Tracker Installations Are Not Created Equal: Understanding Tracker Configuration of Form Data Collection
|
Artifact: Available
|
Understanding Regional Filter Lists: Efficacy and Impact
|
Artifact: Available, Functional
|
Sheep's clothing, wolfish impact: Automated detection and evaluation of problematic 'allowed' advertisements
|
Artifact: Available, Functional
|
Automating Governing Knowledge Commons and Contextual Integrity (GKC-CI) Privacy Policy Annotations with Large Language Models
|
Artifact: Available, Functional
|
RPKI-based Location-Unaware Tor Guard Relay Selection Algorithms
|
Artifact: Available, Functional
|
The Last Hop Attack: Why Loop Cover Traffic over Fixed Cascades Threatens Anonymity
|
Artifact: Available, Functional, Reproduced
|
Time-Efficient Locally Relevant Geo-Location Privacy Protection
|
Artifact: Available, Functional
|
SoK: Descriptive Statistics Under Local Differential Privacy
|
Artifact: Available, Functional, Reproduced
|
Efficient Verifiable Differential Privacy with Input Authenticity in the Local and Shuffle Model
|
Artifact: Available, Functional, Reproduced
|
Optimal Piecewise-based Mechanism for Collecting Bounded Numerical Data under Local Differential Privacy
|
Artifact: Available, Functional, Reproduced
|
SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research
|
Artifact: Available, Functional, Reproduced
|
Identifying Privacy Personas
|
Artifact: Available
|
Echoes of Privacy: Uncovering the Profiling Practices of Voice Assistants
|
Artifact: Available, Functional
|
Improved Open-World Fingerprinting Increases Threat to Streaming Video Privacy but Realistic Scenarios Remain Difficult
|
Artifact: Available
|
Buy it Now, Track Me Later: Attacking User Privacy via Wi-Fi AP Online Auctions
|
Artifact: Available
|
Towards Privacy-preserving and Fairness-aware Federated Learning Framework
|
Artifact: Available
|
Unveiling Client Privacy Leakage from Public Dataset Usage in Federated Distillation
|
Artifact: Available, Functional, Reproduced
|
Low-Cost Privacy-Preserving Decentralized Learning
|
Artifact: Available
|
AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning
|
Artifact: Available
|
Panopticon: The Design and Evaluation of a Game that Teaches Data Science Students Designing Privacy
|
Artifact: Available
|
Defining Privacy Engineering as a Profession
|
Artifact: Available
|
"Do It to Know It": Reshaping the Privacy Mindset of Computer Science Undergraduates
|
Artifact: Available, Functional
|
DB-PAISA: Discovery-Based Privacy-Agile IoT Sensing+Actuation
|
Artifact: Available, Functional
|
PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps
|
Artifact: Available, Functional, Reproduced
|
WatchWitch: Interoperability, Privacy, and Autonomy for the Apple Watch
|
Artifact: Available, Functional
|
Janus: Fast Privacy-Preserving Data Provenance For TLS
|
Artifact: Available, Functional, Reproduced
|
Path to Encrypted DNS with DDR: Adoption, Configuration Patterns, and Privacy Implications
|
Artifact: Available
|
Akeso: Bringing Post-Compromise Security to Cloud Storage
|
Artifact: Available
|
TEEMS: A Trusted Execution Environment based Metadata-protected Messaging System
|
Artifact: Available, Functional, Reproduced
|
Message Authentication Code with Fast Verification over Encrypted Data and Applications
|
Artifact: Available, Functional
|
Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware
|
Artifact: Available
|
BehaVR: User Identification Based on VR Sensor Data
|
Artifact: Available
|
How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users
|
Artifact: Available
|
Intractable Cookie Crumbs: Unveiling the Nexus of Stateful Banner Interaction and Tracking Cookies
|
Artifact: Available, Functional
|
Onion-Location Measurements and Fingerprinting
|
Artifact: Available, Functional, Reproduced
|
Beyond the Request: Harnessing HTTP Response Headers for Cross-Browser Web Tracker Classification in an Imbalanced Setting
|
Artifact: Available
|
Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services
|
Artifact: Available, Functional, Reproduced
|
SoK: Truncation Untangled: Scaling Fixed-Point Arithmetic for Privacy-Preserving Machine Learning to Large Models and Datasets
|
Artifact: Available, Functional, Reproduced
|
SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models
|
Artifact: Available, Functional
|
Achieving Data Reconstruction Hardness and Efficient Computation in Multiparty Minimax Training
|
Artifact: Available
|
PIGEON: A High Throughput Framework for Private Inference of Neural Networks using Secure Multiparty Computation
|
Artifact: Available, Functional, Reproduced
|
Differentially Private Release of Hierarchical Origin/Destination Data with a TopDown Approach
|
Artifact: Available, Functional, Reproduced
|
Locally Differentially Private Frequency Estimation via Joint Randomized Response
|
Artifact: Available, Functional, Reproduced
|
Estimating Group Means Under Local Differential Privacy
|
Artifact: Available, Functional, Reproduced
|
Understanding Privacy Norms through Web Forms
|
Artifact: Available, Functional, Reproduced
|
Learning Privacy from Visual Entities
|
Artifact: Available, Functional
|
Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps
|
Artifact: Available
|
What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem
|
Artifact: Available
|
Privacy Settings of Third-Party Libraries in Android Apps: A Study of Facebook SDKs
|
Artifact: Available
|
The Impact of Default Mobile SDK Usage on Privacy and Data Protection
|
Artifact: Available
|
Improving the Performance and Security of Tor’s Onion Services
|
Artifact: Available, Functional
|
Are Neuromorphic Architectures Inherently Privacy-preserving? An Exploratory Study
|
Artifact: Available, Functional
|
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings
|
Artifact: Available, Functional
|
Private Shared Random Minimum Spanning Forests
|
Artifact: Available, Functional, Reproduced
|
Mastic: Private Weighted Heavy-Hitters and Attribute-Based Metrics
|
Artifact: Available, Functional, Reproduced
|
Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption
|
Artifact: Available, Functional
|
MProve-Nova: A Privacy-Preserving Proof of Reserves Protocol for Monero
|
Artifact: Available, Functional, Reproduced
|
Silent Splitter: Privacy for Payment Splitting via New Protocols for Distributed Point Functions
|
Artifact: Available
|
GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models
|
Artifact: Available, Functional
|
A non-comparison oblivious sort and its application to private k-NN
|
Artifact: Available, Functional, Reproduced
|
MultiCent: Secure and Scalable Computation of Centrality Measures on Multilayer Graphs
|
Artifact: Available, Functional, Reproduced
|
WaKA: Data Attribution using K-Nearest Neighbors and Membership Privacy Principles
|
Artifact: Available
|
Aimless Onions: Mixing without Topology Information
|
Artifact: Available, Functional, Reproduced
|
Real-world Deniability in Messaging
|
Artifact: Available, Functional, Reproduced
|
Enhancing Metric Privacy With a Shuffler
|
Artifact: Available, Functional, Reproduced
|
Non-Interactive Verifiable Aggregation
|
Artifact: Available
|
Stochastic Models for Remote Timing Attacks
|
Artifact: Available, Functional, Reproduced
|
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy
|
Artifact: Available, Functional, Reproduced
|
More and Scammier Ads: The Perils of YouTube's Ad Privacy Settings
|
Artifact: Available
|
Navigating Social Media Privacy: Awareness, Preferences, and Discoverability
|
Artifact: Available, Functional, Reproduced
|
Making Web Applications GDPR Compliant: A Comparative Evaluation of GDPR-Enforcement Frameworks
|
Artifact: Available
|
Johnny Can't Revoke Consent Either: Measuring Compliance of Consent Revocation on the Web
|
Artifact: Available, Functional
|
Meta-Learn to Unlearn: Enhanced Exact Machine Unlearning in Recommendation Systems with Meta-Learning
|
Artifact: Available
|
Vote&Check: Secure Postal Voting with Reduced Trust Assumptions
|
Artifact: Available, Functional, Reproduced
|
Does Coding Style Really Survive Compilation? Stylometry of Executable Code Revisited
|
Artifact: Available, Functional
|
PrePaMS: Privacy-Preserving Participant Management System for Studies with Rewards and Prerequisites
|
Artifact: Available, Functional, Reproduced
|
Wave Hello to Privacy - Efficient Mixed-Mode MPC using Wavelet Transforms
|
Artifact: Available
|
Okay Google, Where’s My Tracker? Security, Privacy, and Performance Evaluation of Google’s Find My Device Network
|
Artifact: Available, Functional, Reproduced
|
An Analysis of Censorship Bias in LLMs
|
Artifact: Available
|
DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech
|
Artifact: Available, Functional
|
Robust and Efficient Watermarking of Large Language Models Using Error Correction Codes
|
Artifact: Available, Functional
|
HyDia: FHE-based Facial Matching with Hybrid Approximations and Diagonalization
|
Artifact: Available, Functional, Reproduced
|
EpiOracle: Privacy-Preserving Cross-Facility EarlyWarning for Unknown Epidemics
|
Artifact: Available, Functional, Reproduced
|
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems
|
Artifact: Available
|
AlphaFL: Secure Aggregation with Malicious² Security for Federated Learning against Dishonest Majority
|
Artifact: Available, Functional, Reproduced
|
Noiseless Privacy-Preserving Decentralized Learning
|
Artifact: Available, Functional
|
Topology-Based Reconstruction Prevention for Decentralised Learning
|
Artifact: Available, Functional, Reproduced
|
OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms
|
Artifact: Available, Functional, Reproduced
|
VIMz: Private Proofs of Image Manipulation using Folding-based zkSNARKs
|
Artifact: Available, Functional, Reproduced
|
Client-Efficient Online-Offline Private Information Retrieval
|
Artifact: Available, Functional, Reproduced
|
Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols
|
Artifact: Available
|
PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks
|
Artifact: Available, Functional, Reproduced
|
Sybil-Resistant Parallel Mixnets
|
Artifact: Available, Functional, Reproduced
|
Estimating Group Means Under Local Differential Privacy
|
Artifact: Available, Functional, Reproduced
|
Who’s Watching You Zoom? Investigating Privacy of Third-Party Zoom Apps
|
Artifact: Available
|
PGUP: Pretty Good User Privacy for 5G-enabled Secure Mobile Communication Protocols
|
Artifact: Available, Functional, Reproduced
|
DiffPrivate: Facial Privacy Protection with Diffusion Models
|
Artifact: Available, Functional
|
Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage
|
Artifact: Available, Functional
|
Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF
|
Artifact: Available, Functional
|