Sébastien Gambs
Orcid: 0000-0002-7326-7377
According to our database1,
Sébastien Gambs
authored at least 104 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
Ecol. Informatics, March, 2024
Revealing the True Cost of Locally Differentially Private Protocols: An Auditing Perspective.
Proc. Priv. Enhancing Technol., 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation.
Proceedings of the Computer Security - ESORICS 2024, 2024
Crypto'Graph: Leveraging Privacy-Preserving Distributed Link Prediction for Robust Graph Learning.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
Mach. Learn., June, 2023
Proc. VLDB Endow., 2023
SoK: Taming the Triangle - On the Interplays between Fairness, Interpretability and Privacy in Machine Learning.
CoRR, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Leveraging In-Network Computing for Privacy-Aware Real-Time Surveillance mHealth Applications.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
2022
Machine-Learning Approach for Automatic Detection of Wild Beluga Whales from Hand-Held Camera Pictures.
Sensors, 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python.
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Algorithms, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial Networks.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Online publication of court records: circumventing the privacy-transparency trade-off.
CoRR, 2020
DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks.
CoRR, 2020
Proceedings of the AI Approaches to the Complexity of Legal Systems XI-XII, 2020
2019
Agnostic data debiasing through a local sanitizer learnt from an adversarial network approach.
CoRR, 2019
IOTFLA : A Secured and Privacy-Preserving Smart Home Architecture Implementing Federated Learning.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 36th International Conference on Machine Learning, 2019
Inspect What Your Location History Reveals About You: Raising user awareness on privacy threats associated with disclosing his location data.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
2018
Anonymization methods and inference attacks: theory and practice (NII Shonan Meeting 2018-5).
NII Shonan Meet. Rep., 2018
Int. J. Inf. Sec., 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social Networks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
2014
Pervasive Mob. Comput., 2014
EAI Endorsed Trans. Mob. Commun. Appl., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014
Private Asymmetric Fingerprinting: A Protocol with Optimal Traitor Tracing Using Tardos Codes.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Trans. Large Scale Data Knowl. Centered Syst., 2013
Proceedings of the Mobile Computing, Applications, and Services, 2013
MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013
2012
BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the First Workshop on Measurement, Privacy, and Mobility, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012
Proceedings of the Managing Privacy through Accountability., 2012
2011
An optimal quantum algorithm to approximate the mean and its application for approximating the median of a set of points over an arbitrary distance
CoRR, 2011
Private Similarity Computation in Distributed Systems: From Cryptography to Differential Privacy.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011
Proceedings of the First SysSec Workshop 2011, 2011
Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing 2011, 2011
2010
Uniform and Ergodic Sampling in Unstructured Peer-to-Peer Systems with Malicious Nodes.
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
2008
2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
2006
Proceedings of the Advances in Artificial Intelligence, 2006
2002
Proceedings of the Intelligent Tutoring Systems, 6th International Conference, 2002