메뉴 건너뛰기




Volumn , Issue , 2010, Pages 353-368

Issues with privacy preservation in query log mining

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; INFORMATION RETRIEVAL; PUBLIC RELATIONS; PUBLIC RISKS; SEMANTICS; WEB SERVICES; WEBSITES;

EID: 84897980497     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/b10373     Document Type: Chapter
Times cited : (2)

References (42)
  • 3
    • 85054466828 scopus 로고    scopus 로고
    • AOL research website, no longer online
    • AOL. AOL research website, no longer online. http://research.aol.com.
  • 5
    • 45749101998 scopus 로고    scopus 로고
    • Anonymity preserving pattern discovery
    • Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, and Dino Pedreschi. Anonymity preserving pattern discovery. VLDB J., 17(4): 703-727, 2008.
    • (2008) VLDB J. , vol.17 , Issue.4 , pp. 703-727
    • Atzori, M.1    Bonchi, F.2    Giannotti, F.3    Pedreschi, D.4
  • 6
    • 24644466401 scopus 로고    scopus 로고
    • Query usage mining in search engines
    • A. Scime, editor, Idea Group
    • R. Baeza-Yates. Query usage mining in search engines. In A. Scime, editor, Web Mining: Applications and Techniques, pages 307-321. Idea Group, 2004.
    • (2004) Web Mining: Applications and Techniques , pp. 307-321
    • Baeza-Yates, R.1
  • 7
    • 24644480149 scopus 로고    scopus 로고
    • Applications of web query mining
    • D. Losada and J. Fernández-Luna, editors, number 3408 in LNCS, Santiago de Compostela, Spain, March, Springer
    • R. Baeza-Yates. Applications of web query mining. In D. Losada and J. Fernández-Luna, editors, European Conference on Information Retrieval (ECIR’05), number 3408 in LNCS, pages 7-22, Santiago de Compostela, Spain, March 2005. Springer.
    • (2005) European Conference on Information Retrieval (ECIR’05) , pp. 7-22
    • Baeza-Yates, R.1
  • 9
    • 74549198813 scopus 로고    scopus 로고
    • Mining search engine query logs via suggestion sampling
    • Ziv Bar-Yossef and Maxim Gurevich. Mining search engine query logs via suggestion sampling. In VLDB 2008, 2008.
    • (2008) VLDB 2008
    • Bar-Yossef, Z.1    Gurevich, M.2
  • 10
    • 80455175487 scopus 로고    scopus 로고
    • Estimating the impression rank of web pages
    • Ziv Bar-Yossef and Maxim Gurevich. Estimating the impression rank of web pages. In WWW 2009, 2009.
    • (2009) WWW 2009
    • Bar-Yossef, Z.1    Gurevich, M.2
  • 11
    • 34250017239 scopus 로고    scopus 로고
    • A face is exposed for AOL searcher no. 4417749
    • M. Barbaro and T. Zeller. A face is exposed for AOL searcher no. 4417749. New York Times, 2006.
    • (2006) New York Times
    • Barbaro, M.1    Zeller, T.2
  • 12
    • 70349237629 scopus 로고    scopus 로고
    • The query-flow graph: Model and applications
    • Paolo Boldi, Francesco Bonchi, Carlos Castillo, Debora Donato, Aristides Gionis, and Sebastiano Vigna. The query-flow graph: model and applications. In CIKM, pages 609-618, 2008.
    • (2008) CIKM , pp. 609-618
    • Boldi, P.1    Bonchi, F.2    Castillo, C.3    Donato, D.4    Gionis, A.5    Vigna, S.6
  • 15
    • 55149118992 scopus 로고    scopus 로고
    • A survey of query log privacy-enhancing techniques from a policy perspective
    • Alissa Cooper. A survey of query log privacy-enhancing techniques from a policy perspective. ACM Transactions on the Web (TWeb), 2(4), 2008.
    • (2008) ACM Transactions on the Web (TWeb) , vol.2 , Issue.4
    • Cooper, A.1
  • 16
    • 79953004326 scopus 로고    scopus 로고
    • Spelling correction as an iterative process that exploits the collective knowledge of Web users
    • Silviu Cucerzan and Eric Brill. Spelling correction as an iterative process that exploits the collective knowledge of Web users. In EMNLP, 2004.
    • (2004) EMNLP
    • Cucerzan, S.1    Brill, E.2
  • 17
    • 67650033440 scopus 로고    scopus 로고
    • Probabilistic query expansion using query logs
    • Hang Cui, Ji-Rong Wen, Jian-Yun Nie, and Wei-Ying Ma. Probabilistic query expansion using query logs. In WWW, pages 325-332, 2002.
    • (2002) WWW , pp. 325-332
    • Cui, H.1    Wen, J.-R.2    Nie, J.-Y.3    Ma, W.-Y.4
  • 18
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • Cynthia Dwork and Kobbi Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, pages 528-544, 2004.
    • (2004) CRYPTO , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 19
    • 79958707212 scopus 로고    scopus 로고
    • Trackmenot: Resisting surveillance in web search
    • Ian Kerr, Carole Lucock, and Valerie Steeves, editors, Oxford: Oxford University Press, Forthcoming
    • D. Howe and H. Nissenbaum. Trackmenot: Resisting surveillance in web search. In Ian Kerr, Carole Lucock, and Valerie Steeves, editors, On the Identity Trail: Privacy, Anonymity and Identity in a Networked Society. Oxford: Oxford University Press, Forthcoming.
    • On the Identity Trail: Privacy, Anonymity and Identity in a Networked Society
    • Howe, D.1    Nissenbaum, H.2
  • 24
    • 84865663496 scopus 로고    scopus 로고
    • Releasing search queries and clicks privately
    • Aleksandra Korolova, Krishnaram Kenthapadi, Nina Mishra, and Alexandros Ntoulas. Releasing search queries and clicks privately. In WWW 2009, pages 171-180, 2009.
    • (2009) WWW 2009 , pp. 171-180
    • Korolova, A.1    Kenthapadi, K.2    Mishra, N.3    Ntoulas, A.4
  • 27
    • 70349234516 scopus 로고    scopus 로고
    • Searcher and Mr. Browser: A unified hyperlink-click graph
    • Barbara Poblete, Carlos Castillo, and Aristides Gionis. Dr. Searcher and Mr. Browser: a unified hyperlink-click graph. In CIKM, pages 1123-1132, 2008.
    • (2008) CIKM , pp. 1123-1132
    • Poblete, B.1    Castillo, C.2    Gionis, A.3
  • 30
    • 84866629860 scopus 로고    scopus 로고
    • Query chains: Learning to rank from implicit feedback
    • abs/cs/0605035
    • Filip Radlinski and Thorsten Joachims. Query chains: Learning to rank from implicit feedback. CoRR, abs/cs/0605035, 2006.
    • (2006) CoRR
    • Radlinski, F.1    Joachims, T.2
  • 31
    • 55149100303 scopus 로고    scopus 로고
    • Learning about the world through long-term query logs
    • Matthew Richardson. Learning about the world through long-term query logs. TWEB, 2(4), 2008.
    • (2008) TWEB , vol.2 , Issue.4
    • Richardson, M.1
  • 32
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Computer Science Laboratory, SRI International
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, Computer Science Laboratory, SRI International, 1998.
    • (1998) Technical report
    • Samarati, P.1    Sweeney, L.2
  • 33
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents’ identities in microdata release
    • Pierangela Samarati. Protecting respondents’ identities in microdata release. IEEE Trans. Knowl. Data Eng., 13(6): 1010-1027, 2001.
    • (2001) IEEE Trans. Knowl. Data Eng. , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 37
    • 0002028942 scopus 로고    scopus 로고
    • CEO and CIO perspectives on competitive intelligence
    • Richard G. Vedder, Michael T. Vanecek, C. Stephen Guynes, and James J. Cappel. CEO and CIO perspectives on competitive intelligence. Commun. ACM, 42(8): 108-116, 1999.
    • (1999) Commun. ACM , vol.42 , Issue.8 , pp. 108-116
    • Vedder, R.G.1    Vanecek, M.T.2    Guynes, S.C.3    Cappel, J.J.4
  • 39
  • 41
    • 0038590968 scopus 로고    scopus 로고
    • Competitive intelligence through data mining public sources
    • Alessandro Zanasi. Competitive intelligence through data mining public sources. Competitive Intelligence Review, 9(1): 44-54, 1998.
    • (1998) Competitive Intelligence Review , vol.9 , Issue.1 , pp. 44-54
    • Zanasi, A.1
  • 42
    • 77954584058 scopus 로고    scopus 로고
    • To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
    • Elena Zheleva and Lise Getoor. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In WWW 2009, 2009.
    • (2009) WWW 2009
    • Zheleva, E.1    Getoor, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.