

{"id":457,"date":"2018-05-31T09:19:04","date_gmt":"2018-05-31T07:19:04","guid":{"rendered":"https:\/\/project.inria.fr\/apvp2018\/?page_id=457"},"modified":"2018-06-05T11:17:55","modified_gmt":"2018-06-05T09:17:55","slug":"programme","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/apvp2018\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"<p>Programme complet de la conf\u00e9rence \u00e0 t\u00e9l\u00e9charger (attention il n&rsquo;y aura pas de programme papier distribu\u00e9). Pour imprimer ce programme, choisissez une impression en livret, format A4 ou A3 :<\/p>\n<p><a href=\"https:\/\/project.inria.fr\/apvp2018\/files\/2018\/05\/guide_conferencev2.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-447 size-full\" src=\"https:\/\/project.inria.fr\/apvp2018\/files\/2018\/05\/vignette-1.jpg\" alt=\"\" width=\"150\" height=\"208\" srcset=\"https:\/\/project.inria.fr\/apvp2018\/files\/2018\/05\/vignette-1.jpg 150w, https:\/\/project.inria.fr\/apvp2018\/files\/2018\/05\/vignette-1-108x150.jpg 108w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<table style=\"border-color: #403e3e; background-color: #ffffff; width: 858px;\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr style=\"height: 8px;\">\n<td style=\"border-color: #cccaca; height: 8px; background-color: #cccaca;\" colspan=\"3\">\n<h5>Dimanche 3 juin<\/h5>\n<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"border-color: #cccaca;\">Navette IGESA<\/td>\n<td style=\"border-color: #cccaca;\">15:30<\/td>\n<td style=\"border-color: #cccaca;\"><a href=\"https:\/\/goo.gl\/maps\/j2HqrKDL9x72\">Tour Fondue<\/a>: de\u0301part du bateau \u201cla Vale\u0301riane\u201d<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"border-color: #cccaca;\">Navette IGESA<\/td>\n<td style=\"border-color: #cccaca;\">18:00<\/td>\n<td style=\"border-color: #cccaca;\"><a href=\"https:\/\/goo.gl\/maps\/j2HqrKDL9x72\">Tour Fondue<\/a>: de\u0301part du bateau \u201cla Vale\u0301riane\u201d<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"border-color: #cccaca;\">Ap\u00e9ritif et diner<\/td>\n<td style=\"border-color: #cccaca;\">19:15<\/td>\n<td style=\"border-color: #cccaca;\"><strong>Aperitif batiment \u00ab\u00a0Madrague\u00a0\u00bb<\/strong>, diner\u00a0 bat. \u00ab\u00a0Harmonia\u00a0\u00bb<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Dur\u00e9e des pr\u00e9sentations<\/em><\/p>\n<table style=\"width: 858px;\">\n<tbody>\n<tr>\n<td style=\"background-color: #f5f7cb;\">Long paper : 20 min. de pr\u00e9sentation + 5 min. de questions<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #c5d8fc;\">Short paper : 10 min. de pr\u00e9sentation<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #f7d7d7;\">Keynote\u00a0:\u00a0<span style=\"font-family: inherit;\">1 heure de pr\u00e9sentation + 30 min. de questions<\/span><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #daf7e1;\">Session industrielle : 20 min. de pr\u00e9sentation + 45 min. discussion en fin de la session<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 858px; border-color: #cccaca;\" border=\"1\">\n<tbody>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #cccaca;\" colspan=\"3\">\n<h5>Lundi 4 juin<\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\"><strong>Session<\/strong><\/td>\n<td style=\"border-color: #cccaca;\"><strong>Horaire<\/strong><\/td>\n<td style=\"border-color: #cccaca;\"><strong>Titre<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">Introduction<\/td>\n<td style=\"border-color: #cccaca;\">8:30<\/td>\n<td style=\"border-color: #cccaca;\"><strong>Welcome message<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 127px; border-color: #cccaca;\" rowspan=\"4\"><strong>Session 1 : Privacy protection for smartphones and wearable devices<\/strong> (chair: Antoine Boutet)<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">8:40<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Dynamic Modeling of Location Privacy Protection Mechanisms <\/strong>(DAIS 2018)<br \/>\nSophie Cerf,\u00a0Sonia Ben Mokhtar,\u00a0Sara Bouchenak, Nicolas Marchand and Bogdan Robu<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">9:05<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Location-Proof System based on Secure Multi-Party Computations<br \/>\n<\/strong>Aur\u00e9lien Dupin,\u00a0Jean-Marc Robert\u00a0and Christophe Bidan<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">9:30<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Detecting smartphone state changes through a Bluetooth based timing attack <\/strong>(ACM WiSec 2018)<strong><br \/>\n<\/strong>Guillaume Celosia\u00a0and\u00a0Mathieu Cunche<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">9:55<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebook\u2019s Explanations <\/strong>(NDSS 2018)<br \/>\nAthanasios Andreou,\u00a0Giridhari Venkatadri,\u00a0Oana Goga,\u00a0Krishna P. Gummadi,\u00a0Patrick Loiseau\u00a0and\u00a0Alan Mislove<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">Pause caf\u00e9<\/td>\n<td style=\"border-color: #cccaca;\">10:15<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 127px; border-color: #cccaca;\" rowspan=\"7\"><strong>Session 2 : Authentication and data protection<\/strong> (chair:\u00a0 Nataliia Bielova)<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">10:45<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>CYCLOSA : Decentralizing Private Web Search Through SGX-Based Browser Extensions <\/strong>(ICDCS 2018)<br \/>\nAntoine Boutet, Sonia Ben Mokhtar and\u00a0Sara Bouchenak<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:10<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: MOOC and privacy<\/strong><br \/>\nSupriya Adhatarao<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:20<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: Privacy-Preserving Processing of Medical Data<\/strong><br \/>\nRaouf Kerkouche, Claude Castelluccia and Pierre Genev\u00e8s<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:30<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: Enjeux s\u00e9curitaires et de protection de la vie priv\u00e9e de l&rsquo;authentification dans un environnement num\u00e9rique ubiquitaire<\/strong><br \/>\nTakoua Guiga, Christophe Rosenberger, Jean-Jacques Schwartzmann, Vincent Frey and Patrick Lacharme<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:40<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: Measurement of third-party Web tracking and cookie synching based on 1&#215;1 pixel images<\/strong><br \/>\nImane Fouad, Nataliia Bielova and Arnaud Legout<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:50<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>Authentification bas\u00e9e sur des habitudes d\u2019appel et garante de la vie priv\u00e9e<\/strong><br \/>\nJulien Hatin,\u00a0Estelle Cherrier, Jean-Jacques Schwartzmann and\u00a0Christophe Rosenberger<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">12:00<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>Project: ID-Blockchain<\/strong><br \/>\nK\u00e9vin Atighehchi, Loubna Ghammam and\u00a0Morgan Barbier<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">D\u00e9jeuner<\/td>\n<td style=\"border-color: #cccaca;\">12:15<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 127px; border-color: #cccaca;\">Keynote<\/td>\n<td style=\"border-color: #cccaca; background-color: #f7d7d7;\">13:45<\/td>\n<td style=\"border-color: #cccaca; background-color: #f7d7d7;\"><strong>Donn\u00e9es dans les nuages, souverainet\u00e9 num\u00e9rique et droits de l\u2019homme: <\/strong><strong>de l Affaire USA v. Microsoft au projet E-Evidence et au CLOUD act<\/strong><br \/>\nTheodore Christakis (Data@UGA, CESICE, Institut Universitaire de France)<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">Pause caf\u00e9<\/td>\n<td style=\"border-color: #cccaca;\">15:15<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 127px; border-color: #cccaca;\" rowspan=\"4\">Session industrielle<\/td>\n<td style=\"border-color: #cccaca; background-color: #daf7e1;\">15:45<\/td>\n<td style=\"border-color: #cccaca; background-color: #daf7e1;\"><strong>SNIPS: Use cases for decentralised machine learning<\/strong><br \/>\nJoseph Dureau, Alice Coucke and David Leroy<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #daf7e1;\">16:05<\/td>\n<td style=\"border-color: #cccaca; background-color: #daf7e1;\"><strong>Owkin: Traceable and federated machine learning platform on sensitive data<\/strong><br \/>\nCamille Marini and Mathieu Galtier<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #daf7e1;\">16:25<\/td>\n<td style=\"border-color: #cccaca; background-color: #daf7e1;\"><strong>Qwant: The Web sites Privacy Respect Index project<\/strong><br \/>\nStanislas Assier<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #daf7e1;\">16:45<\/td>\n<td style=\"border-color: #cccaca; background-color: #daf7e1;\">Discussion<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">Diner<\/td>\n<td style=\"border-color: #cccaca;\">19:15<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 859.4px;\">\n<tbody>\n<tr>\n<td style=\"width: 713.4px; border-color: #cccaca; background-color: #cccaca;\" colspan=\"3\">\n<h5>Mardi 5 juin<\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\"><strong>Session<\/strong><\/td>\n<td style=\"border-color: #cccaca;\"><strong>Horaire<\/strong><\/td>\n<td style=\"border-color: #cccaca;\"><strong>Titre<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 133px; border-color: #cccaca;\" rowspan=\"5\"><strong>Session 3 : Data protection and law compliance <\/strong> (chair:\u00a0 Daniel Le M\u00e9tayer)<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">8:30<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Logique de conformit\u00e9, introduction aux m\u00e9canismes de certification en mati\u00e8re de protection des donn\u00e9es personnelles<\/strong><br \/>\nStephane Guilloteau<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">8:55<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Protection des donn\u00e9es \u00e0 caract\u00e8re personnel (dans le contexte de l\u2019Accord de Partenariat \u00c9conomique) UE-Japon : des syst\u00e8mes en voie de convergence<br \/>\n<\/strong>Sylvie Peyrou<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">9:20<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Effet de la neutralit\u00e9 sur l\u2019obtention du consentement<\/strong><br \/>\nVincent Toubiana<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">9:45<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>On Enforcing the Digital Immunity of a Large Humanitarian Organization <\/strong>(IEEE S&amp;P 2018)<br \/>\nStevens Le Blond, Alejandro Cuevas, Juan Ramon Troncoso-Pastoriza, Philipp Jovanovic, Bryan Ford and Jean-Pierre Hubaux<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">10:10<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>A survey on technologies supporting user-centric personal data management<\/strong><br \/>\nPaul Marillonnet, Mika\u00ebl Ates and Maryline Laurent<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">Pause<\/td>\n<td style=\"border-color: #cccaca;\">10:35<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 133px; border-color: #cccaca;\" rowspan=\"6\"><strong>Session 4 : Personalisation and control <\/strong> (chair: Sara Bouchenak)<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:05<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: Enhancing Transparency and Control in the IoT <\/strong>(IWPE 2018)<br \/>\nVictor Morel<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:15<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: Privacy and Smarthomes<\/strong><br \/>\nMathieu Thiery, Vincent Roca and Arnaud Legout<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:25<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: Secure and distributed computations for the personal cloud<\/strong><br \/>\nRiad Ladjel, Nicolas Anciaux, Guillaume Scerri and Philippe Pucheral<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:35<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: Personalized k-anonymity<\/strong><br \/>\nAxel Michel,\u00a0Benjamin Nguyen\u00a0and\u00a0Philippe Pucheral<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:45<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PhD: Protection de donn\u00e9es personnelles pour la s\u00e9curit\u00e9 sur Internet<\/strong><br \/>\nDenis Migdal\u00a0and\u00a0Christophe Rosenberger<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">11:55<\/td>\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\"><strong>PAMELA: Personalized and decentrAlized MachinE Learning under constrAints<\/strong><br \/>\nMarc Tommasi<\/td>\n<\/tr>\n<tr><!--\n\n\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">12:05<\/td>\n\n\n\n\n<td style=\"border-color: #cccaca; background-color: #c5d8fc;\">\n<strong>Sensibdata: Un agenda de recherche sur la sensibilisation et la responsabilisation aux donn\u00e9es personnelles : quels besoins en comp\u00e9tences en datascientists et computer scientists pour accompagner les strat\u00e9gies de collecte et d\u2019analyse ?<\/strong>\nChristine Petr, Caroline Lancelot-Miltgen and Olivier Segard<\/td>\n\n\n--><\/p>\n<td>\u00a0Photo de groupe<\/td>\n<td style=\"border-color: #cccaca;\">12:05<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">D\u00e9jeuner<\/td>\n<td style=\"border-color: #cccaca;\">12:15<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 133px; border-color: #cccaca;\"><strong>Keynote<br \/>\n<\/strong> (chair: Nataliia Bielova)<\/td>\n<td style=\"border-color: #cccaca; background-color: #f7d7d7;\">13:45<\/td>\n<td style=\"border-color: #cccaca; background-color: #f7d7d7;\"><strong>RGPD &#8211; Grands principes et son application \u00e0 la recherche scientifique<\/strong><br \/>\nFranck Baudot (CNIL)<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 133px;\">Ev\u00e8nement social<\/td>\n<td style=\"width: 56px;\">15:30<\/td>\n<td style=\"width: 524.4px;\">Activit\u00e9s nautiques (Kayak ou Paddle)<br \/>\nRDV \u00e0 la base nautique, situ\u00e9e en bas du batiment \u00ab\u00a0Cadran Solaire\u00a0\u00bb<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 133px;\">Ap\u00e9ritif et diner<\/td>\n<td style=\"width: 56px;\">19:15<\/td>\n<td style=\"width: 524.4px;\">Restaurant <a href=\"https:\/\/goo.gl\/maps\/oz5XKSH8KAM2\">L&rsquo;Alycastre<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 848px;\">\n<tbody>\n<tr>\n<td style=\"width: 106.4px; border-color: #cccaca; background-color: #cccaca;\" colspan=\"3\">\n<h5>Mercredi 6 juin<\/h5>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\"><strong>Session<\/strong><\/td>\n<td style=\"border-color: #cccaca;\"><strong>Horaire<\/strong><\/td>\n<td style=\"border-color: #cccaca;\"><strong>Titre<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 106.4px; border-color: #cccaca;\" rowspan=\"4\"><strong>Session 5 : User perspective and encryption<\/strong> (chair: Mathieu Cunche)<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">8:30<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>CAPACITY: an abstract model of control over personal data <\/strong>(CODASPY 2018)<br \/>\nDaniel Le M\u00e9tayer and Pablo Rauzy<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">8:55<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Toward privacy in wearable devices for activity recognition<br \/>\n<\/strong>Th\u00e9o Jourdan and\u00a0Carole Frindel<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">9:20<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic <\/strong>(AsiaCCS 2017)<br \/>\nS\u00e9bastien Canard, A\u00efda Diop, Nizar Kheir, Marie Paindavoine and Mohamed Sabt<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">9:45<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Privacy-Preserving Plaintext-Equality of Low-Entropy Inputs <\/strong>(ACNS 2018)<br \/>\nS\u00e9bastien Canard, David Pointcheval, Quentin Santos and Jacques Traore<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">Pause caf\u00e9<\/td>\n<td style=\"border-color: #cccaca;\">10:10<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 106.4px; border-color: #cccaca;\" rowspan=\"4\"><strong>Session 6 : Decentralisation and anonymisation<\/strong> (chair: Benjamin Nguyen)<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">10:40<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>How to Make Privacy Experimentation Open and Easy? <\/strong>(ICDCS 2018)<br \/>\nVincent Primault, Mohamed Maouche, Antoine Boutet, Sonia Ben Mokhtar, Sara Bouchenak and Lionel Brunie<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">11:05<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Personalized and Private Peer-to-Peer Machine Learning <\/strong>(AISTATS 2018)<br \/>\nAur\u00e9lien Bellet, Rachid Guerraoui, Mahsa Taziki and Marc Tommasi<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">11:30<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Query-based Linked Data Anonymization<\/strong><br \/>\nR\u00e9my Delanaux,\u00a0Angela Bonifati,\u00a0Marie-Christine Rousset\u00a0and\u00a0Romuald Thion<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\">11:55<\/td>\n<td style=\"border-color: #cccaca; background-color: #f5f7cb;\"><strong>Experience with Privacy Preserving Data Mining for Fraud Detection in a B2B Social Network<\/strong><br \/>\nRemi Canillas, Rania Talbi,\u00a0Sara Bouchenak, Lydia Chen,\u00a0Lionel Brunie\u00a0and Laurent Sarrat<\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">D\u00e9jeuner<\/td>\n<td style=\"border-color: #cccaca;\">12:20<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">Fin de l&rsquo;atelier<\/td>\n<td style=\"border-color: #cccaca;\">14:00<\/td>\n<td style=\"border-color: #cccaca;\"><\/td>\n<\/tr>\n<tr>\n<td style=\"border-color: #cccaca;\">Navette IGESA<\/td>\n<td style=\"border-color: #cccaca;\">16:45<\/td>\n<td style=\"border-color: #cccaca;\">De\u0301part du bateau \u201cla Vale\u0301riane\u201d jusque <a href=\"https:\/\/goo.gl\/maps\/j2HqrKDL9x72\">la Tour Fondue<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Programme complet de la conf\u00e9rence \u00e0 t\u00e9l\u00e9charger (attention il n&rsquo;y aura pas de programme papier distribu\u00e9). Pour imprimer ce programme, choisissez une impression en livret, format A4 ou A3 : Dimanche 3 juin Navette IGESA 15:30 Tour Fondue: de\u0301part du bateau \u201cla Vale\u0301riane\u201d Navette IGESA 18:00 Tour Fondue: de\u0301part du\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/apvp2018\/programme\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":539,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-457","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/apvp2018\/wp-json\/wp\/v2\/pages\/457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/apvp2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/apvp2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/apvp2018\/wp-json\/wp\/v2\/users\/539"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/apvp2018\/wp-json\/wp\/v2\/comments?post=457"}],"version-history":[{"count":41,"href":"https:\/\/project.inria.fr\/apvp2018\/wp-json\/wp\/v2\/pages\/457\/revisions"}],"predecessor-version":[{"id":533,"href":"https:\/\/project.inria.fr\/apvp2018\/wp-json\/wp\/v2\/pages\/457\/revisions\/533"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/apvp2018\/wp-json\/wp\/v2\/media?parent=457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}