lundi 1 juin 2026
| Heures | événement | (+) |
| 17:00 - 19:30 | Accueil - Accueil des participants | |
| 17:25 - 17:30 | Départ de la navette pour le Castel Ste Anne - Départ à 17h30 de la gare de Lannion. | |
| 19:30 - 22:00 | Dîner |
mardi 2 juin 2026
| Heures | événement | (+) |
| 07:30 - 09:00 | Petit déjeuner | |
| 09:00 - 10:00 | Keynote 1: Building Effective Privacy-Preserving Data Analytics with PrivaGym - Apostolos Pyrgelis (RISE Research Institutes of Sweden) | |
| 10:00 - 10:40 | Session A1 -- Privacy vulnerabilities: data and models (Salle 1) | (+) |
| 10:00 - 10:20 | › A Dual Perspective on Synthetic Trajectory Generators: Utility Framework and Privacy Vulnerabilities - Aya CHERIGUI, Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Orange Research | |
| 10:20 - 10:40 | › Beyond the mask : The illusion of privacy in defaced brain MRI - Imen Bajar, Centre Inria de Lyon - Mohamed Maouche, Centre Inria de Lyon | |
| 10:40 - 11:10 | Pause café | |
| 11:10 - 12:50 | Session A2 -- Privacy vulnerabilities: data and models | (+) |
| 11:10 - 11:30 | › Uncovering Memorization in Timeseries Imputation models: LBRM Membership Inference and its link to attribute Leakage - Braham TALEB, EDF Labs, Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux | |
| 11:30 - 11:50 | › Mobility Traces under Attack: How LLMs Automate Privacy and Social Engineering Attacks - Marwa EL KAMIL, Inria, Ecole de Technologie Supérieure [Montréal] | |
| 11:50 - 12:10 | › Practical and Ready-to-Use Methodology to Assess the re-identification Risk in Anonymized Datasets - Louis Philippe Sondeck, COACHMESEC Consulting (Clever Identity) - maryline laurent, SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris | |
| 12:10 - 12:30 | › Inferring Sensitive Attributes from Knowledge Graph Embeddings: Attack and Defense Strategies - Yasmine Hayder, Institut National des Sciences Appliquées - Centre Val de Loire, LIFO, Concevoir des technologies d'amélioration de la vie privée explicables et efficaces | |
| 12:30 - 12:50 | › Cryptographic Traceability and Verifiability of Sensitive Security Data Before Generative AI Processing - Yulliwas AMEUR, CEDRIC. Réseaux et Objets Connectés, EFREI Paris | |
| 12:50 - 14:00 | Déjeuner | |
| 14:00 - 15:00 | Table Ronde | |
| 15:00 - 15:40 | Session B1 -- Privacy-preserving machine learning | (+) |
| 15:00 - 15:20 | › Improving Unlearning with Model Updates Probably Aligned with Gradients - Virgile Dine, Centre Inria de l'Université de Rennes | |
| 15:20 - 15:40 | › Privacy-Utility Trade-off under Rate Constraint in Federated Learning - Mamour Ndiaye, LISTIC | |
| 15:40 - 16:10 | Pause café | |
| 16:10 - 17:10 | Session B2 -- Privacy-preserving machine learning | (+) |
| 16:10 - 16:30 | › Learning with Locally Private Examples by Inverse Weierstrass Private Stochastic Gradient Descent - Jean Dufraiche, MAGNET (Machine Learning in Information Networks) | |
| 16:30 - 16:50 | › Unified Privacy Guarantees for Decentralized Learning via Matrix Factorization - Dimitri Lerévérend, Centre Inria de l'Université de Rennes, the World Is Distributed Exploring the tension between scale and coordination | |
| 16:50 - 17:10 | › Titre : Google, l'apprentissage fédéré et la protection de la vie privée, ou comment redéfinir un problème pour mieux l'invisibiliser. Sous-titre : Comprendre l'institution d'un cadrage par l'analyse de controverse. - Marie Garin, Centre Internet et Société | |
| 17:15 - 18:15 | Session C -- Applied cryptography and privacy-preserving distributed algorithms | (+) |
| 17:15 - 17:35 | › Opening Pandora's Box: White-Box Attacks on Microsoft's PhotoDNA Perceptual Hash Function - Diane Leblanc-Albarel, COSIC, KU Leuven | |
| 17:35 - 17:55 | › POPPY: Scalable and Secure Spectral Centrality for Distributed Graphs via Homomorphic Encryption - Claire Guichemerre, Université de Rennes | |
| 17:55 - 18:15 | › Giskard : Scalable Byzantine-Robust and Privacy-Preserving Decentralized Learning - Ousmane Touat, CNRS | |
| 19:30 - 22:00 | Dîner |
mercredi 3 juin 2026
| Heures | événement | (+) |
| 07:30 - 09:00 | Petit déjeuner | |
| 09:00 - 10:00 | Keynote 2: On the Security and Privacy Risks of Browser Extensions - Aurore Fass (INRIA Centre at Université Côte d'Azur) | |
| 10:00 - 10:40 | Session D -- Web tracking through chains of redirections | (+) |
| 10:00 - 10:20 | › QRisk: Privacy risks of URLs encoded as QR codes - Mathieu Cunche, PRIVATICS | |
| 10:20 - 10:40 | › Gotta Catch 'em all: On the Web Tracking Practices of a Deal-Sharing Conglomerate and their Heavy Reliance on Redirect Chain - Sterenn Roux, Univ Rennes, Inria, IRISA | |
| 10:40 - 11:10 | Pause café | |
| 11:10 - 12:30 | Session E -- Online ad surveillance and regulation | (+) |
| 11:10 - 11:30 | › Stetoscope: underStand TargEting and manipulaTiOnS via COllaborative Private data collEction - Antoine Boutet, CITI Centre of Innovation in Telecommunications and Integration of services | |
| 11:30 - 11:50 | › A Year Under the DSA: Ad Transparency's Uneven Landscape - Abir Benzaamia, Analyse et traitement de données complexes à grande échelle | |
| 11:50 - 12:10 | › Privacy Settings and Ad Perception: The Shift from Third-Party Cookies to the Privacy Sandbox - Abir Benzaamia, Analyse et traitement de données complexes à grande échelle | |
| 12:10 - 12:30 | › Are internet standard developing organisations data controllers under the GDPR? - Julien ROSSI, CEMTI - Jonathan Keller, CEMTI - Université Paris 8 | |
| 12:30 - 12:50 | Gong show | (+) |
| 12:30 - 12:34 | › [Work in Progress] Synthetic data generation for anonymization: a threshold question? Aligning Computer Science and Law for circumventing uncertainty - Mélanie Romano, IRISA | |
| 12:34 - 12:38 | › WIP: Protecting against Membership Inference Attacks with Metric Privacy - Andreas Athanasiou, TU Delft | |
| 12:38 - 12:42 | › La Smart City : Source de perspectives juridiques et technologiques locale, vecteur de nouveaux enjeux internationaux - Damien Franchi, Institut de l'Ouest : Droit et Europe | |
| 12:42 - 12:46 | › Towards Context-aware Intrusion Detection in Individual-oriented Information Systems: An Empirical Study on Android Malware | |
| 12:46 - 12:50 | › SciReNum – La science au cœur de la régulation du numérique : co-production de politiques publiques par l'expertise scientifique au sein de la CNIL et de son écosystème | |
| 12:50 - 14:00 | Déjeuner | |
| 14:00 - 18:00 | Social event - Surprise | |
| 19:30 - 22:00 | Cocktail dînatoire |
jeudi 4 juin 2026
| Heures | événement | (+) |
| 07:30 - 09:00 | Petit déjeuner | |
| 09:00 - 10:00 | Keynote 3 (coming soon) - Iván Székely (Central European University) | |
| 10:00 - 10:40 | Session F -- Privacy and fairness | (+) |
| 10:00 - 10:20 | › Impact Disproportionné en Génération de Données Synthétiques - Paul Andrey, MAGNET (Machine Learning in Information Networks) | |
| 10:20 - 10:40 | › Attribute Inference on Differentially Private and Fair Learning - Zhan XU, Service Expérimentation et Développement Inria Lyon | |
| 10:40 - 11:00 | Pause café | |
| 11:00 - 12:20 | Session G -- Privacy-preserving data publishing: relational data, textual data, and high-dimensional data | (+) |
| 11:00 - 11:20 | › SoK: An Empirical Evaluation of Differentially Private Aggregation Query Answering Frameworks in Relational Databases - Jean-François Couchot, Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) - Loïs ECOFFET, FEMTO-ST | |
| 11:20 - 11:40 | › Formalism of SQL Queries computations to ensure differential privacy - Paul Maillard-Salin, FEMTO-ST - Loïs Ecoffet, FEMTO-ST | |
| 11:40 - 12:00 | › Adaptive Text Anonymization: Learning Privacy-Utility Trade-offs via Prompt Optimization - Gabriel Loiseau, Centre Inria de l'Université de Lille | |
| 12:00 - 12:20 | › Want to protect your data? Just cluster them! - Arnaud Grivet Sébert, KTH Royal Institute of Technology, Stockholm, Macquarie University | |
| 12:20 - 14:00 | Déjeuner | |
| 16:25 - 16:30 | Départ de la navette pour la gare de Lannion - Départ du Castel Ste Anne à 16h30. |