Skip to main content

Showing 1–11 of 11 results for author: Voigt, N

.
  1. arXiv:2407.04084  [pdf, other

    cs.CR

    An applied Perspective: Estimating the Differential Identifiability Risk of an Exemplary SOEP Data Set

    Authors: Jonas Allmann, Saskia Nuñez von Voigt, Florian Tschorsch

    Abstract: Using real-world study data usually requires contractual agreements where research results may only be published in anonymized form. Requiring formal privacy guarantees, such as differential privacy, could be helpful for data-driven projects to comply with data protection. However, deploying differential privacy in consumer use cases raises the need to explain its underlying mechanisms and the res… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: Accepted on IWPE 2024

  2. arXiv:2404.04006  [pdf, other

    cs.CR cs.HC

    From Theory to Comprehension: A Comparative Study of Differential Privacy and $k$-Anonymity

    Authors: Saskia Nuñez von Voigt, Luise Mehner, Florian Tschorsch

    Abstract: The notion of $\varepsilon$-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential privacy mechanism with a set $\varepsilon$. In this study, we focus on users' comprehension of the privacy protection provided by a differential privacy mechanism. To do so, we st… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: Accepted to ACM CODASPY'24, 19-21 June 2024, Porto, Portugal

  3. arXiv:2401.06143  [pdf, other

    cs.CV cs.AI

    Redefining Recon: Bridging Gaps with UAVs, 360 degree Cameras, and Neural Radiance Fields

    Authors: Hartmut Surmann, Niklas Digakis, Jan-Nicklas Kremer, Julien Meine, Max Schulte, Niklas Voigt

    Abstract: In the realm of digital situational awareness during disaster situations, accurate digital representations, like 3D models, play an indispensable role. To ensure the safety of rescue teams, robotic platforms are often deployed to generate these models. In this paper, we introduce an innovative approach that synergizes the capabilities of compact Unmaned Arial Vehicles (UAVs), smaller than 30 cm, e… ▽ More

    Submitted 30 November, 2023; originally announced January 2024.

    Comments: 6 pages, published at IEEE International Symposium on Safety,Security,and Rescue Robotics SSRR2023 in FUKUSHIMA, November 13-15 2023

  4. Towards Standardized Mobility Reports with User-Level Privacy

    Authors: Alexandra Kapp, Saskia Nuñez von Voigt, Helena Mihaljević, Florian Tschorsch

    Abstract: The importance of human mobility analyses is growing in both research and practice, especially as applications for urban planning and mobility rely on them. Aggregate statistics and visualizations play an essential role as building blocks of data explorations and summary reports, the latter being increasingly released to third parties such as municipal administrations or in the context of citizen… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: Journal of Location Based Services, 2022

  5. "Am I Private and If So, how Many?" - Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats

    Authors: Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn

    Abstract: Decisions about sharing personal information are not trivial, since there are many legitimate and important purposes for such data collection, but often the collected data can reveal sensitive information about individuals. Privacy-preserving technologies, such as differential privacy (DP), can be employed to protect the privacy of individuals and, furthermore, provide mathematically sound guarant… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: Accepted to ACM CCS 2022. arXiv admin note: substantial text overlap with arXiv:2204.04061

  6. arXiv:2204.04061   

    cs.HC cs.CY

    "Am I Private and If So, how Many?" -- Using Risk Communication Formats for Making Differential Privacy Understandable

    Authors: Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn

    Abstract: Mobility data is essential for cities and communities to identify areas for necessary improvement. Data collected by mobility providers already contains all the information necessary, but privacy of the individuals needs to be preserved. Differential privacy (DP) defines a mathematical property which guarantees that certain limits of privacy are preserved while sharing such data, but its functiona… ▽ More

    Submitted 22 June, 2023; v1 submitted 8 April, 2022; originally announced April 2022.

    Comments: A newer version of this article was submitted: arXiv.2208.10820

  7. Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees

    Authors: S. Nuñez von Voigt, E. Daniel, F. Tschorsch

    Abstract: Recommender systems are widely used. Usually, recommender systems are based on a centralized client-server architecture. However, this approach implies drawbacks regarding the privacy of users. In this paper, we propose a distributed reciprocal recommender system with strong, self-determined privacy guarantees, i.e., local differential privacy. More precisely, users randomize their profiles locall… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

    Comments: Accepted at The 16th International Conference on Availability, Reliability and Security (ARES 2021)

  8. arXiv:2106.00388  [pdf, ps, other

    cs.CR cs.DB

    Privacy and Confidentiality in Process Mining -- Threats and Research Challenges

    Authors: Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen

    Abstract: Privacy and confidentiality are very important prerequisites for applying process mining in order to comply with regulations and keep company secrets. This paper provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to an motivation application scenario in a hospital context as well as to the current body… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in ACM Transactions on Management Information Systems

  9. Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses

    Authors: Saskia Nuñez von Voigt, Mira Pauli, Johanna Reichert, Florian Tschorsch

    Abstract: An exploratory data analysis is an essential step for every data analyst to gain insights, evaluate data quality and (if required) select a machine learning model for further processing. While privacy-preserving machine learning is on the rise, more often than not this initial analysis is not counted towards the privacy budget. In this paper, we quantify the privacy loss for basic statistical func… ▽ More

    Submitted 27 August, 2020; originally announced August 2020.

    Comments: Accepted Paper for DPM 2020 co-located ESORICS 2020

  10. Quantifying the Re-identification Risk of Event Logs for Process Mining

    Authors: S. Nuñez von Voigt, S. A. Fahrenkrog-Petersen, D. Janssen, A. Koschmider, F. Tschorsch, F. Mannhardt, O. Landsiedel, M. Weidlich

    Abstract: Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through back… ▽ More

    Submitted 19 June, 2020; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: Accepted to CAiSE-2020

    Journal ref: CAiSE 2020: Advanced Information Systems Engineering pp 252-267

  11. ZnO Nanocrystal Networks Near the Insulator-Metal Transition: Tuning Contact Radius and Electron Density with Intense Pulsed Light

    Authors: Benjamin L. Greenberg, Zachary L. Robinson, K. V. Reich, Claudia Gorynski, Bryan N. Voigt, Lorraine F. Francis, B. I. Shklovskii, Eray S. Aydil, Uwe R. Kortshagen

    Abstract: Networks of ligand-free semiconductor nanocrystals (NCs) offer a valuable combination of high carrier mobility and optoelectronic properties tunable via quantum confinement. In principle, maximizing carrier mobility entails crossing the insulator-metal transition (IMT), where carriers become delocalized. A recent theoretical study predicted that this transition occurs at nρ^3 ~ 0.3, where n is the… ▽ More

    Submitted 23 January, 2018; originally announced January 2018.

    Journal ref: Nano letters 17 (8), 4634-4642 (2017)