"The official inofficial organization pad for the reading group of the PETS Lecture (KIT) during summer 26.
Every paper-slot can be claimed by one student (every paper is read on Tue once, and on Thu once).
If you don't manage to get access to one of the manuscripts (using google scholar, for instance), you can email the authors or your professor, who has a
pdf of each of the papers (as a last resort)...
Thanks!
We'll collect all interested students and your availabilities ref weekdays first, and assign reading groups per person, after.
The reading groups will be:
RG 1 Tue
Tue 9.6.
1) Herley, Cormac, and Paul C. Van Oorschot. "Sok: Science, security and the elusive goal of security as a scientific pursuit." 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017.
2) Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye
RG 1 Thu
Thu 11.6.
1) Herley, Cormac, and Paul C. Van Oorschot. "Sok: Science, security and the elusive goal of security as a scientific pursuit." 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017.
2) Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye
RG 2 Tue
Tue Jun 16th
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000
4) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel. Unique in the Crowd: The privacy bounds of human mobility. Nature srep. 3
RG 2 Thu
Thu Jun 18th
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000
4) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel. Unique in the Crowd: The privacy bounds of human mobility. Nature srep. 3
RG 3 Tue
Tue Jun 23th
5) A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets", in Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc., May 2008, pp. 111-125.
6) The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes
WPES 2025
RG 3 Thu
Thu Jun 25th
5) A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets", in Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc., May 2008, pp. 111-125.
6) The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes
WPES 2025
RG 4 Tue
Tue Jun 30th
7) Georgi Ganev, Emiliano De Cristofaro
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025):
Jens Greiner
8) Dantcheva, Antitza, Petros Elia, and Arun Ross. "What else does your biometric data reveal? A survey on soft biometrics." IEEE Transactions on Information Forensics and Security 11.3 (2015): 441-467.
Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023:
RG 4 Thu
Thu Jul 2nd
7) Georgi Ganev, Emiliano De Cristofaro
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025):
8) Dantcheva, Antitza, Petros Elia, and Arun Ross. "What else does your biometric data reveal? A survey on soft biometrics." IEEE Transactions on Information Forensics and Security 11.3 (2015): 441-467.
RG 5 Tue
Tue July 14th
9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023
10) Measuring the Accuracy and Effectiveness of PII Removal Services
Authors: Jiahui He (The Hong Kong University of Science and Technology (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed Haddadi (Imperial College London & Brave Software Inc), Fabián E. Bustamante (Northwestern University), Gareth Tyson (The Hong Kong University of Science and Technology (Guangzhou))
Volume: 2025
Issue: 4
Pages: 166–182
RG 5 Thu
Thu July 16th
9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023
10) Measuring the Accuracy and Effectiveness of PII Removal Services
Authors: Jiahui He (The Hong Kong University of Science and Technology (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed Haddadi (Imperial College London & Brave Software Inc), Fabián E. Bustamante (Northwestern University), Gareth Tyson (The Hong Kong University of Science and Technology (Guangzhou))
Volume: 2025
Issue: 4
Pages: 166–182
Papers 2026:
1) Herley, Cormac, and Paul C. Van Oorschot. "t" 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017.
2) Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye
3) Latanya Sweeney. Simple demographics often identify people uniquely. Health, 2000
4) YA de Montjoye, CA Hidalgo, M Verleysen, VD Blondel. Unique in the Crowd: The privacy bounds of human mobility. Nature srep. 3
5) A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets", in Proc. IEEE Symp. Secur., Priv. (SP). IEEE Comput. Soc., May 2008, pp. 111-125.
6) The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes
WPES 2025
7) Georgi Ganev, Emiliano De Cristofaro
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
8) Dantcheva, Antitza, Petros Elia, and Arun Ross. "What else does your biometric data reveal? A survey on soft biometrics." IEEE Transactions on Information Forensics and Security 11.3 (2015): 441-467.
9) Yili Ren and others, "Person Re-identification in 3D Space: A WiFi Vision-based Approach", USENIX Security, 2023
10) Measuring the Accuracy and Effectiveness of PII Removal Services
Reading Groups:
Tue:
1
2
3
4
5
6
7
8
9
10
Thu
1
2
3
4
5
6
7
8
9
10
########################################################################################
########################################################################################
Everything below is old, to be ignored
Georgi Ganev, Emiliano De Cristofaro
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against “Truly Anonymous” Synthetic Datasets
46th IEEE Symposium on Security & Privacy (IEEE S&P 2025)
Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, Ana- Maria Creu, Yves-Alexandre de Montjoye
1) Technical Privacy Metrics: A Systematic Survey, Isabel Wagner and David Eckhoff, ACM CSUR, 2018
C. Diaz, S. Seys, J. Claessens, B. Preneel, "Towards measuring anonymity", In Proc. 2nd International Conference on Privacy-Enhancing Technologies (PETs), LNCS, vol. 2482., pp. 54–68, 2002.
It's all in your head(set): Side-channel attacks on AR/VR systems
Authors: Yicheng Zhang, Carter Slocum, Jiasi Chen, and Nael Abu-Ghazaleh, University of California, Riverside
Person Re-identification in 3D Space: A WiFi Vision-based Approach
Authors:
Yili Ren and Yichao Wang, Florida State University; Sheng Tan, Trinity University; Yingying Chen, Rutgers University; Jie Yang, Florida State University
Kuhn, Christiane, et al. "On Privacy Notions in Anonymous Communication." Proceedings on Privacy Enhancing Technologies 2 (2019): 105-125.
6) G. Acs, C. Castelluccia and R. Chen, "Differentially Private Histogram Publishing through Lossy Compression," 2012 IEEE 12th International Conference on Data Mining, Brussels, 2012, pp. 1-10.
7) M. K. Reiter, A. D. Rubin, "Crowds: Anonymity for Web transactions", ACM Trans. Inform. Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998.
9) Armknecht, Frederik, and Thorsten Strufe. "An efficient distributed privacy-preserving recommendation system." 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop. IEEE, 2011.
Sangwook Bae and others, "Watching the Watchers: Practical Video
Identification Attack in LTE Networks", USENIX Security, 2022
Juhi Kulshrestha, Marcos Oliveira, Orkut Karac ̧alık, Denis Bonnay, Claudia Wagner. Web Routineness and Limits of Predictability:Investigating Demographic and Behavioral Differences Using Web Tracking Data
The Double-edged Sword of LLM-based Data Reconstruction: Understanding and Mitigating Contextual Vulnerability in Word-level Differential Privacy Text Sanitization
Stephen Meisenbacher, Alexandra Klymenko, Andreea-Elena Bodea, Florian Matthes (Technical University of Munich)
WPES 2025
How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users
Authors: Alex Berke (MIT Media Lab), Badih Ghazi (Google), Enrico Bacis (Google), Pritish Kamath (Google), Ravi Kumar (Google), Robin Lassonde (Google), Pasin Manurangsi (Google), Umar Syed (Google)
Volume: 2025
Issue: 1
Pages: 720–758
Measuring the Accuracy and Effectiveness of PII Removal Services
Authors: Jiahui He (The Hong Kong University of Science and Technology (Guangzhou)), Peter Snyder (Brave Software Inc), Hamed Haddadi (Imperial College London & Brave Software Inc), Fabián E. Bustamante (Northwestern University), Gareth Tyson (The Hong Kong University of Science and Technology (Guangzhou))
Volume: 2025
Issue: 4
Pages: 166–182
Kim Wuyts, Riccardo Scandariato, Wouter Joosen,
Empirical evaluation of a privacy-focused threat modeling methodology,
Journal of Systems and Software, Volume 96, 2014,
Fiore, Marco, et al. "Privacy in trajectory micro-data publishing: a survey." Transactions on Data Privacy 13 (2020): 91-149.