Pélissier, Samuel Cunche, Mathieu
Wi-Fi stands out as one of the most prominent and widespread wireless technologies in use today. Smartphones and various other Wi-Fi-enabled devices employ management frames called probe-requests to discover nearby networks.In this study, we reveal that it is possible to fingerprint based on the probe-requests they emit while connected to a network...
Bauchard, L Tuncer, D
This poster presents the first steps towards a data-driven methodology to design material for raising awareness on personal data collection and use by smartphone apps for mobility services (e.g., trip planning). Through an online survey, we collected a sample of 300 responses from regular users of these apps in the Paris region, in France, who shar...
de Oliveira, Daniel Pacitti, Esther
As nuvens de computadores fornecem um ambiente sob demanda que permite aos usuários executar seus workflows locais em um ambiente elástico e com alta disponibilidade. Diversas aplicac ¸ões podem ser modeladas como workflows, e muitas delas são intensivas em computac ¸ão e produc ¸ão de dados. Na nuvem, o local de armazenamento desses dados se torna...
Hammond, Eliza Burdon, Mark
Menstrual cycle tracking applications (‘apps’) are smartphone or tablet apps that allow users to log data pertaining to their period. Using a lens of privacy focussed on intimacy, it will be argued that the control-based harms and intimate harms emerging from these apps require moving from an information privacy law model based on control to one th...
Kautz, Mathias Hammi, Badis Garcia-Alfaro, Joaquin
The development and testing of new applications in Cooperative Intelligent Transportation Systems (C-ITS) environments, which rely on Vehicle-to-Everything (V2X) communication, is frequently supported through simulations. Nevertheless, most of existing simulators are either outdated or do not consider the latest adopted standards. Especially, the s...
Lamare, Marine
Cet article entend questionner l’utilité du droit d’accès aux images. Ce dernier fut souvent mis en avant par les élus locaux lorsqu’ils ont décidéd’installer des caméras dites « vidéosurveillances » ou « vidéoprotections » à Lyon, Grenoble et dans les villes avoisinantes. Si ce droit est présentécomme protecteur des droits de l’homme et des libert...
Makhlouf, Karima
This dissertation explores the intersection of privacy, fairness, and causality within the realm of machine learning (ML) and data-driven decision-making. The dissertation's main contributions can be summarized as follows: (1) we investigate the applicability of statistical and causality-based fairness notions in diverse application domains, evalua...
Félix, Lucas Kouam, Anne Josiane Carneiro Viana, Aline Achir, Nadjib Almeida, Jussara
International audience
Enríquez, Luis
Information security is deeply linked to data protection law, because an ineffective security implementation can lead to personal data breaches. The GDPR is based on a risk-based approach for the protection of the rights and freedoms of the data subjects, meaning that risk management is the mechanism for protecting fundamental rights. However, the ...
Brahem, Mariem Watissee, Jasmine Eichler, Cédric Boiret, Adrien Anciaux, Nicolas Maria de Fuentes, Jose
The advanced inference capabilities of Large Language Models (LLMs) pose a significant threat to the privacy of individuals by enabling third parties to accurately infer certain personal attributes (such as gender, age, location, religion, and political opinions) from their writings. Paradoxically, LLMs can also be used to protect individuals by he...