Navigation

Program

Download the program.

 

Day 1, August 1st, 2017

08:00 - 18:00

Registration

08:00 - 08:15

Opening Remarks by Nan Zhang

08:15 - 16:15

HotPrivacy Workshop

Session Chair:

Nan Zhang

08:15 - 08:40

Individual Sequence Data Sanitization for Pattern Hiding [abstract]

Speaker: Liyue Fan

08:40 - 09:05

Reasoning about Differential Privacy using Probabilistic Coupling [abstract]

Speaker: Marco Gaboardi

09:05 - 09:30

Ektelo: A Framework for Defining Differentially-Private Computations [abstract]

Speaker: Michael Hay

09:30 - 09:55

Privacy Preserving Energy Exchange [abstract]

Speaker: Yuan Hong

09:55 - 10:25

Coffee break

Session Chair:

Marco Gaboardi

10:25 - 10:50

Achieving Privacy Preservation and Billing via Delayed Information Release [abstract]

Speaker: Chunqiang Hu

10:50 - 11:15

Towards Privacy-Aware Mobile Photographing [abstract]

Speaker: Qinghua Li

11:15 - 11:40

A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications [abstract]

Speaker: Wei Li

11:40 - 12:05

Protecting Modern Systems From Information Leaks [abstract]

Speaker: Kangjie Lu

12:05 - 12:30

An Automated Framework to Trace Personal Information in Mobile Apps [abstract]

Speaker: Jianwei Niu

12:30 - 13:30

Lunch

Session Chair: Xiuzhen Cheng

13:55 - 14:20

Supporting Time-varying Privacy with Self-emerging Data [abstract]

Speaker: Balaji Palanisamy

14:20 - 14:45

Inferring Private User Information in Social Media Using Machine Learning [abstract]

Speaker: Neil Zhenqiang Gong

14:45 - 15:10

Secure and Privacy-Preserving Data Sharing and Data Analytics [abstract]

Speaker: Yanmin Gong

15:10 - 15:35

Enforcing Data Security and Privacy in Body Area Sensor Networks: A Physically Unclonable Function (PUF) Based Approach [abstract]

Speaker: Weichao Wang

15:35 - 16:00

Trust Computation in Online Social Networks [abstract]

Speaker: Qing Yang

16:00 - 16:15

Closing Remarks

16:15 - 18:15

Poster Session

DPWeka: Achieving Differential Privacy in WEKA

Srinidhi Katla, Depeng Xu, Yongkai Wu, Qiuping Pan, and Xintao Wu

Dynamic Security-Level Maximization for Stabilized Parallel Deep Learning Architectures in Surveillance Applications

Joongheon Kim, Yeong Jong Mo, Woojoo Lee, Daehun Nyang

Towards Improving Comprehension of Touch IDBased Authentication for Smartphone Applications

Yousra Javed and Mohamed Shehab

Privacy-preserving Outsourcing of Parallel Magnetic Resonance Image

Zihao Shan, Kui Ren, Zhan Qin

Data Independent Identification for Privacy Preservation

Tianhang Zheng, Zhi Sun, Kui Ren

Defending Against Speaker Fingerprinting based Device Tracking for Smartphones

Zhongjie Ba, Sixu Piao, Kui Ren

Assessing Quality of Contribution in Information Sharing for Threat Intelligence

Aziz Mohaisen, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent L. Njilla

Understanding the Privacy Implications of DNSSEC Look-aside Validation

Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent . Njilla, Charles Kamhoua, Daehun Nyang

Perturbation Based Private Profile Matching in Social Networks

Ruinian Li, Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Shenglin Wang

A Privacy-preserving Framework for Rank Inference

Yunpeng Gao, Tong Yan, Nan Zhang

PaJDBC: A Transparent Privacy-aware Database Accessing Middleware for Java

Baohua Huang, Qi Lyu, Xiaolu Cheng, Wei Cheng

Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs

Ziye Geng, Yunhua He, Tong Niu, Hong Li, Limin Sun, Wei Cheng, Xu Li

Your Neighbors are Listening: Evaluating PostMessage Use in Oauth

Chong Guan, Yue Li, Kun Sun

A Model-Checking Approach for Enforcing Purpose-based Privacy Policies

Hoda Mehrpouyan and Rezvan Joshaghani

Towards Fully Distributed User Authentication with Blockchain

Lin Zhang, Hong Li, Zhiqiang Shi, Limin Sun, Yunhua He

Personal Information Inference in Social Networks

Bo Mei, Yinhao Xiao, Xiuzhen Cheng, Hong Li, Yunchuan Sun

A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications

Wei Li, Tianyi Song, Yingshu Li, Liran Ma, Jiguo Yu, Xiuzhen Cheng

Reception

Day 2, August 2nd, 2017

08:00 - 18:00

Registration

08:00 - 08:20

Opening Remarks

08:20 - 09:20

Keynote I: Gestalt vs. Constructivism: Designing Blind Cloud Storage in the Real,

Speaker: Moti Yung, Snapchat

Session Chair: Ninghui Li

09:20 - 10:30

Panel I: Privacy Notions: from Mathematics to Law

Moderator: Ahmad-Reza Sadeghi, TU Darmstadt

Panelists:

Ninghui Li, Purdue

Elisa Bertino, Purdue

Moti Yung, Snapchat

Siona Listokin, GMU

10:30 - 11:00

Coffee break

11:00 - 12:30

Technical Session 1 - Privacy-preserving data collection

Session Chair: Balaji Palanisamy

 

Patient-Driven Privacy Control through Generalized Distillation

Z.Berkay Celik, David Lopez-Paz, and Patrick McDaniel

LinkedIn Salary: A System for Secure Collection and Presentation of Structured Compensation Insights to Job Seekers

Krishnaram Kenthapadi, Ahsan Chudhary and Stuart Ambler

Privacy preserving online shopping - Ensuring minimum data disclosure with attributes

Brinda Hampiholi and Gergely Alpar

12:30 - 14:00

Lunch

14:00 - 15:30

Technical Session 2 - Differential privacy and data perturbation techniques

Session Chair: Ninghui Li

 

Distributed Cardinality Estimation of Set Operations with Differential Privacy

Rade Stanojevic, Mohamed Nabeel, and Ting Yu

Achieving Secure and Differentially Private Computations in Multiparty Settings

Abbas Acar, Z. Berkay Celik, Hidayet Aksu, A. Selcuk Uluagac, and Patrick McDaniel

Differential Privacy Preserving Causal Graph Discovery

Depeng Xu, Shuhan Yuan, and Xintao Wu

15:30 - 16:00

Coffee break

16:00 - 17:30

Technical Session 3 - Privacy and security issues in social and behavioral studies

Session Chair: Ahmad-Reza Sadeghi

 

Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach

Richeng Jin, Xiaofan He, Huaiyu Dai, Rudra Dutta, and Peng Ning

Measuring Personality for Automatic Elicitation of Privacy Preferences

Hoda Mehrpouyan, Ion Madrazo, and Maria Pera

Secure Strategyproof Ascending-price Spectrum Auction

Jiafan Wang and Sherman S. M. Chow

18:00 – 20:00

Banquet

Day 3, August 3rd, 2017

08:00 - 12:00

Registration

9:00 - 9:50

Panel II: Privacy & Big Data: Challenges and Opportunities

Moderator:

Nan Zhang, NSF & GWU

Panelists:

Joseph Calandrino, Research Director, Office of Technology Research and Investigation, Federal Trade Commission

Dan Cosley, Program Director, National Science Foundation

Kelsey Finch, Policy Counsel, Future of Privacy Forum

Simson L. Garfinkel, Chief, Center for Disclosure Avoidance Research, US Census Bureau

9:50 - 10:40

Keynote II: Practical Training and Execution of Deep Neural Networks on Encrypted Data

Farinaz Koushanfar, UC San Diego

Session Chair: Ahmad-Reza Sadeghi

10:40 - 11:00

Coffee break

11:00 - 12:30

Technical Session 4 - Privacy-aware information retrieval

Session Chair:  Kui Ren

 

Streaming, Plaintext Private Information Retrieval using Regular Expressions on Arbitrary Length Search Strings

Russell Fink, David Zaret, Rachel Stonehirsch, Robert Seng, and Samantha Tyson

Hardening Distributed and Encrypted Keyword Search via Blockchains

Chengjun Cai, Xingliang Yuan, and Cong Wang

Password Authenticated Keyword Search

Kaibin Huang, Mark Manulis, and Liqun Chen

12:30 - 14:00

Lunch

14:00 - 15:30

Technical Session 5 - Privacy issues for mobile computing and systems

Session Chair: Kun Sun

 

LiLAC: Lightweight Low-latency Anonymous Chat

John Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, and Matthew Wright

Privilege Leakage and Information Stealing through the Android Task Mechanism

Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang, and Wei Cheng

ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability

Guanhua Yan, Junchen Lu, Zhan Shu, and Yunus Kucuk

15:30 - 15:45

Closing Remarks

 

 

Venue

Lehman Auditorium, B1220 Science & Engineering Hall (SEH)
Address: 800 22nd St NW, Washington DC 20052, USA.

 

Back to Top