Yves-Alexandre de Montjoye

Orcid: 0000-0002-2559-5616

According to our database1, Yves-Alexandre de Montjoye authored at least 48 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Zero Auxiliary Knowledge Membership Inference Attack on Aggregate Location Data.
Proc. Priv. Enhancing Technol., 2024

Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting.
Proc. Priv. Enhancing Technol., 2024

QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems.
CoRR, 2024

Inherent Challenges of Post-Hoc Membership Inference for Large Language Models.
CoRR, 2024

Mosaic Memory: Fuzzy Duplication in Copyright Traps for Large Language Models.
CoRR, 2024

Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models.
CoRR, 2024

Did the Neurons Read your Book? Document-level Membership Inference for Large Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

Copyright Traps for Large Language Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

2023
Adversarial competition and collusion in algorithmic markets.
Nat. Mac. Intell., May, 2023

Detrimental network effects in privacy: A graph-theoretic model for node-based intrusions.
Patterns, January, 2023

Web Privacy: A Formal Adversarial Model for Query Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2023

Re-aligning Shadow Models can Improve White-box Membership Inference Attacks.
CoRR, 2023

Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Achilles' Heels: Vulnerable Record Identification in Synthetic Data Publishing.
Proceedings of the Computer Security - ESORICS 2023, 2023

Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning.
Proceedings of the 31st USENIX Security Symposium, 2022

Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice.
Proceedings of the 31st USENIX Security Symposium, 2022

M<sup>2</sup>M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022

QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
The risk of re-identification remains high even in country-scale location datasets.
Patterns, 2021

Dataset correlation inference attacks against machine learning models.
CoRR, 2021

The Observatory of Anonymity: An Interactive Tool to Understand Re-Identification Risks in 89 countries.
Proceedings of the Companion of The Web Conference 2021, 2021

2020
Towards Matching User Mobility Traces in Large-Scale Datasets.
IEEE Trans. Big Data, 2020

Inference of node attributes from social network assortativity.
Neural Comput. Appl., 2020

2019
UNVEIL: Capture and Visualise WiFi Data Leakages.
Proceedings of the World Wide Web Conference, 2019

When the Signal is in the Noise: Exploiting Diffix's Sticky Noise.
Proceedings of the 28th USENIX Security Symposium, 2019

Differentially Private Compressive K-means.
Proceedings of the IEEE International Conference on Acoustics, 2019

OPAL: High performance platform for large-scale privacy-preserving location data analytics.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Introduction to the Data for Refugees Challenge on Mobility of Syrian Refugees in Turkey.
Proceedings of the Guide to Mobile Data Analytics in Refugee Scenarios, 2019

2018
Modeling and Understanding Intrinsic Characteristics of Human Mobility.
Proceedings of the Handbook of Mobile Data Privacy., 2018

Mapping the Privacy-Utility Tradeoff in Mobile Phone Data for Development.
CoRR, 2018

Data for Refugees: The D4R Challenge on Mobility of Syrian Refugees in Turkey.
CoRR, 2018

When the signal is in the noise: The limits of Diffix's sticky noise.
CoRR, 2018

Quantifying Surveillance in the Networked Age: Node-based Intrusions and Group Privacy.
CoRR, 2018

2017
Erratum to: Improving official statistics in emerging markets using machine learning and mobile phone data.
EPJ Data Sci., 2017

Improving official statistics in emerging markets using machine learning and mobile phone data.
EPJ Data Sci., 2017

Improving individual predictions using social networks assortativity.
Proceedings of the 12th International Workshop on Self-Organizing Maps and Learning Vector Quantization, 2017

Modeling the Temporal Nature of Human Behavior for Demographics Prediction.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

2016
bandicoot: a Python Toolbox for Mobile Phone Metadata.
J. Mach. Learn. Res., 2016

2015
Using Deep Learning to Predict Demographics from Mobile Phone Metadata.
CoRR, 2015

Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics.
CoRR, 2015

2014
D4D-Senegal: The Second Mobile Phone Data for Development Challenge.
CoRR, 2014

Big Data-Driven Marketing: How Machine Learning Outperforms Marketers' Gut-Feeling.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014

2013
Predicting Personality Using Novel Mobile Phone-Based Metrics.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

2012
On the Trusted Use of Large-Scale Personal Data.
IEEE Data Eng. Bull., 2012

2011
The Need for Champions for Approximate Social Search.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

2009
Community Computing: Comparisons between Rural and Urban Societies Using Mobile Phone Data.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...