

{"id":75,"date":"2019-02-04T19:29:29","date_gmt":"2019-02-04T18:29:29","guid":{"rendered":"https:\/\/project.inria.fr\/apvp2019\/?page_id=75"},"modified":"2019-07-10T09:45:29","modified_gmt":"2019-07-10T07:45:29","slug":"programme","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/apvp2019\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"<style>table, th, td {border: 1px solid black;}table{border-spacing: 5px;border-collapse: collapse;} .jour {font-size: 120%;background-color: lightgray;padding: .5em;font-weight:  bold;} .session {font-weight:  bold;} .keynote {background-color: #f7d7d7;} .pause {background-color: #cccaca;} .talk {background-color: #f5f7cb;}.activite {padding:2em;text-align: center;background-color: #ffffff;}<\/style>\n<p>Le programme en bref :<\/p>\n<ul>\n<li>Arriv\u00e9e le lundi 8 en fin de journ\u00e9e avec ap\u00e9ritif et d\u00eener.<\/li>\n<li>D\u00e9marrage des sessions \u00e0 partir du mardi 9, \u00e0 8:30<\/li>\n<li>Fin de APVP le jeudi 11 juillet \u00e0 midi. Repas le jeudi midi sous forme de sandwich \u00e0 emporter.<\/li>\n<\/ul>\n<p>Dur\u00e9e des pr\u00e9sentations<\/p>\n<table style=\"width: 858px;\">\n<tbody>\n<tr>\n<td class=\"talk\">Article : 20 min. de pr\u00e9sentation + 5 min. de questions<\/td>\n<\/tr>\n<tr>\n<td class=\"keynote\">Keynote : <span style=\"font-family: inherit;\">45 minutes de pr\u00e9sentation + 15 min. de questions<\/span><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"pause\">PhD et Projets : <span style=\"font-family: inherit;\">pr\u00e9sentation sous forme de poster pendant les temps de pause<\/span><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>PhD et pr\u00e9sentation de projets<\/h2>\n<table style=\"width: 858px;\">\n<tbody>\n<tr>\n<td class=\"talk\"><strong>Secure Privacy Preserving Machine Learning<\/strong><br \/>\nC\u00e9sar R. Sabater<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\"><strong>D\u00e9tection et analyse des signaux faibles pour un service cach\u00e9 Lanceurs d&rsquo;alerte<\/strong><br \/>\nJulien Maitre<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\"><strong>Guaranteed Confidentiality and Efficiency in Crowdsourcing Platforms<\/strong><br \/>\nJoris Dugu\u00e9p\u00e9roux<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\"><strong>Project SEmantic Networks of Data: Utility and Privacy<\/strong><br \/>\nC\u00e9dric Eichler, Pascal Berthom\u00e9, Jacques Chabin, Rachid Echahed, Mirian Ferrari, Benjamin Nguyen, fr\u00e9d\u00e9ric Prost<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\"><strong>Empowerment des utilisateurs de r\u00e9seaux sociaux<\/strong><br \/>\nNicolas Souli\u00e9, Adrian Popescu, J\u00e9r\u00f4me Deshayes-Chossart<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Programme<\/h2>\n<table>\n<tbody>\n<tr>\n<td class=\"jour\" colspan=\"3\">Lundi 8 juillet<\/td>\n<\/tr>\n<tr>\n<td>Arriv\u00e9e<\/td>\n<td>\u00e0 partir de 17h00<\/td>\n<td>Arriv\u00e9e au Cap Hornu<\/td>\n<\/tr>\n<tr>\n<td class=\"pause\"><\/td>\n<td class=\"pause\">19h00<\/td>\n<td class=\"pause\">Pot d&rsquo;accueil<\/td>\n<\/tr>\n<tr>\n<td class=\"pause\"><\/td>\n<td class=\"pause\">20h00<\/td>\n<td class=\"pause\">Repas<\/td>\n<\/tr>\n<tr>\n<td class=\"jour\" colspan=\"3\">Mardi 9 juillet<\/td>\n<\/tr>\n<tr>\n<th>Session<\/th>\n<th>Horaire<\/th>\n<th>Titre<\/th>\n<\/tr>\n<tr class=\"pause\">\n<td><\/td>\n<td>08h30-08h40<\/td>\n<td>Mot de bienvenue<\/td>\n<\/tr>\n<tr>\n<td class=\"session\">Keynote<\/td>\n<td class=\"keynote\">08h40-09h40<\/td>\n<td class=\"keynote\">Nataliia Bielova : Web Tracking Technologies: GDPR rights and obligations<\/td>\n<\/tr>\n<tr>\n<td class=\"session\" rowspan=\"2\">Anonymisation et logiciels<\/p>\n<p><i>Chair: Pierre Bourhis<\/i><\/td>\n<td class=\"talk\">09h40-10h05<\/td>\n<td class=\"talk\"><strong>\u00c9valuation du respect de la vie priv\u00e9e des outils de messagerie<\/strong><br \/>\nC\u00e9dric Lauradoux, Vincent Prax<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">10h05-10h30<\/td>\n<td class=\"talk\"><strong>Anonymisation de trajectoires d&rsquo;appels mobiles \u00e0 l&rsquo;aide de mod\u00e8les en grille et de chaines de Markov<\/strong><br \/>\nFran\u00e7oise Fessant<\/td>\n<\/tr>\n<tr class=\"pause\">\n<td><\/td>\n<td>10h30-11h00<\/td>\n<td>Pause caf\u00e9<\/td>\n<\/tr>\n<tr>\n<td class=\"session\" rowspan=\"3\">Anonymisation et logiciels (suite)<\/p>\n<p><i>Chair: Pierre Bourhis<\/i><\/td>\n<td class=\"talk\">11h00-11h25<\/td>\n<td class=\"talk\"><strong>Sch\u00e9ma d&rsquo;Anonymisation de Dynamique de Frappe au Clavier <\/strong><br \/>\nDenis Migdal, Christophe Rosenberger<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">11h25-11h50<\/td>\n<td class=\"talk\"><strong>Roofstreet : syst\u00e8me de traitement de donn\u00e9es provenant d&rsquo;\u00e9quipements connect\u00e9s en garantissant la s\u00e9curit\u00e9 des donn\u00e9es et la protection de la vie priv\u00e9e<\/strong><br \/>\nAnh Dung Nguyen, Toussaint Tigori, Malek Hassani, Angel Gomez<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">11h50-12h15<\/td>\n<td class=\"talk\"><strong>FP-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies<\/strong><br \/>\nAntoine Vastel, Pierre Laperdrix, Walter Rudametkin, Romain Rouvoy<\/td>\n<\/tr>\n<tr class=\"pause\">\n<td class=\"session\">D\u00e9jeuner<\/td>\n<td>12h15-13h45<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td class=\"session\" rowspan=\"5\">IOT, r\u00e9seaux et mat\u00e9riel<\/p>\n<p><i>Chair: Walter Rudametkin<\/i><\/td>\n<td class=\"talk\">14h00-14h25<\/td>\n<td class=\"talk\"><strong>Protection des donn\u00e9es personnelles bas\u00e9e sur la technologie de la blockchain dans le domaine des objets connect\u00e9s <\/strong><br \/>\nFaiza Loukil, A\u00eecha Nabila Benharkat, Chirine Ghedira Guegan<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">14h25-14h50<\/td>\n<td class=\"talk\"><strong>Protecting motion sensor data against sensitive inferences<\/strong><br \/>\nRosin Claude Ngueveu, Sebastien Gambs, Carole Frindel, Th\u00e9o Jourdan, Antoine Boutet<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">14h50-15h15<\/td>\n<td class=\"talk\"><strong>Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism<\/strong><br \/>\nGuillaume Celosia, Mathieu Cunche<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">15h15-15h40<\/td>\n<td class=\"talk\"><strong>Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments<\/strong><br \/>\nRiad Ladjel, Nicolas Anciaux, Philippe Pucheral, Guillaume Scerri<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">15h40-16h05<\/td>\n<td class=\"talk\"><strong>When Blockchain Meets the right to be forgotten<\/strong><br \/>\nBayle Aur\u00e9lie<\/td>\n<\/tr>\n<tr class=\"pause\">\n<td><\/td>\n<td>16h05-16h35<\/td>\n<td>Pause caf\u00e9<\/td>\n<\/tr>\n<tr>\n<td class=\"session\" rowspan=\"4\">ML et Privacy<\/p>\n<p><i>Chair: Aur\u00e9lien Bellet<\/i><\/td>\n<td class=\"talk\">16h35-17:00<\/td>\n<td class=\"talk\"><strong>Activity recognition: keeping sensory data private by local model-based reinforcement learning &#8211; Experimental report<\/strong><br \/>\nTh\u00e9o Jourdan, Antoine Boutet, Carole Frindel<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">17h00-17h25<\/td>\n<td class=\"talk\"><strong>PrivML: Practical End-to-End Privacy in Online Machine Learning<\/strong><br \/>\nRania Talbi, Sara Bouchenak, Ait-Ali-Braham Nassim, Caroline Fontaine<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">17h25-17h50<\/td>\n<td class=\"talk\"><strong>Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion?<\/strong><br \/>\nBrij Mohan Lal Srivastava, Aur\u00e9lien Bellet, Marc Tommasi, Emmanuel Vincent<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">17h50-18h15<\/td>\n<td class=\"talk\"><strong>A generic framework for privacy preserving deep learning<\/strong><br \/>\nTh\u00e9o Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert, Jonathan Passerat-Palmbach<\/td>\n<\/tr>\n<tr>\n<td class=\"pause\"><\/td>\n<td class=\"pause\">20h00<\/td>\n<td class=\"pause\">Repas<\/td>\n<\/tr>\n<tr>\n<td class=\"jour\" colspan=\"3\">Mercredi 10 juillet<\/td>\n<\/tr>\n<tr>\n<th>Session<\/th>\n<th>Horaire<\/th>\n<th>Titre<\/th>\n<\/tr>\n<tr>\n<td class=\"session\">Keynote<\/td>\n<td class=\"keynote\">08h30-09h30<\/td>\n<td class=\"keynote\">F\u00e9licien Vallet: Recherche et vie priv\u00e9e &#8211; Quelle gestion des donn\u00e9es personnelles ?<\/td>\n<\/tr>\n<tr>\n<td class=\"session\" rowspan=\"3\">Differential privacy<\/p>\n<p><i>Chair: Mathieu Cunche<\/i><\/td>\n<td class=\"talk\">09h30-09h55<\/td>\n<td class=\"talk\"><strong>A unified view on differential privacy and robustness to adversarial examples<\/strong><br \/>\nRafa\u00ebl Pinot, Florian Yger, C\u00e9dric Gouy-Pailler, Jamal Atif<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">09h55-10h20<\/td>\n<td class=\"talk\"><strong>A Differentially Private Index for Range Query Processing in Clouds<\/strong><br \/>\nCetin Sahin, Tristan Allard, Reza Akbarinia, Amr El Abbadi, Esther Pacitti<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">10h20-10h45<\/td>\n<td class=\"talk\"><strong>Who started this rumor? Quantifying the natural differential privacy guarantees of gossip protocols<\/strong><br \/>\nAur\u00e9lien Bellet, Rachid Guerraoui, Hadrien Hendrikx<\/td>\n<\/tr>\n<tr class=\"pause\">\n<td><\/td>\n<td>10h45-11h15<\/td>\n<td>Pause caf\u00e9<\/td>\n<\/tr>\n<tr>\n<td class=\"session\" rowspan=\"3\">BD et Privacy<\/p>\n<p><i>Chair: Benjamin Nguyen<\/i><\/td>\n<td class=\"talk\">11h15-11h40<\/td>\n<td class=\"talk\"><strong>Reasoning about disclosure in data integration in the presence of source constraints<\/strong><br \/>\nLouis Jachiet, Michael Benedikt, Pierre Bourhis, Micha\u00ebl Thomazo<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">11h40-12h05<\/td>\n<td class=\"talk\"><strong>Assessing efficiency and usability of an RDF graph anonymization framework<\/strong><br \/>\nR\u00e9my Delanaux<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">12h05-12h30<\/td>\n<td class=\"talk\"><strong>SEP2P: Secure and Efficient P2P Personal Data Processing<\/strong><br \/>\nJulien Loudet, Iulian Sandu-Popa, Luc Bouganim<\/td>\n<\/tr>\n<tr class=\"pause\">\n<td class=\"session\">D\u00e9jeuner<\/td>\n<td>12h30-13h30<\/td>\n<td>Sous forme de panier pique-nique vers la mer ou Saint-Valery<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\"><\/td>\n<td class=\"talk\">13h30-15h30<\/td>\n<td class=\"talk\">Ateliers APVP 10 ans<\/td>\n<\/tr>\n<tr>\n<td class=\"activite\"><\/td>\n<td class=\"activite\">15h30<\/td>\n<td class=\"activite\">D\u00e9part pour activit\u00e9 sociale : Parc du Marquenterre<\/td>\n<\/tr>\n<tr>\n<td class=\"pause\"><\/td>\n<td class=\"pause\">20h00<\/td>\n<td class=\"pause\">Repas de Gala<\/td>\n<\/tr>\n<tr>\n<td class=\"jour\" colspan=\"3\">Jeudi 11 juillet<\/td>\n<\/tr>\n<tr>\n<th>Session<\/th>\n<th>Horaire<\/th>\n<th>Titre<\/th>\n<\/tr>\n<tr>\n<td class=\"session\">Keynote<\/td>\n<td class=\"keynote\">09h00-10h00<\/td>\n<td class=\"keynote\">Nicolas Anciaux : Syst\u00e8mes personnels de gestion de donn\u00e9es pr\u00e9servant la vie priv\u00e9e : un point d&rsquo;\u00e9tape et une solution<\/td>\n<\/tr>\n<tr>\n<td class=\"session\" rowspan=\"2\">Droit &amp; soci\u00e9t\u00e9<\/p>\n<p><i>Chair: Daniel Le M\u00e9tayer<\/i><\/td>\n<td class=\"talk\">10h00-10h25<\/td>\n<td class=\"talk\"><strong> Empowerment et Big Data sur donn\u00e9es personnelles : de la portabilit\u00e9 \u00e0 l&rsquo;agentivit\u00e9<\/strong><br \/>\nNicolas Anciaux, C\u00e9lia Zolynski<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">10h25-10h50<\/td>\n<td class=\"talk\"><strong>Are Cookie Banners GDPR-Compliant? Measuring and Evaluating banners from IAB Europe&rsquo;s Transparency and Consent Framework<\/strong><br \/>\nC\u00e9lestin Matte, Nataliia Bielova<\/td>\n<\/tr>\n<tr class=\"pause\">\n<td><\/td>\n<td>10h50-11h30<\/td>\n<td>Pause caf\u00e9<\/td>\n<\/tr>\n<tr>\n<td class=\"session\" rowspan=\"2\">Droit &amp; soci\u00e9t\u00e9 (suite)<\/p>\n<p><i>Chair: Daniel Le M\u00e9tayer<\/i><\/td>\n<td class=\"talk\">11h30-11h55<\/td>\n<td class=\"talk\"><strong>A Generic Information and Consent Framework for the IoT<\/strong><br \/>\nVictor Morel, Mathieu Cunche, Daniel Le M\u00e9tayer<\/td>\n<\/tr>\n<tr>\n<td class=\"talk\">11h55-12h20<\/td>\n<td class=\"talk\"><strong>Analysis of Privacy Policies to Enhance Informed Consent<\/strong><br \/>\nDaniel Le M\u00e9tayer, Raul Pardo<\/td>\n<\/tr>\n<tr class=\"pause\">\n<td class=\"session\">D\u00e9jeuner<\/td>\n<td>12h30<\/td>\n<td>Sous forme de sandwich \u00e0 emporter<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Le programme en bref : Arriv\u00e9e le lundi 8 en fin de journ\u00e9e avec ap\u00e9ritif et d\u00eener. D\u00e9marrage des sessions \u00e0 partir du mardi 9, \u00e0 8:30 Fin de APVP le jeudi 11 juillet \u00e0 midi. Repas le jeudi midi sous forme de sandwich \u00e0 emporter. Dur\u00e9e des pr\u00e9sentations Article\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/project.inria.fr\/apvp2019\/programme\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":618,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-75","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/apvp2019\/wp-json\/wp\/v2\/pages\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/apvp2019\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/apvp2019\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/apvp2019\/wp-json\/wp\/v2\/users\/618"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/apvp2019\/wp-json\/wp\/v2\/comments?post=75"}],"version-history":[{"count":34,"href":"https:\/\/project.inria.fr\/apvp2019\/wp-json\/wp\/v2\/pages\/75\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/project.inria.fr\/apvp2019\/wp-json\/wp\/v2\/pages\/75\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/apvp2019\/wp-json\/wp\/v2\/media?parent=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}