Channel Avatar

Privacy Enhancing Technologies Symposium @UC-m6oi7a-8LffTk64J3tq-w@youtube.com

930 subscribers - no pronouns :c

The annual Privacy Enhancing Technologies Symposium (PETS) b


56:09
[HotPETS] Keynote
26:44
[HotPETS] Impacts of Growing Tor – A Neglected Aspect of Tor Evolution?
03:55
[HotPETS] Closing Remarks and Awards
25:36
[HotPETS] Privacy Threat Modeling 101
25:32
[HotPETS] Who are users in privacy discussions?
27:03
[HotPETS] Female mHealth Apps: Opportunities and Challenges
29:47
[HotPETS] Data for good: US data breach visualization and classification
24:00
[HotPETS] Are PETS and algorithmic accountability at loggerheads?
30:48
[HotPETS] Dataveillance: An Overlooked Side of Dark Patterns
24:52
[HotPETS] Bridging the Gap between Privacy Incidents and PETs
18:56
PETS 2023 Closing Remarks and Awards
15:28
[7C] “Revoked just now!” Users’ Behaviors Toward Fitness-Data Sharing with Third-Party Applications
15:15
[7B] A Unified Framework for Quantifying Privacy Risk in Synthetic Data
13:53
[7C] Intersectional Thinking about PETs: A Study of Library Privacy
13:48
[7C] Comparing Large-Scale Privacy and Security Notifications
13:35
[7C] Understanding the Perception and Awareness of Education Technologies' Privacy and Security
16:27
[7C] Investigating Privacy Decision-Making Processes Among Nigerian Men and Women
14:31
[7C] Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
12:47
[7B] Differential Privacy for Black-Box Statistical Analyses
15:10
[7B] SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks
15:45
[7B] SenRev: Measurement of Personal Information Disclosure in Online Health Communities
12:33
[7B] DPrio: Efficient Differential Privacy with High Utility for Prio
21:02
[7A] FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval
12:27
[7A] MAPLE: A Metadata-Hiding Policy-Controllable Encrypted Search Platform with Minimal Trust
13:39
[7A] Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward Privacy
14:30
[7A] Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions
12:57
[7A] TWo-IN-one-SSE: Fast, Scalable, Storage-Efficient Searchable Symmetric Encryption for Queries
13:23
[7A] Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
16:53
[6C] Your DRM Can Watch You Too: Privacy Implications of Browsers misImplementations of Widevine EME
13:37
[6C] How Website Owners Face Privacy Issues: Thematic Analysis of a Covert Notification Study
13:08
[6C] On the Robustness of Topics API to a Re-Identification Attack
15:07
[6C] Usability and Enforceability of Global Privacy Control
16:33
[6C] Blocking JavaScript without Breaking the Web: An Empirical Investigation
14:45
[6C] Privacy Rarely Considered: Exploring Considerations when Websites Adopt Third-Party Services
15:14
[6B] Privacy-Preserving Federated Recurrent Neural Networks
13:34
[6B] MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
13:54
[6B] HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data
13:19
[6B] Losing Less: A Loss for Differentially Private Deep Learning
14:10
[6B] SoK: Secure Aggregation based on cryptographic schemes for Federated Learning
13:49
[6B] Private Graph Extraction via Feature Explanations
14:21
[6A] Privacy-Preserving Outsourced Certificate Validation
13:21
[6A] SoK: Secure E-Voting with Everlasting Privacy
14:49
[6A] Privacy Property Graph: Towards Automated Privacy Threat Modeling via Static Graph Analysis
15:25
[6A] No Video Left Behind: A Utility-Preserving Obfuscation Approach for YouTube Recommendations
14:39
[6A] Detect your fingerprint in your photographs : Photography-based multi-feature Sybil detection
14:51
[6A] Compact and Divisible E-Cash with Threshold Issuance
14:29
[5C] StyleID: Identity Disentanglement for Anonymizing Faces
15:09
[5C] Examining StyleGAN as a Utility-Preserving Face De-identification Method
14:51
[5C] I-GWAS: Privacy-Preserving Interdependent Genome-Wide Association Studies
15:08
[5C] Two-Cloud Private Read Alignment to a Public Reference Genome
13:14
[5C] My face, my rules: Enabling Personalized Protection against Unacceptable Face Editing
13:58
[5C] Differentially Private Speaker Anonymization
15:26
[5B] Efficient Proofs of Software Exploitability for Real-world Processors
13:54
[5B] Story Beyond the Eye: Glyph Positions Break PDF Text Redaction
13:05
[5B] iStelan: Disclosing Sensitive User Information by Mobile Magnetometer from Finger Touches
13:36
[5B] Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks
14:19
[5B] Unintended Memorization and Timing Attacks in Named Entity Recognition Models
10:53
[5B] Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash
13:12
[5A] Verifiable Distributed Aggregation Functions
15:07
[5A] Funshade: Function Secret Sharing for Two-Party Secure Thresholded Distance Evaluation