grossklags:
Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data. 236-250 - Alina Stöver, Nina Gerber
, Henning Pridöhl, Max Maass, Sebastian Bretthauer, Indra Spiecker genannt Döhmann, Matthias Hollick, Dominik Herrmann:
How Website Owners Face Privacy Issues: Thematic Analysis of Responses from a Covert Notification Study Reveals Diverse Circumstances and Challenges. 251-264 - Sebastian Zimmeck, Oliver Wang, Kuba Alicki, Jocelyn Wang, Sophie Eng:
Usability and Enforceability of Global Privacy Control. 265-281 - Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys:
Watching your call: Breaking VoLTE Privacy in LTE/5G Networks. 282-297 - Frederik Armknecht
, Youzhe Heng, Rainer Schnell:
Strengthening Privacy-Preserving Record Linkage using Diffusion. 298-311 - Matteo Giomi, Franziska Boenisch, Christoph Wehmeyer, Borbála Tasnádi:
A Unified Framework for Quantifying Privacy Risk in Synthetic Data. 312-328 - Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Mohamed Ali Kâafar:
Unintended Memorization and Timing Attacks in Named Entity Recognition Models. 329-346 - Donghang Lu, Aniket Kate:
RPM: Robust Anonymity at Scale. 347-360 - César Sabater, Florian Hahn
, Andreas Peter, Jan Ramon:
Private Sampling with Identifiable Cheaters. 361-383 - Alina Stöver, Sara Hahn, Felix Kretschmer, Nina Gerber
:
Investigating how Users Imagine their Personal Privacy Assistant. 384-402 - Sarah Scheffler
, Jonathan R. Mayer:
SoK: Content Moderation for End-to-End Encryption. 403-429 - Haodi Wang, Thang Hoang:
ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline. 430-448 - Sindhuja Madabushi, Parameswaran Ramanathan:
Two-Cloud Private Read Alignment to a Public Reference Genome. 449-463 - Lovedeep Gondara, Ke Wang:
PubSub-ML: A Model Streaming Alternative to Federated Learning. 464-479 - Nora McDonald, Rachel Greenstadt, Andrea Forte:
Intersectional Thinking about PETs: A Study of Library Privacy. 480-495 - Àlex Miranda-Pascual
, Patricia Guerra-Balboa
, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe:
SoK: Differentially Private Publication of Trajectory Data. 496-516
Volume 2023, Number 3, July 2023
- Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. 1-4 - Pratik Musale, Adam Lee:
Trust TEE?: Exploring the Impact of Trusted Execution Environments on Smart Home Privacy Norms. 5-23 - Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Ruffle: Rapid 3-Party Shuffle Protocols. 24-42 - Maxwell Bland, Anushya Iyer, Kirill Levchenko:
Story Beyond the Eye: Glyph Positions Break PDF Text Redaction. 43-61 - Kang Gu, Ehsanul Kabir, Neha Ramsurrun, Soroush Vosoughi, Shagufta Mehnaz:
Towards Sentence Level Inference Attack Against Pre-trained Language Models. 62-78 - Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari:
Time-Deniable Signatures. 79-102 - Nikita Samarin
, Shayna Kothari, Zaina Siyed, Oscar Bjorkman, Reena Yuan, Primal Wijesekera
, Noura Alomar, Jordan Fischer, Chris Jay Hoofnagle, Serge Egelman:
Lessons in VCR Repair: Compliance of Android App Developers with the California Consumer Privacy Act (CCPA). 103-121 - Elisa Tsai, Deepak Kumar, Ram Sundara Raman, Gavin Li, Yael Eiger, Roya Ensafi:
CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates. 122-137 - Andrick Adhikari, Sanchari Das, Rinku Dewri:
Evolution of Composition, Readability, and Structure of Privacy Policies over Two Decades. 138-153 - Charles Gouert, Dimitris Mouris, Nektarios Georgios Tsoutsos:
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks. 154-172 - Christine Utz, Matthias Michels, Martin Degeling, Ninja Marnau, Ben Stock:
Comparing Large-Scale Privacy and Security Notifications. 173-193 - Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford:
RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks. 194-210 - Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan R. Ullman, Roxana Geambasu:
How to Combine Membership-Inference Attacks on Multiple Updated Machine Learning Models. 211-232 - Faysal Hossain Shezan, Minjun Long, David Hasani, Gang Wang, Yuan Tian:
SenRev: Measurement of Personal Information Disclosure in Online Health Communities. 233-251 - Zhujun Xiao, Jenna Cryan, Yuanshun Yao, Yi Hong Gordon Cheo, Yuanchao Shu, Stefan Saroiu, Ben Y. Zhao, Haitao Zheng:
"My face, my rules": Enabling Personalized Protection Against Unacceptable Face Editing. 252-267 - Sebastian Pahl, Florian Adamsky, Daniel Kaiser, Thomas Engel:
Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance. 268-285 - Antreas Dionysiou, Elias Athanasopoulos:
SoK: Membership Inference is Harder Than Previously Thought. 286-306 - Ali Shahin Shamsabadi, Nicolas Papernot:
Losing Less: A Loss for Differentially Private Deep Learning. 307-320 - Marc Rivinius
, Pascal Reisert
, Sebastian Hasler
, Ralf Küsters:
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC. 321-353 - Jean-Guillaume Dumas, Aude Maignan
, Clément Pernet, Daniel S. Roche:
VESPo: Verified Evaluation of Secret Polynomials (with application to dynamic proofs of retrievability). 354-374 - Dana Keeler, Chelsea Komlo, Emily Lepert, Shannon Veitch, Xi He:
DPrio: Efficient Differential Privacy with High Utility for Prio. 375-390 - Abdul Haddi Amjad, Zubair Shafiq, Muhammad Ali Gulzar:
Blocking JavaScript Without Breaking the Web: An Empirical Investigation. 391-404 - Tina Marjanov, Maria Konstantinou, Magdalena Józwiak, Dayana Spagnuelo:
Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR. 405-417 - Nitin Kohli, Paul Laskowski:
Differential Privacy for Black-Box Statistical Analyses. 418-431 - Marina Blanton
, Michael T. Goodrich, Chen Yuan:
Secure and Accurate Summation of Many Floating-Point Numbers. 432-445 - Kasra Edalatnejad, Mathilde Raynal, Wouter Lueks, Carmela Troncoso:
Private Collection Matching Protocols. 446-468 - Anselme Tueno, Jonas Janneck, David Boehm:
A Method for Securely Comparing Integers using Binary Trees. 469-487 - Omid Mir, Daniel Slamanig
, Balthazar Bauer, René Mayrhofer:
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures. 488-513
Volume 2023, Number 4, October 2023
- Michelle L. Mazurek, Micah Sherr:
Editors' Introduction. 1-4 - Yuzhou Jiang, Emre Yilmaz, Erman Ayday:
Robust Fingerprint of Privacy-Preserving Location Trajectories. 5-20 - Alberto Ibarrondo, Hervé Chabanne, Melek Önen:
Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation. 21-34 - Tore Kasper Frederiksen, Julia Hesse
, Bertram Poettering, Patrick Towa:
Attribute-based Single Sign-On: Secure, Private, and Efficient. 35-65 - Nikhil Jha, Martino Trevisan, Emilio Leonardi, Marco Mellia
:
On the Robustness of Topics API to a Re-Identification Attack. 66-78 - Sandra Siby, Ludovic Barman, Christopher A. Wood, Marwan Fayed
, Nick Sullivan, Carmela Troncoso:
Evaluating practical QUIC website fingerprinting defenses for the masses. 79-95 - Maximilian Kroschewski, Anja Lehmann:
Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect. 96-116 - Florian Turati, Karel Kubicek
, Carlos Cotrini, David A. Basin:
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System. 117-131 - Narmeen Shafqat, Nicole Gerzon
, Maggie Van Nortwick, Victor Sun, Alan Mislove, Aanjhan Ranganathan:
Track You: A Deep Dive into Safety Alerts for Apple AirTags. 132-148 - Da Zhong, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, Wendy Hui Wang:
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks. 149-169 - Miroslaw Kutylowski, Giuseppe Persiano
, Duong Hieu Phan
, Moti Yung, Marcin Zawada
:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. 170-183 - Tung Le, Thang Hoang:
MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust. 184-203 - Evangelia Anna Markatou
, Francesca Falzon, Zachary Espiritu, Roberto Tamassia:
Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions. 204-223 - Sina Faraji, Florian Kerschbaum:
Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates. 224-237 - Vivek Nair, Gonzalo Munilla Garrido, Dawn Song, James F. O'Brien:
Exploring the Privacy Risks of Adversarial VR Game Design. 238-256 - Marika Swanberg, Damien Desfontaines, Samuel Haney:
DP-SIPS: A simpler, more scalable mechanism for differentially private partition selection. 257-268 - Rakibul Hasan
:
Understanding EdTech's Privacy and Security Issues: Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues. 269-286 - Abraham H. Mhaidli, Selin Fidan, An Doan, Gina Herakovic, Mukund Srinath, Lee Matheson, Shomir Wilson, Florian Schaub:
Researchers' Experiences in Analyzing Privacy Policies: Challenges and Opportunities. 287-305 - Gwendal Patat, Mohamed Sabt, Pierre-Alain Fouque
:
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME. 306-321 - Tarek Galal, Anja Lehmann:
Privacy-Preserving Outsourced Certificate Validation. 322-340 - Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh:
Examining StyleGAN as a Utility-Preserving Face De-identification Method. 341-358 - Ala Sarah Alaqra, Farzaneh Karegar, Simone Fischer-Hübner:
Structural and functional explanations for informing lay and expert users: the case of functional encryption. 359-380 - Alfredo Rial, Ania M. Piotrowska:
Compact and Divisible E-Cash with Threshold Issuance. 381-415 - Andrea Gallardo, Chris Choy, Jaideep Juneja, Efe Bozkir, Camille Cobb, Lujo Bauer, Lorrie Cranor
:
Speculative Privacy Concerns about AR Glasses Data Collection. 416-435 - Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen:
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets. 436-451