Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
PoPETs Proceedings — Personal information inference from voice ...
Volume: 2022 Issue: 1 Pages: 6–27 DOI: Download PDF Abstract: Through voice characteristics and manner of expression, even seemingly benign voice recordings can reveal sensitive attributes about a recorded speaker (e. g., geographical origin, health status, personality).
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
Marlene Saemann*, Daniel Theis, Tobias Urban, and Martin Degeling ...
Proceedings on Privacy Enhancing Technologies ; 2022 (4):314–331 Marlene Saemann*, Daniel Theis, Tobias Urban, and Martin Degeling
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
PoPETs Proceedings — Developers Say the Darnedest Things: Privacy ...
Volume: 2022 Issue: 4 Pages: 250–273 DOI: Download PDF Abstract: We investigate the privacy compliance processes followed by developers of child-directed mobile apps. While children’s online privacy laws have existed for decades in the US, prior research found relatively low rates of compliance.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
PoPETs Proceedings — Differentially private partition selection
Volume: 2022 Issue: 1 Pages: 339–352 DOI: https://doi.org/10.2478/popets-2022-0017 Download PDF Abstract: Many data analysis operations can be expressed as a GROUP BY query on an unbounded set of partitions, followed by a per-partition aggregation.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
Simon Koch*, Malte Wessels, Benjamin Altpeter, Madita Olvermann, and ...
Proceedings on Privacy Enhancing Technologies ; 2022 (4):486–506 Simon Koch*, Malte Wessels, Benjamin Altpeter, Madita Olvermann, and Martin Johns
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
Pika: Secure Computation using Function Secret Sharing over Rings
Pika: Secure Computation using Function Secret Sharing over Rings Authors: Sameer Wagh (Devron Corporation and UC Berkeley) Volume: 2022 Issue: 4 Pages: 351–377 DOI: Download PDF
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
Comprehensive Analysis of Privacy Leakage in Vertical Federated ...
Volume: 2022 Issue: 2 Pages: 263–281 DOI: Download PDF Abstract: Vertical federated learning (VFL), a variant of federated learning, has recently attracted increasing attention.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
Pika: Secure Computation using Function Secret Sharing over Rings
Keywords: Multi-party computation, Function Secret Shar-ing, Distributed Point Function, Schwartz-Zippel Lemma over Rings DOI 10.56553/popets-2022-0113 Received 2022-02-28; revised 2022-06-15; accepted 2022-06-16.
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
Xue Jiang*, Xuebing Zhou, and Jens Grossklags ...
Proceedings on Privacy Enhancing Technologies ; 2022 (2):263–281 Xue Jiang*, Xuebing Zhou, and Jens Grossklags
Global web icon
petsymposium.org
https://petsymposium.org/popets/2022/popets-2022-0…
PoPETs Proceedings — Keeping Privacy Labels Honest
Volume: 2022 Issue: 4 Pages: 486–506 DOI: Download PDF Abstract: At the end of 2020, Apple introduced privacy nutritional labels, requiring app developers to state what data is collected by their apps and for what purpose. In this paper, we take an in-depth look at the privacy labels and how they relate to actual transmitted data.