Skip to Main content Skip to Navigation

hal-01242268v1  Journal articles
Sébastien GambsMarc-Olivier KillijianMiguel Nuñez del Prado Cortez. De-anonymization attack on geolocated data
Journal of Computer and System Sciences, Elsevier, 2014, 80 (8), pp.1597-1614. ⟨10.1016/j.jcss.2014.04.024⟩
hal-01181254v1  Conference papers
Suranga SeneviratneFangzhou JiangMathieu CuncheAruna Seneviratne. SSIDs in the Wild: Extracting Semantic Information from WiFi SSIDs
The 40th IEEE Conference on Local Computer Networks (LCN), Oct 2015, Clearwater Beach, Florida, United States
hal-00768441v1  Conference papers
Mingqiang XuePanagiotis KarrasChedy RaïssiPanos KalnisHung Keng Pung. Delineating social network data anonymization via random edge perturbation
CIKM - 21st ACM International Conference on Information and Knowledge Management - 2012, Oct 2012, Maui, United States
hal-00768428v1  Conference papers
Mingqiang XuePanagiotis KarrasChedy RaïssiJaideep VaidyaKian-Lee Tan. Anonymizing set-valued data by nonreciprocal recoding
KDD - The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - 2012, Aug 2012, Beijing, China
hal-01380768v1  Conference papers
Gábor György GulyásBenedek SimonSándor Imre. An Efficient and Robust Social Network De-anonymization Attack
Workshop on Privacy in the Electronic Society, Oct 2016, Vienna, Austria. ⟨10.1145/2994620.2994632⟩
hal-02996034v1  Journal articles
Bizhan Alipour PijaniAbdessamad ImineMichaël Rusinowitch. Inferring attributes with picture metadata embeddings
ACM SIGAPP applied computing review : a publication of the Special Interest Group on Applied Computing, Association for Computing Machinery (ACM), 2020, 20 (2), pp.36-45. ⟨10.1145/3412816.3412819⟩
hal-03097047v3  Conference papers
Mariem BrahemGuillaume ScerriNicolas AnciauxValerie Issarny. Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation
PerCom 2021 - IEEE International Conference on Pervasive Computing and Communications, Mar 2021, Kassel / Virtual, Germany
hal-01420968v1  Books
Daniel Le MétayerSourya Joyee De. Privacy Risk Analysis
Elisa Bertino; Ravi Sandhu. Morgan & Claypool Publishers, 8 (3), pp.133, 2016, Synthesis Lectures on Information Security, Privacy, and Trust, 9781627054256. ⟨10.2200/S00724ED1V01Y201607SPT017⟩
hal-01575519v2  Reports
Célestin MatteMathieu CuncheVincent Toubiana. Does disabling Wi-Fi prevent my smartphone from sending Wi-Fi frames?
[Research Report] RR-9089, Inria - Research Centre Grenoble – Rhône-Alpes; INSA Lyon. 2017
hal-00537557v1  Conference papers
Yann BusnelPatricia Serrano-AlvaradoPhilippe Lamarre. Trust your Social Network According to Satisfaction, Reputation and Privacy
3rd ACM Workshop on Reliability, Availability and Security, Jul 2010, Zurich, Swaziland. pp.1
hal-02166181v1  Conference papers
Mathieu CuncheDaniel Le MétayerVictor Morel. A Generic Information and Consent Framework for the IoT
TRUSTCOM 2019 - 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Aug 2019, Rotorua, New Zealand. pp.1-8
hal-00711609v2  Conference papers
Nicolas HadererMiguel Nuñez del Prado CortezRomain RouvoyMarc-Olivier KillijianMatthieu Roy. Campagne de collecte de données et vie privée
3ème Journées du GDR CNRS GPL, Jun 2012, Rennes, France. pp.253-254
inria-00325945v1  Conference papers
Nicolas AnciauxMehdi BenzineLuc BouganimPhilippe PucheralDennis Shasha. Querying and Aggregating Visible and Hidden Data Without Leaks
Journées Bases de Données Avancées, BDA, Oct 2007, Marseille, France
hal-00747833v1  Conference papers
Mathieu CuncheMohamed Ali KaafarTerence ChenRoksana BoreliAnirban Mahanti. Why are they hiding ? Study of an Anonymous File Sharing System
ESTEL-SEC - Security and Privacy Special Track of IEEE-AESS Conference in Europe about Space and Satellite Communications - 2012, Oct 2012, Rome, Italy
hal-00747825v1  Conference papers
Mathieu CuncheMohamed Ali KaafarRoksana Boreli. I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests
WoWMoM - 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks - 2012, Jun 2012, San Francisco, United States
inria-00551836v1  Conference papers
Nicolas AnciauxLuc BouganimYanli GuoPhilippe PucheralJean-Jacques Vandewalle et al.  Pluggable Personal Data Servers
Proceedings of the 2010 international conference on Management of data - SIGMOD 2010, Jun 2010, Indianapolis, Ind., United States. pp.1235-1238, ⟨10.1145/1807167.1807328⟩
hal-01149946v1  Conference papers
Fabien GandonNorman Sadeh. Connaissance du Contexte, Confidentialité et Accès Mobiles : une Approche Web Sémantique et Multi-agents
Journées Francophones: Mobilité et Ubiquité 2004, Jun 2004, Sophia Antipolis, France
hal-01149755v1  Conference papers
Mithun SheshagiriNorman SadehFabien Gandon. Using Semantic Web Services for Context-Aware Mobile Applications
MobiSys 2004 Workshop on Context Awareness, Jun 2004, Boston, United States
hal-01146447v1  Conference papers
Fabien GandonNorman Sadeh. A Semantic E-Wallet to Reconcile Privacy and Context Awareness
2nd International Semantic Web Conference (ISWC2003), Oct 2003, Sanibel Island, United States. ⟨10.1007/978-3-540-39718-2_25⟩
hal-01149747v1  Conference papers
Nancy MillerGlenn JuddUrs HengartnerFabien GandonPeter Steenkiste et al.  Context-aware computing using a shared contextual information service
Advances in Pervasive Computing. A Collection of Contributions Presented at the 2nd International Conference on Pervasive Computing (Pervasive 2004), Austrian Computer Society (OCG), Apr 2004, Vienna, Austria
lirmm-00430642v1  Book sections
Verma NischalFrançois TroussetPascal PonceletFlorent Masseglia. Intrusion Detections in Collaborative Organizations by Preserving Privacy
Fabrice Guillet and Gilbert Ritschard and Djamel Abdelkader Zighed and Henri Briand. Advances in Knowledge Discovery and Management, 292, Springer, pp.235-247, 2010, Studies in Computational Intelligence, 978-3-642-00579-4. ⟨10.1007/978-3-642-00580-0_14⟩
tel-01425638v1  Theses
Athanasia Katsouraki. Sharing and Usage Control of Personal Information
Databases [cs.DB]. Université Paris Saclay, 2016. English. ⟨NNT : 2016SACLV089⟩
hal-00858324v1  Conference papers
Mathieu Cunche. I know your MAC Address: Targeted tracking of individual using Wi-Fi
International Symposium on Research in Grey-Hat Hacking - GreHack, Nov 2013, Grenoble, France
hal-02920663v1  Conference papers
Othmane El OmriAymen BoudguigaMalika IzabachèneWitold Klaudel. Privacy-Preserving k-means Clustering: an Application to Driving Style Recognition
13th International Conference on Network and System Security, Dec 2018, Saporo, Japan. pp.685-696, ⟨10.1007/978-3-030-36938-5_43⟩