Results

Results obtained from PETS 2023 proceedings.

Title Artifact URL
DeepSE-WF: Unified Security Estimation for Website Fingerprinting Defenses artifact
RPM: Robust Anonymity at Scale artifact
iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications artifact
RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks artifact
Evaluating practical QUIC website fingerprinting defenses for the masses artifact
Data-Explainable Website Fingerprinting with Network Simulation artifact
On the Privacy Risks of Deploying Recurrent Neural Networks in Machine Learning Models artifact
Differentially Private Simple Genetic Algorithms artifact
Towards Sentence Level Inference Attack Against Pre-trained Language Models artifact
Heads in the Clouds? Measuring Universities’ Migration to Public Clouds: Implications for Privacy & Academic Freedom artifact
Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning artifact
Private Collection Matching Protocols artifact
Secure and Accurate Summation of Many Floating-Point Numbers artifact
VESPo: Verified Evaluation of Secret Polynomials, with application to dynamic proofs of retrievability artifact
Strengthening Privacy-Preserving Record Linkage using Diffusion artifact
SoK: Membership Inference is Harder Than we Previously Thought artifact
Exploring the Privacy Risks of Adversarial VR Game Design artifact
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures artifact
Attribute-based Single Sign-On. Secure, Private, and Efficient artifact
Understanding Person Identification Through Gait artifact
Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees artifact
Data Security on the Ground: Investigating Technical and Legal Requirements under the GDPR artifact
GDPRxiv: Establishing the State of the Art in GDPR Enforcement artifact
Lox: Protecting the Social Graph in Bridge Distribution artifact
Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance artifact
Designing a Location Trace Anonymization Contest artifact
Robust Fingerprint of Privacy-Preserving Location Trajectories artifact
Privacy-Aware Adversarial Network in Human Mobility Prediction artifact
Creative beyond TikToks: Investigating Adolescents’ Social Privacy Management on TikTok artifact
On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents artifact
Private Sampling with Identifiable Cheaters artifact
Convolutions in Overdrive: Maliciously Secure Convolutions for MPC artifact
Ruffle: Rapid 3-Party Shuffle Protocols artifact
Verifiable Distributed Aggregation Functions artifact
Story Beyond the Eye: Glyph Positions Break PDF Text Redaction artifact
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks artifact
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System artifact
StyleID: Identity Disentanglement for Anonymizing Faces artifact
Two-Cloud Private Read Alignment to a Public Reference Genome artifact
Compact and Divisible E-Cash with Threshold Issuance artifact
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data artifact
Private Graph Extraction via Feature Explanations artifact
Usability and Enforceability of Global Privacy Control artifact
Blocking JavaScript without Breaking the Web: An Empirical Investigation artifact
On the Robustness of Topics API to a Re-Identification Attack artifact
Your DRM Can Watch You Too: Exploring the Privacy Implications of Browsers (mis)Implementations of Widevine EME artifact
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries artifact
Attacks on Encrypted Response-Hiding Range Search Schemes in Multiple Dimensions artifact
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval artifact
DPrio: Efficient Differential Privacy with High Utility for Prio artifact
A Unified Framework for Quantifying Privacy Risk in Synthetic Data artifact
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks artifact
"Revoked just now!"Users' Behaviors Toward Fitness-Data Sharing with Third-Party Applications artifact