Skip to main content

Showing 1–14 of 14 results for author: Voigt, S

.
  1. arXiv:2505.13153  [pdf, ps, other

    cs.DC cs.CR cs.SE

    Prink: $k_s$-Anonymization for Streaming Data in Apache Flink

    Authors: Philip Groneberg, Saskia Nuñez von Voigt, Thomas Janke, Louis Loechel, Karl Wolf, Elias Grünewald, Frank Pallas

    Abstract: In this paper, we present Prink, a novel and practically applicable concept and fully implemented prototype for ks-anonymizing data streams in real-world application architectures. Building upon the pre-existing, yet rudimentary CASTLE scheme, Prink for the first time introduces semantics-aware ks-anonymization of non-numerical (such as categorical or hierarchically generalizable) streaming data i… ▽ More

    Submitted 19 May, 2025; originally announced May 2025.

    Comments: accepted for ARES 2025

  2. arXiv:2407.04084  [pdf, other

    cs.CR

    An applied Perspective: Estimating the Differential Identifiability Risk of an Exemplary SOEP Data Set

    Authors: Jonas Allmann, Saskia Nuñez von Voigt, Florian Tschorsch

    Abstract: Using real-world study data usually requires contractual agreements where research results may only be published in anonymized form. Requiring formal privacy guarantees, such as differential privacy, could be helpful for data-driven projects to comply with data protection. However, deploying differential privacy in consumer use cases raises the need to explain its underlying mechanisms and the res… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: Accepted on IWPE 2024

  3. arXiv:2405.13132  [pdf

    cond-mat.mtrl-sci

    Illustrating an Effective Workflow for Accelerated Materials Discovery

    Authors: Mrinalini Mulukutla, A. Nicole Person, Sven Voigt, Lindsey Kuettner, Branden Kappes, Danial Khatamsaz, Robert Robinson, Daniel Salas, Wenle Xu, Daniel Lewis, Hongkyu Eoh, Kailu Xiao, Haoren Wang, Jaskaran Singh Saini, Raj Mahat, Trevor Hastings, Matthew Skokan, Vahid Attari, Michael Elverud, James D. Paramore, Brady Butler, Kenneth Vecchio, Surya R. Kalidindi, Douglas Allaire, Ibrahim Karaman , et al. (4 additional authors not shown)

    Abstract: Algorithmic materials discovery is a multi-disciplinary domain that integrates insights from specialists in alloy design, synthesis, characterization, experimental methodologies, computational modeling, and optimization. Central to this effort is a robust data management system paired with an interactive work platform. This platform should empower users to not only access others data but also inte… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: 28 pages, 9 figures, 2 tables, with appendix that has 8 pages, accepted for publication at IMMI

  4. arXiv:2404.04006  [pdf, other

    cs.CR cs.HC

    From Theory to Comprehension: A Comparative Study of Differential Privacy and $k$-Anonymity

    Authors: Saskia Nuñez von Voigt, Luise Mehner, Florian Tschorsch

    Abstract: The notion of $\varepsilon$-differential privacy is a widely used concept of providing quantifiable privacy to individuals. However, it is unclear how to explain the level of privacy protection provided by a differential privacy mechanism with a set $\varepsilon$. In this study, we focus on users' comprehension of the privacy protection provided by a differential privacy mechanism. To do so, we st… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: Accepted to ACM CODASPY'24, 19-21 June 2024, Porto, Portugal

  5. Towards Standardized Mobility Reports with User-Level Privacy

    Authors: Alexandra Kapp, Saskia Nuñez von Voigt, Helena Mihaljević, Florian Tschorsch

    Abstract: The importance of human mobility analyses is growing in both research and practice, especially as applications for urban planning and mobility rely on them. Aggregate statistics and visualizations play an essential role as building blocks of data explorations and summary reports, the latter being increasingly released to third parties such as municipal administrations or in the context of citizen… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Journal ref: Journal of Location Based Services, 2022

  6. "Am I Private and If So, how Many?" - Communicating Privacy Guarantees of Differential Privacy with Risk Communication Formats

    Authors: Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn

    Abstract: Decisions about sharing personal information are not trivial, since there are many legitimate and important purposes for such data collection, but often the collected data can reveal sensitive information about individuals. Privacy-preserving technologies, such as differential privacy (DP), can be employed to protect the privacy of individuals and, furthermore, provide mathematically sound guarant… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: Accepted to ACM CCS 2022. arXiv admin note: substantial text overlap with arXiv:2204.04061

  7. arXiv:2204.04061   

    cs.HC cs.CY

    "Am I Private and If So, how Many?" -- Using Risk Communication Formats for Making Differential Privacy Understandable

    Authors: Daniel Franzen, Saskia Nuñez von Voigt, Peter Sörries, Florian Tschorsch, Claudia Müller-Birn

    Abstract: Mobility data is essential for cities and communities to identify areas for necessary improvement. Data collected by mobility providers already contains all the information necessary, but privacy of the individuals needs to be preserved. Differential privacy (DP) defines a mathematical property which guarantees that certain limits of privacy are preserved while sharing such data, but its functiona… ▽ More

    Submitted 22 June, 2023; v1 submitted 8 April, 2022; originally announced April 2022.

    Comments: A newer version of this article was submitted: arXiv.2208.10820

  8. Self-Determined Reciprocal Recommender System with Strong Privacy Guarantees

    Authors: S. Nuñez von Voigt, E. Daniel, F. Tschorsch

    Abstract: Recommender systems are widely used. Usually, recommender systems are based on a centralized client-server architecture. However, this approach implies drawbacks regarding the privacy of users. In this paper, we propose a distributed reciprocal recommender system with strong, self-determined privacy guarantees, i.e., local differential privacy. More precisely, users randomize their profiles locall… ▽ More

    Submitted 14 July, 2021; originally announced July 2021.

    Comments: Accepted at The 16th International Conference on Availability, Reliability and Security (ARES 2021)

  9. arXiv:2106.00388  [pdf, ps, other

    cs.CR cs.DB

    Privacy and Confidentiality in Process Mining -- Threats and Research Challenges

    Authors: Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Mohammadreza Fani Sani, Agnes Koschmider, Felix Mannhardt, Saskia Nuñez von Voigt, Majid Rafiei, Leopold von Waldthausen

    Abstract: Privacy and confidentiality are very important prerequisites for applying process mining in order to comply with regulations and keep company secrets. This paper provides a foundation for future research on privacy-preserving and confidential process mining techniques. Main threats are identified and related to an motivation application scenario in a hospital context as well as to the current body… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: Accepted for publication in ACM Transactions on Management Information Systems

  10. arXiv:2104.08688  [pdf, other

    cs.CV

    Signal Processing Challenges and Examples for {\it in-situ} Transmission Electron Microscopy

    Authors: Josh Kacher, Yao Xie, Sven P. Voigt, Shixiang Zhu, Henry Yuchi, Jordan Key, Surya R. Kalidindi

    Abstract: Transmission Electron Microscopy (TEM) is a powerful tool for imaging material structure and characterizing material chemistry. Recent advances in data collection technology for TEM have enabled high-volume and high-resolution data collection at a microsecond frame rate. Taking advantage of these advances in data collection rates requires the development and application of data processing tools, i… ▽ More

    Submitted 20 August, 2021; v1 submitted 17 April, 2021; originally announced April 2021.

  11. Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses

    Authors: Saskia Nuñez von Voigt, Mira Pauli, Johanna Reichert, Florian Tschorsch

    Abstract: An exploratory data analysis is an essential step for every data analyst to gain insights, evaluate data quality and (if required) select a machine learning model for further processing. While privacy-preserving machine learning is on the rise, more often than not this initial analysis is not counted towards the privacy budget. In this paper, we quantify the privacy loss for basic statistical func… ▽ More

    Submitted 27 August, 2020; originally announced August 2020.

    Comments: Accepted Paper for DPM 2020 co-located ESORICS 2020

  12. Quantifying the Re-identification Risk of Event Logs for Process Mining

    Authors: S. Nuñez von Voigt, S. A. Fahrenkrog-Petersen, D. Janssen, A. Koschmider, F. Tschorsch, F. Mannhardt, O. Landsiedel, M. Weidlich

    Abstract: Event logs recorded during the execution of business processes constitute a valuable source of information. Applying process mining techniques to them, event logs may reveal the actual process execution and enable reasoning on quantitative or qualitative process properties. However, event logs often contain sensitive information that could be related to individual process stakeholders through back… ▽ More

    Submitted 19 June, 2020; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: Accepted to CAiSE-2020

    Journal ref: CAiSE 2020: Advanced Information Systems Engineering pp 252-267

  13. arXiv:1812.00595  [pdf, other

    q-fin.TR q-fin.GN

    Building Trust Takes Time: Limits to Arbitrage for Blockchain-Based Assets

    Authors: Nikolaus Hautsch, Christoph Scheuch, Stefan Voigt

    Abstract: A blockchain replaces central counterparties with time-consuming consensus protocols to record the transfer of ownership. This settlement latency slows cross-exchange trading, exposing arbitrageurs to price risk. Off-chain settlement, instead, exposes arbitrageurs to costly default risk. We show with Bitcoin network and order book data that cross-exchange price differences coincide with periods of… ▽ More

    Submitted 19 October, 2023; v1 submitted 3 December, 2018; originally announced December 2018.

    Comments: This paper replaces an earlier draft titled "Limits to Arbitrage in Markets with Stochastic Settlement Latency". 49 pages, 2 figures, 7 tables

  14. Large-Scale Portfolio Allocation Under Transaction Costs and Model Uncertainty

    Authors: Nikolaus Hautsch, Stefan Voigt

    Abstract: We theoretically and empirically study portfolio optimization under transaction costs and establish a link between turnover penalization and covariance shrinkage with the penalization governed by transaction costs. We show how the ex ante incorporation of transaction costs shifts optimal portfolios towards regularized versions of efficient allocations. The regulatory effect of transaction costs is… ▽ More

    Submitted 21 June, 2018; v1 submitted 19 September, 2017; originally announced September 2017.

    Journal ref: Journal of Econometrics, 2019, 212(1), p. 221-240