Programme
| Heures |
événement |
(+)
|
|
17:00 - 19:30
|
Accueil - Accueil des participants |
|
|
17:25 - 17:30
|
Départ de la navette pour le Castel Ste Anne - Départ à 17h30 de la gare de Lannion. |
|
|
19:30 - 22:00
|
Dîner |
|
| Heures |
événement |
(+)
|
|
07:30 - 09:00
|
Petit déjeuner |
|
|
09:00 - 10:00
|
Keynote 1: Building Effective Privacy-Preserving Data Analytics with PrivaGym - Apostolos Pyrgelis (RISE Research Institutes of Sweden) |
|
|
10:00 - 10:40
|
Session A1 -- Privacy vulnerabilities: data and models (Salle 1) |
(+)
|
|
10:00 - 10:20 |
› A Dual Perspective on Synthetic Trajectory Generators: Utility Framework and Privacy Vulnerabilities - Aya CHERIGUI, Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174), Orange Research |
|
|
10:20 - 10:40 |
› Beyond the mask : The illusion of privacy in defaced brain MRI - Imen Bajar, Centre Inria de Lyon - Mohamed Maouche, Centre Inria de Lyon |
|
|
10:40 - 11:10
|
Pause café |
|
|
11:10 - 12:50
|
Session A2 -- Privacy vulnerabilities: data and models |
(+)
|
|
11:10 - 11:30 |
› Uncovering Memorization in Timeseries Imputation models: LBRM Membership Inference and its link to attribute Leakage - Braham TALEB, EDF Labs, Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux |
|
|
11:30 - 11:50 |
› Mobility Traces under Attack: How LLMs Automate Privacy and Social Engineering Attacks - Marwa EL KAMIL, Inria, Ecole de Technologie Supérieure [Montréal] |
|
|
11:50 - 12:10 |
› Practical and Ready-to-Use Methodology to Assess the re-identification Risk in Anonymized Datasets - Louis Philippe Sondeck, COACHMESEC Consulting (Clever Identity) - maryline laurent, SAMOVAR, Télécom SudParis, Institut Polytechnique de Paris |
|
|
12:10 - 12:30 |
› Inferring Sensitive Attributes from Knowledge Graph Embeddings: Attack and Defense Strategies - Yasmine Hayder, Institut National des Sciences Appliquées - Centre Val de Loire, LIFO, Concevoir des technologies d'amélioration de la vie privée explicables et efficaces |
|
|
12:30 - 12:50 |
› Cryptographic Traceability and Verifiability of Sensitive Security Data Before Generative AI Processing - Yulliwas AMEUR, CEDRIC. Réseaux et Objets Connectés, EFREI Paris |
|
|
12:50 - 14:00
|
Déjeuner |
|
|
14:00 - 15:00
|
Table Ronde |
|
|
15:00 - 15:40
|
Session B1 -- Privacy-preserving machine learning |
(+)
|
|
15:00 - 15:20 |
› Improving Unlearning with Model Updates Probably Aligned with Gradients - Virgile Dine, Centre Inria de l'Université de Rennes |
|
|
15:20 - 15:40 |
› Privacy-Utility Trade-off under Rate Constraint in Federated Learning - Mamour Ndiaye, LISTIC |
|
|
15:40 - 16:10
|
Pause café |
|
|
16:10 - 17:10
|
Session B2 -- Privacy-preserving machine learning |
(+)
|
|
16:10 - 16:30 |
› Learning with Locally Private Examples by Inverse Weierstrass Private Stochastic Gradient Descent - Jean Dufraiche, MAGNET (Machine Learning in Information Networks) |
|
|
16:30 - 16:50 |
› Unified Privacy Guarantees for Decentralized Learning via Matrix Factorization - Dimitri Lerévérend, Centre Inria de l'Université de Rennes, the World Is Distributed Exploring the tension between scale and coordination |
|
|
16:50 - 17:10 |
› Titre : Google, l'apprentissage fédéré et la protection de la vie privée, ou comment redéfinir un problème pour mieux l'invisibiliser. Sous-titre : Comprendre l'institution d'un cadrage par l'analyse de controverse. - Marie Garin, Centre Internet et Société |
|
|
17:15 - 18:15
|
Session C -- Applied cryptography and privacy-preserving distributed algorithms |
(+)
|
|
17:15 - 17:35 |
› Opening Pandora's Box: White-Box Attacks on Microsoft's PhotoDNA Perceptual Hash Function - Diane Leblanc-Albarel, COSIC, KU Leuven |
|
|
17:35 - 17:55 |
› POPPY: Scalable and Secure Spectral Centrality for Distributed Graphs via Homomorphic Encryption - Claire Guichemerre, Université de Rennes |
|
|
17:55 - 18:15 |
› Giskard : Scalable Byzantine-Robust and Privacy-Preserving Decentralized Learning - Ousmane Touat, CNRS |
|
|
19:30 - 22:00
|
Dîner |
|
| Heures |
événement |
(+)
|
|
07:30 - 09:00
|
Petit déjeuner |
|
|
09:00 - 10:00
|
Keynote 2: On the Security and Privacy Risks of Browser Extensions - Aurore Fass (INRIA Centre at Université Côte d'Azur) |
|
|
10:00 - 10:40
|
Session D -- Web tracking through chains of redirections |
(+)
|
|
10:00 - 10:20 |
› QRisk: Privacy risks of URLs encoded as QR codes - Mathieu Cunche, PRIVATICS |
|
|
10:20 - 10:40 |
› Gotta Catch 'em all: On the Web Tracking Practices of a Deal-Sharing Conglomerate and their Heavy Reliance on Redirect Chain - Sterenn Roux, Univ Rennes, Inria, IRISA |
|
|
10:40 - 11:10
|
Pause café |
|
|
11:10 - 12:30
|
Session E -- Online ad surveillance and regulation |
(+)
|
|
11:10 - 11:30 |
› Stetoscope: underStand TargEting and manipulaTiOnS via COllaborative Private data collEction - Antoine Boutet, CITI Centre of Innovation in Telecommunications and Integration of services |
|
|
11:30 - 11:50 |
› A Year Under the DSA: Ad Transparency's Uneven Landscape - Abir Benzaamia, Analyse et traitement de données complexes à grande échelle |
|
|
11:50 - 12:10 |
› Privacy Settings and Ad Perception: The Shift from Third-Party Cookies to the Privacy Sandbox - Abir Benzaamia, Analyse et traitement de données complexes à grande échelle |
|
|
12:10 - 12:30 |
› Are internet standard developing organisations data controllers under the GDPR? - Julien ROSSI, CEMTI - Jonathan Keller, CEMTI - Université Paris 8 |
|
|
12:30 - 12:50
|
Gong show |
(+)
|
|
12:30 - 12:34 |
› [Work in Progress] Synthetic data generation for anonymization: a threshold question? Aligning Computer Science and Law for circumventing uncertainty - Mélanie Romano, IRISA |
|
|
12:34 - 12:38 |
› WIP: Protecting against Membership Inference Attacks with Metric Privacy - Andreas Athanasiou, TU Delft |
|
|
12:38 - 12:42 |
› La Smart City : Source de perspectives juridiques et technologiques locale, vecteur de nouveaux enjeux internationaux - Damien Franchi, Institut de l'Ouest : Droit et Europe |
|
|
12:42 - 12:46 |
› Towards Context-aware Intrusion Detection in Individual-oriented Information Systems: An Empirical Study on Android Malware |
|
|
12:46 - 12:50 |
› SciReNum – La science au cœur de la régulation du numérique : co-production de politiques publiques par l'expertise scientifique au sein de la CNIL et de son écosystème |
|
|
12:50 - 14:00
|
Déjeuner |
|
|
14:00 - 18:00
|
Social event - Surprise |
|
|
19:30 - 22:00
|
Cocktail dînatoire |
|
| Heures |
événement |
(+)
|
|
07:30 - 09:00
|
Petit déjeuner |
|
|
09:00 - 10:00
|
Keynote 3 (coming soon) - Iván Székely (Central European University) |
|
|
10:00 - 10:40
|
Session F -- Privacy and fairness |
(+)
|
|
10:00 - 10:20 |
› Impact Disproportionné en Génération de Données Synthétiques - Paul Andrey, MAGNET (Machine Learning in Information Networks) |
|
|
10:20 - 10:40 |
› Attribute Inference on Differentially Private and Fair Learning - Zhan XU, Service Expérimentation et Développement Inria Lyon |
|
|
10:40 - 11:00
|
Pause café |
|
|
11:00 - 12:20
|
Session G -- Privacy-preserving data publishing: relational data, textual data, and high-dimensional data |
(+)
|
|
11:00 - 11:20 |
› SoK: An Empirical Evaluation of Differentially Private Aggregation Query Answering Frameworks in Relational Databases - Jean-François Couchot, Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) - Loïs ECOFFET, FEMTO-ST |
|
|
11:20 - 11:40 |
› Formalism of SQL Queries computations to ensure differential privacy - Paul Maillard-Salin, FEMTO-ST - Loïs Ecoffet, FEMTO-ST |
|
|
11:40 - 12:00 |
› Adaptive Text Anonymization: Learning Privacy-Utility Trade-offs via Prompt Optimization - Gabriel Loiseau, Centre Inria de l'Université de Lille |
|
|
12:00 - 12:20 |
› Want to protect your data? Just cluster them! - Arnaud Grivet Sébert, KTH Royal Institute of Technology, Stockholm, Macquarie University |
|
|
12:20 - 14:00
|
Déjeuner |
|
|
16:25 - 16:30
|
Départ de la navette pour la gare de Lannion - Départ du Castel Ste Anne à 16h30. |
|
|