Sébastien Gambs

Orcid: 0000-0002-7326-7377

According to our database1, Sébastien Gambs authored at least 97 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Membership inference attack for beluga whales discrimination.
Ecol. Informatics, March, 2024

PANORAMIA: Privacy Auditing of Machine Learning Models without Retraining.
CoRR, 2024

2023
Improving fairness generalization through a sample-robust optimization method.
Mach. Learn., June, 2023

On the Risks of Collecting Multidimensional Data Under Local Differential Privacy.
Proc. VLDB Endow., 2023

SoK: Taming the Triangle - On the Interplays between Fairness, Interpretability and Privacy in Machine Learning.
CoRR, 2023

Data privacy for Mobility as a Service.
CoRR, 2023

Crypto'Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning.
CoRR, 2023

Revealing the True Cost of Local Privacy: An Auditing Perspective.
CoRR, 2023

Probabilistic Dataset Reconstruction from Interpretable Models.
CoRR, 2023

RSSI-Based Fingerprinting of Bluetooth Low Energy Devices.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Confidential-PROFITT: Confidential PROof of FaIr Training of Trees.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Leveraging In-Network Computing for Privacy-Aware Real-Time Surveillance mHealth Applications.
Proceedings of the IEEE Global Communications Conference, 2023

Frequency Estimation of Evolving Data Under Local Differential Privacy.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

SNAKE Challenge: Sanitization Algorithms under Attack.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Machine-Learning Approach for Automatic Detection of Wild Beluga Whales from Hand-Held Camera Pictures.
Sensors, 2022

PROBONITE : PRivate One-Branch-Only Non-Interactive decision Tree Evaluation.
IACR Cryptol. ePrint Arch., 2022

Exploiting Fairness to Enhance Sensitive Attributes Reconstruction.
CoRR, 2022

Fair mapping.
CoRR, 2022

Washing The Unwashable : On The (Im)possibility of Fairwashing Detection.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python.
Proceedings of the Computer Security - ESORICS 2022, 2022

Leveraging Integer Linear Programming to Learn Optimal Fair Rule Lists.
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2022

2021
Growing synthetic data through differentially-private vine copulas.
Proc. Priv. Enhancing Technol., 2021

Local Data Debiasing for Fairness Based on Generative Adversarial Training.
Algorithms, 2021

Characterizing the risk of fairwashing.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

FairCORELS, an Open-Source Library for Learning Fair Rule Lists.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial Networks.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Model extraction from counterfactual explanations.
CoRR, 2020

Online publication of court records: circumventing the privacy-transparency trade-off.
CoRR, 2020

DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks.
CoRR, 2020

Publication of Court Records: Circumventing the Privacy-Transparency Trade-Off.
Proceedings of the AI Approaches to the Complexity of Legal Systems XI-XII, 2020

2019
GAMIN: An Adversarial Approach to Black-Box Model Inversion.
CoRR, 2019

Learning Fair Rule Lists.
CoRR, 2019

Agnostic data debiasing through a local sanitizer learnt from an adversarial network approach.
CoRR, 2019

IOTFLA : A Secured and Privacy-Preserving Smart Home Architecture Implementing Federated Learning.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Fairwashing: the risk of rationalization.
Proceedings of the 36th International Conference on Machine Learning, 2019

Inspect What Your Location History Reveals About You: Raising user awareness on privacy threats associated with disclosing his location data.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Anonymization methods and inference attacks: theory and practice (NII Shonan Meeting 2018-5).
NII Shonan Meet. Rep., 2018

Privacy-preserving Wi-Fi Analytics.
Proc. Priv. Enhancing Technol., 2018

Optimal noise functions for location privacy on continuous regions.
Int. J. Inf. Sec., 2018

Privacy and Ethical Challenges in Big Data.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Entwining Sanitization and Personalization on Databases.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

2016
Differential Privacy Models for Location-Based Services.
Trans. Data Priv., 2016

Heterogeneous Differential Privacy.
J. Priv. Confidentiality, 2016

Novel differentially private mechanisms for graphs.
IACR Cryptol. ePrint Arch., 2016

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Edge-calibrated noise for differentially private mechanisms on graphs.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Private eCash in Practice (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social Networks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Sanitization of Call Detail Records via Differentially-Private Bloom Filters.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

The Not-so-Distant Future: Distance-Bounding Protocols on Smartphones.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Towards privacy-driven design of a dynamic carpooling system.
Pervasive Mob. Comput., 2014

A Privacy-Preserving NFC Mobile Pass for Transport Systems.
EAI Endorsed Trans. Mob. Commun. Appl., 2014

De-anonymization attack on geolocated data.
J. Comput. Syst. Sci., 2014

Prover Anonymous and Deniable Distance-Bounding Authentication.
IACR Cryptol. ePrint Arch., 2014

The Crypto-democracy and the Trustworthy.
CoRR, 2014

PROPS: A PRivacy-Preserving Location Proof System.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

The Crypto-Democracy and the Trustworthy (Position Paper).
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Challenging Differential Privacy: The Case of Non-interactive Mechanisms.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
On the Power of the Adversary to Solve the Node Sampling Problem.
Trans. Large Scale Data Knowl. Centered Syst., 2013

Quantum speed-up for unsupervised learning.
Mach. Learn., 2013

A Privacy-Preserving Contactless Transport Service for NFC Smartphones.
Proceedings of the Mobile Computing, Applications, and Services, 2013

MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

2012
P3ERS: Privacy-Preserving PEer Review System.
Trans. Data Priv., 2012

Inference Attacks on Geolocated Data.
ERCIM News, 2012

On Dynamic Distributed Computing
CoRR, 2012

BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Scalable and Secure Polling in Dynamic Distributed Networks.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Next place prediction using mobility Markov chains.
Proceedings of the First Workshop on Measurement, Privacy, and Mobility, 2012

SlopPy: Slope One with Privacy.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Reconstruction Attack through Classifier Analysis.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

The Challenges Raised by the Privacy-Preserving Identity Card.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Locanyms: towards privacy-preserving location-based services.
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012

AMORES: an architecture for mobiquitous resilient systems.
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012

Maintaining Sovereignty over Personal Data in Social Networking Sites.
Proceedings of the Managing Privacy through Accountability., 2012

2011
Show Me How You Move and I Will Tell You Who You Are.
Trans. Data Priv., 2011

Scalable and Secure Aggregation in Distributed Networks
CoRR, 2011

An optimal quantum algorithm to approximate the mean and its application for approximating the median of a set of points over an arbitrary distance
CoRR, 2011

Private Similarity Computation in Distributed Systems: From Cryptography to Differential Privacy.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

A comparative privacy analysis of geosocial networks.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011

From SSIR to CIDre: A New Security Research Group in Rennes, France.
Proceedings of the First SysSec Workshop 2011, 2011

Characterizing the Adversarial Power in Uniform and Ergodic Node Sampling.
Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing 2011, 2011

2010
A Proposal for a Privacy-preserving National Identity Card.
Trans. Data Priv., 2010

Uniform and Ergodic Sampling in Unstructured Peer-to-Peer Systems with Malicious Nodes.
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010

GEPETO: A GEoPrivacy-Enhancing TOolkit.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Towards a Privacy-Enhanced Social Networking Site.
Proceedings of the ARES 2010, 2010

2009
UPP: User Privacy Policy for Social Networking Sites.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009

Towards a Privacy-Preserving National Identity Card.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

2008
Quantum classification
CoRR, 2008

2007
Privacy-preserving boosting.
Data Min. Knowl. Discov., 2007

Quantum clustering algorithms.
Proceedings of the Machine Learning, 2007

Anonymous Quantum Communication - (Extended Abstract).
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Anonymous Quantum Communication.
Proceedings of the Advances in Cryptology, 2007

2006
Machine Learning in a Quantum World.
Proceedings of the Advances in Artificial Intelligence, 2006

2002
CLARISSE: A Machine Learning Tool to Initialize Student Models.
Proceedings of the Intelligent Tutoring Systems, 6th International Conference, 2002


  Loading...