-
1
-
-
77954717287
-
On active learning of record matching packages
-
Arvind Arasu, Michaela Götz, and Raghav Kaushik. On active learning of record matching packages. In SIGMOD, 2010.
-
(2010)
SIGMOD
-
-
Arasu, A.1
Götz, M.2
Kaushik, R.3
-
2
-
-
77956284416
-
Activity recognition for everyday life on mobile phones
-
Gerald Bieber, Jörg Voskamp, and Bodo Urban. Activity recognition for everyday life on mobile phones. In HCI, 2009.
-
(2009)
HCI
-
-
Bieber, G.1
Voskamp, J.2
Urban, B.3
-
3
-
-
0038589165
-
The anatomy of a large-scale hypertextual web search engine
-
Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks, 30(1-7):107-117, 1998.
-
(1998)
Computer Networks
, vol.30
, Issue.1-7
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
4
-
-
35348868030
-
Dynamic personalized pagerank in entity-relation graphs
-
Soumen Chakrabarti. Dynamic personalized pagerank in entity-relation graphs. In WWW, 2007.
-
(2007)
WWW
-
-
Chakrabarti, S.1
-
7
-
-
79959868798
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
William Enck, Peter Gilbert, Byung gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
-
(2010)
OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
9
-
-
74049132493
-
Preventing velocity-based linkage attacks in location-aware applications
-
Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino. Preventing velocity-based linkage attacks in location-aware applications. In GIS, 2009.
-
(2009)
GIS
-
-
Ghinita, G.1
Damiani, M.L.2
Silvestri, C.3
Bertino, E.4
-
10
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan. Private queries in location based services: anonymizers are not necessary. In SIGMOD, 2008.
-
(2008)
SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
12
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003.
-
(2003)
MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
13
-
-
2342562393
-
Protecting privacy in continuous location-tracking applications
-
Marco Gruteser and Xuan Liu. Protecting privacy in continuous location-tracking applications. IEEE Security and Privacy, 2:28-34, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 28-34
-
-
Gruteser, M.1
Liu, X.2
-
14
-
-
79960189403
-
On the complexity of privacy-preserving complex event processing
-
Yeye He, Siddharth Barman, Di Wang, and Jeffrey F. Naughton. On the complexity of privacy-preserving complex event processing. In PODS, 2011.
-
(2011)
PODS
-
-
He, Y.1
Barman, S.2
Wang, D.3
Naughton, J.F.4
-
15
-
-
75449099590
-
Human activity recognition and pattern discovery
-
E. Kim S. Helal and D. Cook. Human activity recognition and pattern discovery. IEEE Pervasive Computing, 9(1):48-53, 2010.
-
(2010)
IEEE Pervasive Computing
, vol.9
, Issue.1
, pp. 48-53
-
-
Cook, D.1
-
16
-
-
80053438862
-
Scaling personalized web search
-
Glen Jeh and Jennifer Widom. Scaling personalized web search. In WWW, 2003.
-
(2003)
In WWW
-
-
Jeh, G.1
Widom, J.2
-
18
-
-
79958176000
-
When are users comfortable sharing locations with advertisers?
-
Patrick Gage Kelley, Michael Benisch, Lorrie Faith Cranor, and Norman M. Sadeh. When are users comfortable sharing locations with advertisers? In CHI, 2011.
-
(2011)
CHI
-
-
Kelley, P.G.1
Benisch, M.2
Cranor, L.F.3
Sadeh, N.M.4
-
19
-
-
70849111568
-
Attacks on privacy and definetti's theorem
-
Daniel Kifer. Attacks on privacy and definetti's theorem. In SIGMOD, 2009.
-
(2009)
SIGMOD
-
-
Kifer, D.1
-
20
-
-
9444233624
-
An empirical study of dynamic bayesian networks for user modeling
-
Alexander Kuenzer, Christopher Schlick, Frank Ohmann, Ludger Schmidt, and Holger Luczak. An empirical study of dynamic bayesian networks for user modeling. In UM, 2001.
-
(2001)
UM
-
-
Kuenzer, A.1
Schlick, C.2
Ohmann, F.3
Schmidt, L.4
Luczak, H.5
-
22
-
-
34248181923
-
ℓ-diversity: Privacy beyond k-anonymity
-
Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. ℓ-diversity: Privacy beyond k-anonymity. TKDD, 1(1), 2007.
-
(2007)
TKDD
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
25
-
-
34548748619
-
Worst case background knowledge for privacy preserving data publishing
-
David J. Martin, Daniel Kifer, Ashwin Machanavajjhala, Johannes Gehrke, and Joseph Y. Halpern. Worst case background knowledge for privacy preserving data publishing. In ICDE, 2007.
-
(2007)
ICDE
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
26
-
-
77954969809
-
Darwin phones: The evolution of sensing and inference on mobile phones
-
Emiliano Miluzzo, Cory T. Cornelius, Ashwin Ramaswamy, Tanzeem Choudhury, Zhigang Liu, and Andrew T. Campbell. Darwin phones: the evolution of sensing and inference on mobile phones. In MobiSys, 2010.
-
(2010)
MobiSys
-
-
Miluzzo, E.1
Cornelius, C.T.2
Ramaswamy, A.3
Choudhury, T.4
Liu, Z.5
Campbell, A.T.6
-
27
-
-
84862604885
-
Towards robustness in query auditing
-
Shubha U. Nabar, Bhaskara Marthi, Krishnaram Kenthapadi, Nina Mishra, and Rajeev Motwani. Towards robustness in query auditing. In VLDB, 2006.
-
(2006)
VLDB
-
-
Shubha, U.1
Nabar, B.M.2
Kenthapadi, K.3
Mishra, N.4
Motwani, R.5
-
28
-
-
85150485002
-
Location privacy via private proximity testing
-
Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, and Dan Boneh. Location privacy via private proximity testing. In NDSS, 2011.
-
(2011)
NDSS
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
-
30
-
-
74549203914
-
A framework for safely publishing communication traces
-
Abhinav Parate and Gerome Miklau. A framework for safely publishing communication traces. In CIKM, 2009.
-
(2009)
CIKM
-
-
Parate, A.1
Miklau, G.2
-
31
-
-
49149123423
-
Composition and generalization of context data for privacy preservation
-
Linda Pareschi, Daniele Riboni, Alessandra Agostini, and Claudio Bettini. Composition and generalization of context data for privacy preservation. In PerComm, 2008.
-
(2008)
PerComm
-
-
Pareschi, L.1
Riboni, D.2
Agostini, A.3
Bettini, C.4
-
33
-
-
78649998804
-
Empirical models of privacy in location sharing
-
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Janice Y. Tsai, Patrick Gage Kelley, James Springfield, Lorrie Cranor, Jason Hong, and Norman Sadeh. Empirical models of privacy in location sharing. In Ubicomp, 2010.
-
(2010)
Ubicomp
-
-
Toch, E.1
Cranshaw, J.2
Drielsma, P.H.3
Tsai, J.Y.4
Kelley, P.G.5
Springfield, J.6
Cranor, L.7
Hong, J.8
Sadeh, N.9
-
34
-
-
80055052185
-
Location sharing technologies: Privacy risks and controls
-
Janice Tsai, Patrick G Kelley, Lorrie F Cranor, and Norman Sadeh. Location sharing technologies: Privacy risks and controls. I/S: A Journal of Law and Policy for the Information Societ, 6(2), 2010.
-
(2010)
I/S: A Journal of Law and Policy for the Information Societ
, vol.6
, Issue.2
-
-
Tsai, J.1
Kelley, P.G.2
Cranor, L.F.3
Sadeh, N.4
-
35
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, and Jian Pei. Minimality attack in privacy preserving data publishing. In VLDB, 2007.
-
(2007)
VLDB
-
-
Wong, R.C.-W.1
Fu, A.W.-C.2
Wang, K.3
Pei, J.4
-
36
-
-
80052013720
-
Can the utility of anonymized data be used for privacy breaches?
-
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Philip S. Yu, and Jian Pei. Can the utility of anonymized data be used for privacy breaches? TKDD, 5(3), 2011.
-
(2011)
TKDD
, vol.5
, Issue.3
-
-
Wong, R.C.-W.1
Fu, A.W.-C.2
Wang, K.3
Yu, P.S.4
Pei, J.5
-
37
-
-
77952081925
-
Transparent anonymization: Thwarting adversaries who know the algorithm
-
Xiaokui Xiao, Yufei Tao, and Nick Koudas. Transparent anonymization: Thwarting adversaries who know the algorithm. ACM Trans. Database Syst., 35(2), 2010.
-
(2010)
ACM Trans. Database Syst.
, vol.35
, Issue.2
-
-
Xiao, K.1
Tao, Y.2
Koudas, N.3
|