|
Breaking BAD? Better Call SAUL! -- Breaking and Fixing Bloom Filters with Added Diffusion
|
Artifact: Available
|
|
Frequency Estimation of Correlated Multi-attribute Data under Local Differential Privacy
|
Artifact: Available, Functional, Reproduced
|
|
Preserving Target Distributions With Differentially Private Count Mechanisms
|
Artifact: Available, Functional, Reproduced
|
|
Analyzing Societal Awareness and Perception of Digital Fingerprinting and Fingerprinting Countermeasures
|
Artifact: Available, Functional
|
|
Privacy Bias in LLMs: A Contextual Integrity-based Auditing Metric
|
Artifact: Available, Functional, Reproduced
|
|
Clicking into Exposure: Uncovering Privacy Risks of Google Click Identifier in YouTube Ads
|
Artifact: Available, Functional, Reproduced
|
|
CoinJoin ecosystem insights for Wasabi 1.x, Wasabi 2.x and Whirlpool coordinator-based privacy mixers
|
Artifact: Available, Functional, Reproduced
|
|
Secure Change-Point Detection for Time Series under Homomorphic Encryption
|
Artifact: Available, Functional, Reproduced
|
|
Exercising the CCPA Opt-out Right on Android: Legally Mandated but Practically Challenging
|
Artifact: Available, Functional
|
|
AI-in-the-Loop: Privacy Preserving Real-Time Scam Detection and Conversational Scambaiting by Leveraging LLMs and Federated Learning
|
Artifact: Available
|
|
Cryptographically-Secured Domain Validation
|
Artifact: Available, Functional, Reproduced
|
|
Obscura: Enabling Ephemeral Proxies for Traffic Encapsulation in WebRTC Media Streams Against Cost-Effective Censors
|
Artifact: Available, Functional
|
|
Are we collaborative yet? A Usability Perspective on Mixnet Latency for Real-Time Applications
|
Artifact: Available, Functional
|
|
What-App? App usage detection using encrypted LTE/5G traffic
|
Artifact: Available, Functional
|
|
CURE: Privacy-Preserving Split Learning Done Right
|
Artifact: Available, Functional
|
|
Analysis and Attacks on the Reputation System of Nym
|
Artifact: Available, Functional, Reproduced
|
|
SentinelTouch: A Lightweight Privacy-Preserving Biometric-Fingerprinting Authentication and Identification System Based on Neural Networks and Homomorphic Encryption
|
Artifact: Available, Functional, Reproduced
|
|
Humanitarian Aid Distribution with Privacy-Preserving Assessment Capabilities
|
Artifact: Available, Functional, Reproduced
|
|
Gryphes: Hybrid Proofs for Modular SNARKs with Applications to zkRollups
|
Artifact: Available, Functional, Reproduced
|
|
Pantomime: Motion Data Anonymization Using Foundation Motion Models
|
Artifact: Available
|
|
Privacy by Voice: Designing Usable Privacy Notices for the Voice Interface
|
Artifact: Available
|
|
tigro: Trust Infrastructure for Grassroots Organizing via Grounded Digital Annotations
|
Artifact: Available
|
|
Multi-Party Private Join
|
Artifact: Available, Functional, Reproduced
|
|
Privacy vs. Profit: The Impact of Google's Manifest Version 3 (MV3) Update on Ad Blocker Effectiveness
|
Artifact: Available, Functional, Reproduced
|
|
“I Just Press Allow”: Understanding Privacy Practices of New Internet Users in Urban India
|
Artifact: Available
|
|
Website fingerprinting on Nym: Attacks and Defenses
|
Artifact: Available, Functional, Reproduced
|
|
HyperVerITAS: Verifying Image Transformations at Scale on Boolean Hypercubes
|
Artifact: Available, Functional
|
|
SoK: Can Fully Homomorphic Encryption Support General AI Computation? A Functional and Cost Analysis
|
Artifact: Available, Functional
|