Bibliography
Publications of the year
Articles in International Peer-Reviewed Journals
-
1J. P. Achara, J. Parra-Arnau, C. Castelluccia.
Fine-Grained Control over Tracking to Support the Ad-Based Web Economy, in: ACM Transactions on Internet Technology, October 2018, vol. 18, no 4, pp. 1-25. [ DOI : 10.1145/3158372 ]
https://hal.inria.fr/hal-01921868 -
2G. Acs, L. Melis, C. Castelluccia, E. De Cristofaro.
Differentially Private Mixture of Generative Neural Networks (ext), in: IEEE Transactions on Knowledge and Data Engineering, July 2018, pp. 1-13. [ DOI : 10.1109/TKDE.2018.2855136 ]
https://hal.inria.fr/hal-01921923 -
3M. Alaggan, M. Cunche, S. Gambs.
Privacy-preserving Wi-Fi Analytics, in: Proceedings on Privacy Enhancing Technologies, April 2018, vol. 2018, no 2, pp. 4-26. [ DOI : 10.1515/popets-2018-0010 ]
https://hal.inria.fr/hal-01719211 -
4J.-S. Bergé, D. Le Métayer.
Phénomènes de masse et droit des données, in: Communication Commerce Électronique, 2018, vol. n° 12.
https://hal.archives-ouvertes.fr/hal-01907540 -
5J. Bringer, H. Chabanne, D. Le Métayer, R. Lescuyer.
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures, in: Transactions on Data Privacy, 2018, vol. 11, no 2, pp. 111-137.
https://hal.archives-ouvertes.fr/hal-01939841 -
6S. Cerf, S. Bouchenak, B. Robu, N. Marchand, V. Primault, S. Ben Mokhtar, A. Boutet, L. Y. Chen.
Automatic Privacy and Utility Preservation of Mobility Data: A Nonlinear Model-Based Approach, in: IEEE Transactions on Dependable and Secure Computing, 2018.
https://hal.archives-ouvertes.fr/hal-01910687 -
7L. Demir, A. Kumar, M. Cunche, C. Lauradoux.
The Pitfalls of Hashing for Privacy, in: Communications Surveys and Tutorials, IEEE Communications Society, 2018, vol. 20, no 1, pp. 551-565. [ DOI : 10.1109/COMST.2017.2747598 ]
https://hal.inria.fr/hal-01589210 -
8D. Le Métayer, S. Desmoulin‐Canselier.
Algorithmic Decision Systems in the Health and Justice Sectors: Certification and Explanations for Algorithms in European and French Law, in: European Journal of Law and Technology, December 2018.
https://hal.archives-ouvertes.fr/hal-01972259 -
9J. Parra-Arnau, C. Castelluccia.
On the Cost-Effectiveness of Mass Surveillance, in: IEEE Access, 2018, vol. 6, pp. 46538 - 46557. [ DOI : 10.1109/ACCESS.2018.2866310 ]
https://hal.inria.fr/hal-01921899 -
10V. Primault, A. Boutet, S. Ben Mokhtar, L. Brunie.
The Long Road to Computational Location Privacy: A Survey, in: Communications Surveys and Tutorials, IEEE Communications Society, 2018, 1 p. [ DOI : 10.1109/COMST.2018.2873950 ]
https://hal.archives-ouvertes.fr/hal-01890014
International Conferences with Proceedings
-
11A. Boutet, F. De Moor, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault.
Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!, in: DSN 2018 - the 48th International Conference on Dependable Systems and Networks, Luxembourg, Luxembourg, IEEE, June 2018, pp. 466-477. [ DOI : 10.1109/DSN.2018.00055 ]
https://hal.inria.fr/hal-01787060 -
12G. Celosia, M. Cunche.
Detecting smartphone state changes through a Bluetooth based timing attack, in: WiSec '18 - 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, Stockholm, Sweden, June 2018, pp. 154-159. [ DOI : 10.1145/3212480.3212494 ]
https://hal.inria.fr/hal-01870011 -
13S. J. De, D. Le Métayer.
Privacy Risk Analysis to Enable Informed Privacy Settings, in: IWPE 2018 – 4th IEEE International Workshop on Privacy Engineering, London, United Kingdom, Proceedings of the 4th IEEE International Workshop on Privacy Engineering (IWPE 2018), April 2018, pp. 1-8.
https://hal.archives-ouvertes.fr/hal-01939845 -
14G. G. Gulyás, D. F. Somé, N. Bielova, C. Castelluccia.
To Extend or not to Extend: On the Uniqueness of Browser Extensions and Web Logins, in: WPES'18 - Workshop on Privacy in the Electronic Society, Toronto, Canada, ACM Press, October 2018, pp. 14-27. [ DOI : 10.1145/3267323.3268959 ]
https://hal.inria.fr/hal-01921863 -
15T. Jourdan, A. Boutet, C. Frindel.
Toward privacy in IoT mobile devices for activity recognition, in: Privacy Preserving Machine Learning NeurIPS 2018 Workshop, Montréal, Canada, December 2018, pp. 1-6.
https://hal.inria.fr/hal-01941453 -
16T. Jourdan, A. Boutet, C. Frindel.
Toward privacy in IoT mobile devices for activity recognition, in: MobiQuitous 2018 - 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York city, United States, November 2018, pp. 1-10.
https://hal.inria.fr/hal-01882330 -
17R. Kerkouche, R. Alami, R. Féraud, N. Varsier, P. Maillé.
Node-based optimization of LoRa transmissions with Multi-Armed Bandit algorithms, in: ICT 2018 - 25th International Conference on Telecommunications, Saint Malo, France, June 2018, pp. 1-6.
https://hal-imt-atlantique.archives-ouvertes.fr/hal-01946456 -
18D. Le Métayer, P. Rauzy.
Capacity: an Abstract Model of Control over Personal Data, in: CODASPY 2018 - ACM Conference on Data and Application Security and Privacy, Tempe, United States, Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY 2018), ACM, March 2018, pp. 1-12.
https://hal.archives-ouvertes.fr/hal-01939847 -
19V. Morel, D. Le Métayer, M. Cunche, C. Castelluccia.
Enhancing Transparency and Consent in the IoT, in: IWPE 2018 - International Workshop on Privacy Engineering, London, United Kingdom, Proceedings of the International Workshop on Privacy Engineering (IWPE 2018), IEEE, April 2018, pp. 116-119. [ DOI : 10.1109/EuroSPW.2018.00023 ]
https://hal.archives-ouvertes.fr/hal-01709255 -
20R. Pires, D. Goltzsche, S. Ben Mokhtar, S. Bouchenak, A. Boutet, P. Felber, R. Kapitza, M. Pasin, V. Schiavoni.
CYCLOSA: Decentralizing Private Web Search Through SGX-Based Browser Extensions, in: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienne, Austria, IEEE, July 2018, pp. 467-477. [ DOI : 10.1109/ICDCS.2018.00053 ]
https://hal.inria.fr/hal-01882430 -
21V. Primault, M. Maouche, A. Boutet, S. Ben Mokhtar, S. Bouchenak, L. Brunie.
ACCIO: How to Make Location Privacy Experimentation Open and Easy, in: ICDCS 2018 - 38th IEEE International Conference on Distributed Computing Systems, Vienna, Austria, Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, IEEE, July 2018, pp. 896-906. [ DOI : 10.1109/ICDCS.2018.00091 ]
https://hal.archives-ouvertes.fr/hal-01784557
Conferences without Proceedings
-
22M. Cunche, L. Sampaio Cardoso.
Analyzing Ultrasound-based Physical Tracking Systems, in: GreHack 2018, Grenoble, France, November 2018.
https://hal.inria.fr/hal-01927513
Scientific Books (or Scientific Book chapters)
-
23G. Acs, G. Biczók, C. Castelluccia.
Privacy-Preserving Release of Spatio-Temporal Density, in: Handbook of Mobile Data Privacy, Springer, October 2018, pp. 307-335. [ DOI : 10.1007/978-3-319-98161-1_12 ]
https://hal.inria.fr/hal-01921891 -
24M. Cunche.
Syria, in: The SAGE Encyclopedia of Surveillance, Security, andPrivacy, B. A. Arrigo (editor), SAGE, March 2018.
https://hal.inria.fr/hal-01798933
Internal Reports
-
25A. Boutet, F. De Moor, D. Frey, R. Guerraoui, A.-M. Kermarrec, A. Rault.
Collaborative Filtering Under a Sybil Attack: Similarity Metrics do Matter!, Inria Rennes - Bretagne Atlantique, April 2018, pp. 1-12.
https://hal.inria.fr/hal-01767059 -
26A. Kassem, G. Acs, C. Castelluccia.
Differential Inference Testing A Practical Approach to Evaluate Anonymized Data, Inria, January 2018.
https://hal.inria.fr/hal-01681014 -
27D. Le Métayer, V. Morel, M. Cunche.
A Generic Information and Consent Framework for the IoT, Inria, December 2018, no RR-9234, pp. 1-18, https://arxiv.org/abs/1812.06773.
https://hal.inria.fr/hal-01953052 -
28C. Matte, M. Cunche.
Overview of real-world deployment of physical analytics systems, Inria Grenoble Rhône-Alpes, January 2018, no RR-9143, 18 p.
https://hal.inria.fr/hal-01682373 -
29C. Matte, M. Cunche.
Spread of MAC address randomization studied using locally administered MAC addresses use historic, Inria Grenoble Rhône-Alpes, January 2018, no RR-9142.
https://hal.inria.fr/hal-01682363
Scientific Popularization
-
30M. Cunche.
Attaque par déni de service dans le Wi-Fi, in: Linux Magazine France, November 2018, vol. HS 99.
https://hal.inria.fr/hal-01927520 -
31M. Cunche.
Comprendre les attaques Krack, in: GNU/Linux Magazine France, November 2018, vol. HS 99.
https://hal.inria.fr/hal-01927522
Other Publications
-
32B. Adamson, C. Adjih, J. Bilbao, V. Firoiu, F. Fitzek, G. A. M. Samah, E. Lochin, A. Masucci, M.-J. Montpetit, M. V. Pedersen, G. Peralta, V. Roca, P. Saxena, S. Sivakumar.
Taxonomy of Coding Techniques for Efficient Network Communications, June 2018, Internet Research Task Force, Request For Comments (RFC) 8406, https://datatracker.ietf.org/doc/rfc8406/.
https://hal.inria.fr/hal-00998506 -
33A. Boutet, M. Cunche.
A Privacy-Preserving Mechanism for Requesting Location Data Provider with Wi-Fi Access Points, December 2018, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01949419 -
34C. Burdinat, C. Thienot, T. Tran, V. Roca, B. Teibi.
Pseudo-CR Performance evaluation of AL-FEC and MCS dimensionning, February 2018, 3GPP TSG-SA WG4 Meeting #97, Fukuoka, 5th – 6th February 2018.
https://hal.inria.fr/hal-01731622 -
35M. Cunche, L. S. Cardoso.
Analysis of an Ultrasound-Based Physical Tracking System, May 2018, working paper or preprint.
https://hal.inria.fr/hal-01798091 -
36J. Parra-Arnau, C. Castelluccia.
Dataveillance and the False-Positive Paradox, April 2018, working paper or preprint.
https://hal.archives-ouvertes.fr/hal-01157921 -
37V. Roca, A. Begen.
Forward Error Correction (FEC) Framework Extension to Sliding Window Codes, September 2018, Working document of the TSVWG (Transport Area Working Group) group of IETF (Internet Engineering Task Force), draft-ietf-tsvwg-fecframe-ext-06 (work in progress), https://datatracker.ietf.org/doc/draft-ietf-tsvwg-fecframe-ext/.
https://hal.inria.fr/hal-01345125 -
38V. Roca, J. Detchart, C. Adjih, M. V. Pedersen.
Generic Application Programming Interface (API) for Sliding Window FEC Codes, November 2018, pp. 1-23, Internet Research Task Force - Working document of the Network Coding Research Group (NWCRG), draft-roca-nwcrg-generic-fec-api-04 (work in progress), https://datatracker.ietf.org/doc/draft-roca-nwcrg-generic-fec-api/.
https://hal.inria.fr/hal-01630138 -
39V. Roca, I. Swett, M.-J. Montpetit.
Sliding Window Random Linear Code (RLC) Forward Erasure Correction (FEC) Schemes for QUIC, June 2018, Internet Research Task Force, Coding for Efficient Network Communications Research Group (NWCRG) document, work in progress, https://datatracker.ietf.org/doc/draft-roca-nwcrg-rlc-fec-scheme-for-quic/.
https://hal.inria.fr/hal-01919876 -
40V. Roca, B. Teibi.
Sliding Window Random Linear Code (RLC) Forward Erasure Correction (FEC) Schemes for FECFRAME, September 2018, pp. 1-25, Working document of the TSVWG (Transport Area Working Group) group of IETF (Internet Engineering Task Force), draft-ietf-tsvwg-rlc-fec-scheme-09 (work in progress), https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rlc-fec-scheme/.
https://hal.inria.fr/hal-01630089 -
41I. Swett, M.-J. Montpetit, V. Roca.
Coding for QUIC, June 2018, Internet Research Task Force, Coding for Efficient Network Communications Research Group (NWCRG) document, work in progress, https://datatracker.ietf.org/doc/draft-swett-nwcrg-coding-for-quic/.
https://hal.inria.fr/hal-01919858