2025 |
SoK: (Un)usable Privacy: the Lack of Overlap between Privacy-Aware Sensing and Usable Privacy Research | Yasha Iravantchi, Pardis Emami-Naeini, Alanson Sample |
SoK: Computational and Distributed Differential Privacy for MPC | Fredrik Meisingseth |
SoK: Descriptive Statistics Under Local Differential Privacy | René Raab, Pascal Berrang, Paul Gerhart, Dominique Schröder |
SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures | Michael Wrana, Diogo Barradas, N. Asokan |
2024 |
SoK: Can Trajectory Generation Combine Privacy and Utility? | Erik Buchholz, Sharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere |
SoK: Data Privacy in Virtual Reality | Gonzalo Munilla Garrido, Vivek Nair, Dawn Song |
SoK: Metadata-Protecting Communication Systems | Sajin Sasy, Ian Goldberg |
SoK: Provably Secure Onion Routing against a Global Adversary | Philip Scherer, Christiane Weis, Thorsten Strufe |
SoK: Secure Human-centered Wireless Sensing | Wei Sun, Tingjun Chen, Neil Gong |
SoK: Trusting Self-Sovereign Identity | Evan Krul, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere |
SoK: Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training | Tanveer Khan, Mindaugas Budzys, Khoa Nguyen, Antonis Michalas |
2023 |
SoK: Content Moderation for End-to-End Encryption | Sarah Scheffler, Jonathan Mayer |
SoK: Differentially Private Publication of Trajectory Data | Àlex Miranda-Pascual, Patricia Guerra-Balboa, Javier Parra-Arnau, Jordi Forné, Thorsten Strufe |
SoK: Managing risks of linkage attacks on data privacy | Jovan Powar, Alastair R. Beresford |
SoK: Secure Aggregation based on cryptographic schemes for Federated Learning | Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah, Mauro Conti |
SoK: Secure E-Voting with Everlasting Privacy | Thomas Haines, Rafieh Mosaheb, Johannes Mueller, Ivan Pryvalov |
2022 |
SoK: Assumptions underlying Cryptocurrency Deanonymizations - A Taxonomy for Scientific Experts and Legal Practitioners | Dominic Deuber, Viktoria Ronge, Christian Rückert |
SoK: Cryptographic Confidentiality of Data on Mobile Devices | Maximilian Zinkus, Tushar M. Jois, Matthew Green |
SoK: Plausibly Deniable Storage | Chen Chen, Xiao Liang, Bogdan Carbunar, Radu Sion |
SoK: Privacy-enhancing Smart Home Hubs | Igor Zavalyshyn, Axel Legay, Annanda Rath, Etienne Riviere |
SoK: SCT Auditing in Certificate Transparency | Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark |
SoK: TEE-assisted Confidential Smart Contract | Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan |
2021 |
SoK: Efficient Privacy-preserving Clustering | Aditya Hegde, Helen Möllering, Thomas Schneider, Hossein Yalame |
SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data | Theodor Schnitzler, Shujaat Mirza, Markus Dürmuth, Christina Pöpper |
SoK: Privacy-Preserving Collaborative Tree-based Model Learning | Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux |
SoK: Privacy-Preserving Computation Techniques for Deep Learning | José Cabrero-Holgueras, Sergio Pastrana |
SoK: Privacy-Preserving Reputation Systems | Stan Gurtler, Ian Goldberg |
2020 |
SoK: Anatomy of Data Breaches | Hamza Saleem, Muhammad Naveed |
SoK: Differential privacies | Damien Desfontaines, Balázs Pejó |
2019 |
SoK: Modular and Efficient Private Decision Tree Evaluation | Ágnes Kiss, Masoud Naderpour, Jian Liu, N. Asokan, Thomas Schneider |