Yves-Alexandre de Montjoye
Orcid: 0000-0002-2559-5616
According to our database1,
Yves-Alexandre de Montjoye
authored at least 48 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting.
Proc. Priv. Enhancing Technol., 2024
QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models.
CoRR, 2024
Did the Neurons Read your Book? Document-level Membership Inference for Large Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
Nat. Mac. Intell., May, 2023
Detrimental network effects in privacy: A graph-theoretic model for node-based intrusions.
Patterns, January, 2023
IEEE Trans. Inf. Forensics Secur., 2023
CoRR, 2023
Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning.
Proceedings of the 31st USENIX Security Symposium, 2022
Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice.
Proceedings of the 31st USENIX Security Symposium, 2022
M<sup>2</sup>M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Patterns, 2021
The Observatory of Anonymity: An Interactive Tool to Understand Re-Identification Risks in 89 countries.
Proceedings of the Companion of The Web Conference 2021, 2021
2020
IEEE Trans. Big Data, 2020
Neural Comput. Appl., 2020
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
OPAL: High performance platform for large-scale privacy-preserving location data analytics.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Introduction to the Data for Refugees Challenge on Mobility of Syrian Refugees in Turkey.
Proceedings of the Guide to Mobile Data Analytics in Refugee Scenarios, 2019
2018
Proceedings of the Handbook of Mobile Data Privacy., 2018
CoRR, 2018
CoRR, 2018
Quantifying Surveillance in the Networked Age: Node-based Intrusions and Group Privacy.
CoRR, 2018
2017
Erratum to: Improving official statistics in emerging markets using machine learning and mobile phone data.
EPJ Data Sci., 2017
Improving official statistics in emerging markets using machine learning and mobile phone data.
EPJ Data Sci., 2017
Proceedings of the 12th International Workshop on Self-Organizing Maps and Learning Vector Quantization, 2017
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017
2016
2015
Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics.
CoRR, 2015
2014
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014
2013
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013
2012
2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
2009
Community Computing: Comparisons between Rural and Urban Societies Using Mobile Phone Data.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009