default search action
Yves-Alexandre de Montjoye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople:
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting. Proc. Priv. Enhancing Technol. 2024(3): 407-430 (2024) - [j11]Vincent Guan, Florent Guépin, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
A Zero Auxiliary Knowledge Membership Inference Attack on Aggregate Location Data. Proc. Priv. Enhancing Technol. 2024(4): 80-101 (2024) - 2023
- [j10]Luc Rocher, Arnaud Tournier, Yves-Alexandre de Montjoye:
Adversarial competition and collusion in algorithmic markets. Nat. Mac. Intell. 5(5): 497-504 (2023) - [j9]Florimond Houssiau, Piotr Sapiezynski, Laura Radaelli, Erez Shmueli, Yves-Alexandre de Montjoye:
Detrimental network effects in privacy: A graph-theoretic model for node-based intrusions. Patterns 4(1): 100662 (2023) - [j8]Florimond Houssiau, Thibaut Liénart, Julien M. Hendrickx, Yves-Alexandre de Montjoye:
Web Privacy: A Formal Adversarial Model for Query Obfuscation. IEEE Trans. Inf. Forensics Secur. 18: 2132-2143 (2023) - 2021
- [j7]Ali Farzanehfar, Florimond Houssiau, Yves-Alexandre de Montjoye:
The risk of re-identification remains high even in country-scale location datasets. Patterns 2(3): 100204 (2021) - 2020
- [j6]Dounia Mulders, Cyril de Bodt, Johannes Bjelland, Alex Pentland, Michel Verleysen, Yves-Alexandre de Montjoye:
Inference of node attributes from social network assortativity. Neural Comput. Appl. 32(24): 18023-18043 (2020) - [j5]Dániel Kondor, Behrooz Hashemian, Yves-Alexandre de Montjoye, Carlo Ratti:
Towards Matching User Mobility Traces in Large-Scale Datasets. IEEE Trans. Big Data 6(4): 714-726 (2020) - 2017
- [j4]Eaman Jahani, Pål Sundsøy, Johannes Bjelland, Linus Bengtsson, Alex 'Sandy' Pentland, Yves-Alexandre de Montjoye:
Improving official statistics in emerging markets using machine learning and mobile phone data. EPJ Data Sci. 6(1): 3 (2017) - [j3]Eaman Jahani, Pål Sundsøy, Johannes Bjelland, Linus Bengtsson, Alex 'Sandy' Pentland, Yves-Alexandre de Montjoye:
Erratum to: Improving official statistics in emerging markets using machine learning and mobile phone data. EPJ Data Sci. 6(1): 8 (2017) - 2016
- [j2]Yves-Alexandre de Montjoye, Luc Rocher, Alex 'Sandy' Pentland:
bandicoot: a Python Toolbox for Mobile Phone Metadata. J. Mach. Learn. Res. 17: 175:1-175:5 (2016) - 2012
- [j1]Yves-Alexandre de Montjoye, Samuel S. Wang, Alex Pentland:
On the Trusted Use of Large-Scale Personal Data. IEEE Data Eng. Bull. 35(4): 5-8 (2012)
Conference and Workshop Papers
- 2024
- [c21]Ana-Maria Cretu, Miruna Rusu, Yves-Alexandre de Montjoye:
Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks. CODASPY 2024: 295-306 - [c20]Matthieu Meeus, Igor Shilov, Manuel Faysse, Yves-Alexandre de Montjoye:
Copyright Traps for Large Language Models. ICML 2024 - [c19]Matthieu Meeus, Shubham Jain, Marek Rei, Yves-Alexandre de Montjoye:
Did the Neurons Read your Book? Document-level Membership Inference for Large Language Models. USENIX Security Symposium 2024 - 2023
- [c18]Florent Guépin, Matthieu Meeus, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data. ESORICS Workshops (1) 2023: 182-198 - [c17]Matthieu Meeus, Florent Guépin, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Achilles' Heels: Vulnerable Record Identification in Synthetic Data Publishing. ESORICS (2) 2023: 380-399 - [c16]Shubham Jain, Ana-Maria Cretu, Antoine Cully, Yves-Alexandre de Montjoye:
Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition. SP 2023: 234-252 - 2022
- [c15]Ana-Maria Cretu, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye:
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems. CCS 2022: 623-637 - [c14]Florimond Houssiau, Vincent Schellekens, Antoine Chatalic, Shreyas Kumar Annamraju, Yves-Alexandre de Montjoye:
M2M: A General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch. STM 2022: 117-135 - [c13]Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye:
Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice. USENIX Security Symposium 2022: 501-518 - [c12]Shubham Jain, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning. USENIX Security Symposium 2022: 2317-2334 - 2021
- [c11]Luc Rocher, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye:
The Observatory of Anonymity: An Interactive Tool to Understand Re-Identification Risks in 89 countries. WWW (Companion Volume) 2021: 687-689 - 2019
- [c10]Axel Oehmichen, Shubham Jain, Andrea Gadotti, Yves-Alexandre de Montjoye:
OPAL: High performance platform for large-scale privacy-preserving location data analytics. IEEE BigData 2019: 1332-1342 - [c9]Vincent Schellekens, Antoine Chatalic, Florimond Houssiau, Yves-Alexandre de Montjoye, Laurent Jacques, Rémi Gribonval:
Differentially Private Compressive K-means. ICASSP 2019: 7933-7937 - [c8]Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, Yves-Alexandre de Montjoye:
When the Signal is in the Noise: Exploiting Diffix's Sticky Noise. USENIX Security Symposium 2019: 1081-1098 - [c7]Shubham Jain, Eden Bensaid, Yves-Alexandre de Montjoye:
UNVEIL: Capture and Visualise WiFi Data Leakages. WWW 2019: 3550-3554 - 2017
- [c6]Bjarke Felbo, Pål Sundsøy, Alex 'Sandy' Pentland, Sune Lehmann, Yves-Alexandre de Montjoye:
Modeling the Temporal Nature of Human Behavior for Demographics Prediction. ECML/PKDD (3) 2017: 140-152 - [c5]Dounia Mulders, Cyril de Bodt, Johannes Bjelland, Alex 'Sandy' Pentland, Michel Verleysen, Yves-Alexandre de Montjoye:
Improving individual predictions using social networks assortativity. WSOM 2017: 169-176 - 2014
- [c4]Pål Roe Sundsøy, Johannes Bjelland, Asif M. Iqbal, Alex Pentland, Yves-Alexandre de Montjoye:
Big Data-Driven Marketing: How Machine Learning Outperforms Marketers' Gut-Feeling. SBP 2014: 367-374 - 2013
- [c3]Yves-Alexandre de Montjoye, Jordi Quoidbach, Florent Robic, Alex Pentland:
Predicting Personality Using Novel Mobile Phone-Based Metrics. SBP 2013: 48-55 - 2011
- [c2]Yves-Alexandre de Montjoye, Jesika Haria, Manuel Cebrián, Alex Pentland:
The Need for Champions for Approximate Social Search. SocialCom/PASSAT 2011: 231-234 - 2009
- [c1]Nathan Eagle, Yves-Alexandre de Montjoye, Luís M. A. Bettencourt:
Community Computing: Comparisons between Rural and Urban Societies Using Mobile Phone Data. CSE (4) 2009: 144-150
Parts in Books or Collections
- 2019
- [p1]Albert Ali Salah, Alex Pentland, Bruno Lepri, Emmanuel Letouzé, Yves-Alexandre de Montjoye, Xiaowen Dong, Özge Dagdelen, Patrick Vinck:
Introduction to the Data for Refugees Challenge on Mobility of Syrian Refugees in Turkey. Data for Refugees Challenge 2019: 3-27
Reference Works
- 2018
- [r1]Jameson L. Toole, Yves-Alexandre de Montjoye, Marta C. González, Alex 'Sandy' Pentland:
Modeling and Understanding Intrinsic Characteristics of Human Mobility. Handbook of Mobile Data Privacy 2018: 13-34
Informal and Other Publications
- 2024
- [i25]Matthieu Meeus, Igor Shilov, Manuel Faysse, Yves-Alexandre de Montjoye:
Copyright Traps for Large Language Models. CoRR abs/2402.09363 (2024) - [i24]Ana-Maria Cretu, Miruna Rusu, Yves-Alexandre de Montjoye:
Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks. CoRR abs/2404.03948 (2024) - [i23]Florent Guépin, Natasa Krco, Matthieu Meeus, Yves-Alexandre de Montjoye:
Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models. CoRR abs/2405.15423 (2024) - [i22]Igor Shilov, Matthieu Meeus, Yves-Alexandre de Montjoye:
Mosaic Memory: Fuzzy Duplication in Copyright Traps for Large Language Models. CoRR abs/2405.15523 (2024) - [i21]Matthieu Meeus, Shubham Jain, Marek Rei, Yves-Alexandre de Montjoye:
Inherent Challenges of Post-Hoc Membership Inference for Large Language Models. CoRR abs/2406.17975 (2024) - [i20]Vincent Guan, Florent Guépin, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
A Zero Auxiliary Knowledge Membership Inference Attack on Aggregate Location Data. CoRR abs/2406.18671 (2024) - [i19]Bozhidar Stevanoski, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
QueryCheetah: Fast Automated Discovery of Attribute Inference Attacks Against Query-Based Systems. CoRR abs/2409.01992 (2024) - 2023
- [i18]Andrea Gadotti, Florimond Houssiau, Meenatchi Sundaram Muthu Selva Annamalai, Yves-Alexandre de Montjoye:
Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple's Count Mean Sketch in Practice. CoRR abs/2304.07134 (2023) - [i17]Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople:
Re-aligning Shadow Models can Improve White-box Membership Inference Attacks. CoRR abs/2306.05093 (2023) - [i16]Matthieu Meeus, Florent Guépin, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Achilles' Heels: Vulnerable Record Identification in Synthetic Data Publishing. CoRR abs/2306.10308 (2023) - [i15]Shubham Jain, Ana-Maria Cretu, Antoine Cully, Yves-Alexandre de Montjoye:
Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition. CoRR abs/2306.11924 (2023) - [i14]Florent Guépin, Matthieu Meeus, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Synthetic is all you need: removing the auxiliary data assumption for membership inference attacks against synthetic data. CoRR abs/2307.01701 (2023) - [i13]Matthieu Meeus, Shubham Jain, Marek Rei, Yves-Alexandre de Montjoye:
Did the Neurons Read your Book? Document-level Membership Inference for Large Language Models. CoRR abs/2310.15007 (2023) - 2022
- [i12]Ana-Maria Cretu, Florimond Houssiau, Antoine Cully, Yves-Alexandre de Montjoye:
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems. CoRR abs/2211.05249 (2022) - [i11]Florimond Houssiau, Vincent Schellekens, Antoine Chatalic, Shreyas Kumar Annamraju, Yves-Alexandre de Montjoye:
M2M: A general method to perform various data analysis tasks from a differentially private sketch. CoRR abs/2211.14062 (2022) - 2021
- [i10]Shubham Jain, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning. CoRR abs/2106.09820 (2021) - [i9]Ana-Maria Cretu, Florent Guépin, Yves-Alexandre de Montjoye:
Dataset correlation inference attacks against machine learning models. CoRR abs/2112.08806 (2021) - 2018
- [i8]Laura Radaelli, Piotr Sapiezynski, Florimond Houssiau, Erez Shmueli, Yves-Alexandre de Montjoye:
Quantifying Surveillance in the Networked Age: Node-based Intrusions and Group Privacy. CoRR abs/1803.09007 (2018) - [i7]Andrea Gadotti, Florimond Houssiau, Luc Rocher, Yves-Alexandre de Montjoye:
When the signal is in the noise: The limits of Diffix's sticky noise. CoRR abs/1804.06752 (2018) - [i6]Albert Ali Salah, Alex Pentland, Bruno Lepri, Emmanuel Letouzé, Patrick Vinck, Yves-Alexandre de Montjoye, Xiaowen Dong, Özge Dagdelen:
Data for Refugees: The D4R Challenge on Mobility of Syrian Refugees in Turkey. CoRR abs/1807.00523 (2018) - [i5]Alejandro Noriega-Campero, Alex Rutherford, Oren Lederman, Yves-Alexandre de Montjoye, Alex Pentland:
Mapping the Privacy-Utility Tradeoff in Mobile Phone Data for Development. CoRR abs/1808.00160 (2018) - 2017
- [i4]Dániel Kondor, Behrooz Hashemian, Yves-Alexandre de Montjoye, Carlo Ratti:
Towards matching user mobility traces in large-scale datasets. CoRR abs/1709.05772 (2017) - 2015
- [i3]Bjarke Felbo, Pål Roe Sundsøy, Alex Pentland, Sune Lehmann, Yves-Alexandre de Montjoye:
Using Deep Learning to Predict Demographics from Mobile Phone Metadata. CoRR abs/1511.06660 (2015) - [i2]Giuseppe D'Acquisto, Josep Domingo-Ferrer, Panayiotis Kikiras, Vicenç Torra, Yves-Alexandre de Montjoye, Athena Bourka:
Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics. CoRR abs/1512.06000 (2015) - 2014
- [i1]Yves-Alexandre de Montjoye, Zbigniew Smoreda, Romain Trinquart, Cezary Ziemlicki, Vincent D. Blondel:
D4D-Senegal: The Second Mobile Phone Data for Development Challenge. CoRR abs/1407.4885 (2014)
Coauthor Index
aka: Alex 'Sandy' Pentland
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint