{"id":"https://openalex.org/W4416183427","doi":"https://doi.org/10.1109/ismar67309.2025.00061","title":"PrivateXR: Defending Privacy Attacks in Extended Reality Through Explainable AI-Guided Differential Privacy","display_name":"PrivateXR: Defending Privacy Attacks in Extended Reality Through Explainable AI-Guided Differential Privacy","publication_year":2025,"publication_date":"2025-10-08","ids":{"openalex":"https://openalex.org/W4416183427","doi":"https://doi.org/10.1109/ismar67309.2025.00061"},"language":null,"primary_location":{"id":"doi:10.1109/ismar67309.2025.00061","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ismar67309.2025.00061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2512.16851","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064926522","display_name":"Ripan Kumar Kundu","orcid":"https://orcid.org/0000-0001-7347-8580"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ripan Kumar Kundu","raw_affiliation_strings":["University of Missouri-Columbia"],"affiliations":[{"raw_affiliation_string":"University of Missouri-Columbia","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111149886","display_name":"Istiak Ahmed","orcid":"https://orcid.org/0009-0008-3118-1277"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Istiak Ahmed","raw_affiliation_strings":["University of Missouri-Columbia"],"affiliations":[{"raw_affiliation_string":"University of Missouri-Columbia","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069684684","display_name":"Khaza Anuarul Hoque","orcid":"https://orcid.org/0000-0002-1625-6479"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Khaza Anuarul Hoque","raw_affiliation_strings":["University of Missouri-Columbia"],"affiliations":[{"raw_affiliation_string":"University of Missouri-Columbia","institution_ids":["https://openalex.org/I76835614"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064926522"],"corresponding_institution_ids":["https://openalex.org/I76835614"],"apc_list":null,"apc_paid":null,"fwci":2.3568,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.918206,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"507","last_page":"517"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1340000033378601,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.1340000033378601,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.1274999976158142,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.08810000121593475,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6769999861717224},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.557200014591217},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5547000169754028},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5379999876022339},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.4442000091075897},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43320000171661377},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.382999986410141},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.37439998984336853}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7940000295639038},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6769999861717224},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.557200014591217},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5547000169754028},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5379999876022339},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.4442000091075897},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43799999356269836},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43320000171661377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4140999913215637},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.382999986410141},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.37439998984336853},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3619000017642975},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.3546999990940094},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.3465999960899353},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.30300000309944153},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.29820001125335693},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28369998931884766},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.27570000290870667},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.2743000090122223},{"id":"https://openalex.org/C2781251061","wikidata":"https://www.wikidata.org/wiki/Q5416089","display_name":"Evasion (ethics)","level":3,"score":0.25}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ismar67309.2025.00061","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ismar67309.2025.00061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2512.16851","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.16851","pdf_url":"https://arxiv.org/pdf/2512.16851","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2512.16851","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.16851","pdf_url":"https://arxiv.org/pdf/2512.16851","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2476839317","display_name":null,"funder_award_id":"CNS-2114035","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4163220314","display_name":null,"funder_award_id":"W911NF-23-1-0401","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W1992441758","https://openalex.org/W2101807845","https://openalex.org/W2104609554","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2590766922","https://openalex.org/W2594311007","https://openalex.org/W2607262101","https://openalex.org/W2611631463","https://openalex.org/W2757528734","https://openalex.org/W2778978785","https://openalex.org/W2911978475","https://openalex.org/W2921897326","https://openalex.org/W2939671131","https://openalex.org/W2947079594","https://openalex.org/W2963456518","https://openalex.org/W2965759310","https://openalex.org/W2989988912","https://openalex.org/W3005758474","https://openalex.org/W3007364799","https://openalex.org/W3028219535","https://openalex.org/W3029821885","https://openalex.org/W3127185310","https://openalex.org/W3202760142","https://openalex.org/W3208497351","https://openalex.org/W3209980895","https://openalex.org/W4200268870","https://openalex.org/W4200453943","https://openalex.org/W4224236909","https://openalex.org/W4226193609","https://openalex.org/W4281621667","https://openalex.org/W4283204932","https://openalex.org/W4283317900","https://openalex.org/W4288057780","https://openalex.org/W4294068729","https://openalex.org/W4321488025","https://openalex.org/W4366465348","https://openalex.org/W4367662941","https://openalex.org/W4377943464","https://openalex.org/W4385245566","https://openalex.org/W4385945597","https://openalex.org/W4387801411","https://openalex.org/W4388692601","https://openalex.org/W4389296811","https://openalex.org/W4391577203","https://openalex.org/W4392607752","https://openalex.org/W4394780884","https://openalex.org/W4396918816","https://openalex.org/W4399126647","https://openalex.org/W4399144578","https://openalex.org/W4400410656","https://openalex.org/W4400487859","https://openalex.org/W4402389462","https://openalex.org/W4402721814","https://openalex.org/W4406265729","https://openalex.org/W4406266387","https://openalex.org/W4408281276","https://openalex.org/W4408324413"],"related_works":[],"abstract_inverted_index":{"The":[0],"convergence":[1],"of":[2,23],"artificial":[3],"intelligence":[4],"(AI)":[5],"and":[6,41,45,54,84,99,119,143,164,169,181,190,245,295],"extended":[7],"reality":[8],"(XR)":[9],"technologies":[10],"(AI":[11],"XR)":[12],"promises":[13],"innovative":[14],"applications":[15],"across":[16],"many":[17],"domains.":[18],"However,":[19,76],"the":[20,135,176,233,288],"sensitive":[21],"nature":[22],"data":[24,40],"(e.g.,":[25,259],"eyetracking)":[26],"used":[27],"in":[28,139],"these":[29,39],"systems":[30],"raises":[31],"significant":[32],"privacy":[33,70,74,126,257,270],"concerns,":[34],"as":[35],"adversaries":[36],"can":[37,88],"exploit":[38],"models":[42,142,163,238],"to":[43,67,92,123,133,147,187,203,217,224,255],"infer":[44],"leak":[46],"personal":[47],"information":[48],"through":[49,279],"membership":[50],"inference":[51,101,213],"attacks":[52],"(MIA)":[53],"re-identification":[55],"(RDA)":[56],"with":[57,201,292],"a":[58,112,247,280],"high":[59],"success":[60,183],"rate.":[61],"Researchers":[62],"have":[63],"proposed":[64,177],"various":[65],"techniques":[66],"mitigate":[68],"such":[69],"attacks,":[71],"including":[72],"differential":[73],"(DP).":[75],"AI":[77,117,140,161,236],"XR":[78,105,141,162,237,272],"datasets":[79],"often":[80],"contain":[81],"numerous":[82],"features,":[83,95],"applying":[85],"DP":[86,146,156,226,235],"uniformly":[87],"introduce":[89],"unnecessary":[90],"noise":[91],"less":[93],"relevant":[94],"degrade":[96],"model":[97,199],"accuracy,":[98],"increase":[100],"time,":[102],"limiting":[103],"real-time":[104,265],"deployment.":[106],"Motivated":[107],"by":[108,185,215],"this,":[109],"we":[110,129,231,275],"propose":[111],"novel":[113],"framework":[114],"combining":[115],"explainable":[116],"(XAI)":[118],"DP-enabled":[120],"privacy-preserving":[121],"mechanisms":[122],"defend":[124],"against":[125],"attacks.":[127],"Specifically,":[128],"leverage":[130],"post-hoc":[131],"explanations":[132],"identify":[134],"most":[136],"influential":[137],"features":[138,149],"selectively":[144],"apply":[145],"those":[148],"during":[150,271],"inference.":[151],"We":[152],"evaluate":[153],"our":[154,277],"XAI-guided":[155,234],"approach":[157,278],"on":[158,239],"three":[159,165],"state-of-the-art":[160],"datasets:":[166],"cybersickness,":[167],"emotion,":[168],"activity":[170],"classification.":[171],"Our":[172],"results":[173],"show":[174],"that":[175,285],"method":[178],"reduces":[179],"MIA":[180],"RDA":[182],"rates":[184],"up":[186,202,216],"43":[188],"%":[189,205],"39":[191],"%,":[192],"respectively,":[193],"for":[194],"cybersickness":[195],"tasks":[196],"while":[197,263],"preserving":[198],"utility":[200,294],"97":[204],"accuracy":[206],"using":[207],"Transformer":[208],"models.":[209],"Furthermore,":[210],"it":[211],"improves":[212],"time":[214],"<tex":[218],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[219],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\approx":[220],"2":[221],"\\times$</tex>":[222],"compared":[223],"traditional":[225],"approaches.":[227],"To":[228],"demonstrate":[229],"practicality,":[230],"deploy":[232],"an":[240],"HTC":[241],"VIVE":[242],"Pro":[243],"headset":[244],"develop":[246],"user":[248,269,281,296],"interface":[249],"(UI),":[250],"namely":[251],"PrivateXR,":[252],"allowing":[253],"users":[254],"adjust":[256],"levels":[258],"low,":[260],"medium,":[261],"high)":[262],"receiving":[264],"task":[266],"predictions,":[267],"protecting":[268],"gameplay.":[273],"Finally,":[274],"validate":[276],"study,":[282],"which":[283],"confirms":[284],"participants":[286],"found":[287],"PrivateXR":[289],"UI":[290],"effective,":[291],"satisfactory":[293],"experience.":[297]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-11T00:00:00"}
