-
5
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
August
-
M. Barbaro and T. Zeller. A Face Is Exposed for AOL Searcher No. 4417749. The New York Times, August 2006
-
(2006)
The New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
6
-
-
8744301897
-
Hourly analysis of a very large topically categorized web query log
-
New York, NY, USA: ACM
-
S. M. Beitzel, E. C. Jensen, A. Chowdhury, D. Grossman, and O. Frieder. Hourly Analysis of a Very Large Topically Categorized Web Query Log. In the Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2004), pp. 321-328, New York, NY, USA: ACM, 2004
-
(2004)
The Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2004)
, pp. 321-328
-
-
Beitzel, S.M.1
Jensen, E.C.2
Chowdhury, A.3
Grossman, D.4
Frieder, O.5
-
7
-
-
55149118992
-
A survey of query log privacy-enhancing techniques from a policy perspective
-
A. Cooper. A survey of query log privacy-enhancing techniques from a policy perspective. ACM Transactions on the Web, vol. 2, no. 4, pp. 1-27, 2008
-
(2008)
ACM Transactions on the Web
, vol.2
, Issue.4
, pp. 1-27
-
-
Cooper, A.1
-
9
-
-
67650655439
-
Differential privacy: A survey of results
-
C. Dwork. Differential Privacy: A Survey of Results. TAMC 2008
-
TAMC 2008
-
-
Dwork, C.1
-
10
-
-
84887308184
-
Exploiting innocuous activity for correlating users across sites
-
O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira. Exploiting Innocuous Activity for Correlating Users Across Sites. In Proceedings of the 22nd International Conference on World Wide Web (www 2013), pp. 447-458, 2013
-
(2013)
Proceedings of the 22nd International Conference on World Wide Web (www 2013)
, pp. 447-458
-
-
Goga, O.1
Lei, H.2
Parthasarathi, S.H.K.3
Friedland, G.4
Sommer, R.5
Teixeira, R.6
-
11
-
-
84863012396
-
Publishing search logs: A comparative study of privacy guarantees
-
March
-
M. Götz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke. Publishing Search Logs: A Comparative Study of Privacy Guarantees. IEEE Trans. on Knowledge and Data Engineering, vol.24, no. 3, pp. 1041-4347, March 2012
-
(2012)
IEEE Trans. on Knowledge and Data Engineering
, vol.24
, Issue.3
, pp. 1041-4347
-
-
Götz, M.1
Machanavajjhala, A.2
Wang, G.3
Xiao, X.4
Gehrke, J.5
-
13
-
-
63449090629
-
"I know what you did last summer" - Query logs and user privacy
-
New York, NY, USA: ACM
-
R. Jones, R. Kumar, B. Pang, and A. Tomkins. "I know what you did last summer" - Query logs and user privacy. In Proceedings of the 16th ACM Conference on Conference on Information and Knowledge Management (CIKM 2007), pp. 909-914, New York, NY, USA: ACM, 2007
-
(2007)
Proceedings of the 16th ACM Conference on Conference on Information and Knowledge Management (CIKM 2007)
, pp. 909-914
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, A.4
-
15
-
-
84865663496
-
Releasing search queries and clicks privately
-
New York, NY, USA: ACM
-
A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas. Releasing search queries and clicks privately. In Proceedings of the 18th International Conference on World Wide Web (www 2009), pp. 171-180. New York, NY, USA: ACM, 2009
-
(2009)
Proceedings of the 18th International Conference on World Wide Web (www 2009)
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
16
-
-
84894062665
-
Privacy preserving interactive record linkage (PPIRL)
-
H. C. Kum, A. Krishnamurthy, A. Machanavajjhala, M. K. Reiter, and S. Ahalt. Privacy preserving interactive record linkage (PPIRL). J Am Med Inform Assoc. 21(2):212-20, 2014
-
(2014)
J Am Med Inform Assoc.
, vol.21
, Issue.2
, pp. 212-220
-
-
Kum, H.C.1
Krishnamurthy, A.2
Machanavajjhala, A.3
Reiter, M.K.4
Ahalt, S.5
-
17
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
ACM Press, New York
-
R. Kumar, J. Novak, B. Pang, and A. Tomkins. On anonymizing query logs via token-based hashing. In Proceedings of the 16th International Conference on World Wide Web (www 2007). ACM Press, New York, pp. 629-638, 2007
-
(2007)
Proceedings of the 16th International Conference on World Wide Web (www 2007)
, pp. 629-638
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
21
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. IEEE TKDD 1(1), 2007
-
(2007)
IEEE TKDD
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
22
-
-
80052653385
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. D. McSherry. Privacy Integrated Queries: An Extensible Platform for Privacy-preserving Data Analysis. ACM SIGMOD 2009
-
ACM SIGMOD 2009
-
-
McSherry, F.D.1
-
23
-
-
84876100930
-
On the feasibility of internet-scale author identification
-
IEEE Computer Society, Washington, DC, USA
-
A. Narayanan, H. Paskov, N. Z. Gong, J. Bethencourt, E. Stefanov, E.C.R. Shin, and D. Song. On the Feasibility of Internet-Scale Author Identification. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP 2012), pp. 300-314, IEEE Computer Society, Washington, DC, USA, 2012
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP 2012
, pp. 300-314
-
-
Narayanan, A.1
Paskov, H.2
Gong, N.Z.3
Bethencourt, J.4
Stefanov, E.5
Shin, E.C.R.6
Song, D.7
-
26
-
-
80052765553
-
Embellishing text search queries to protect user privacy
-
H. H. Pang, X. Ding, and X. Xiao. Embellishing Text Search Queries to Protect User Privacy. PVLDB 3(1): 598-607 (2010)
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 598-607
-
-
Pang, H.H.1
Ding, X.2
Xiao, X.3
-
27
-
-
84864199805
-
Obfuscating the topical intention in enterprise text search
-
H. H. Pang, X. Xiao, and J. Shen. Obfuscating the Topical Intention in Enterprise Text Search. ICDE 2012: 1168-1179
-
ICDE 2012
, pp. 1168-1179
-
-
Pang, H.H.1
Xiao, X.2
Shen, J.3
-
28
-
-
58349110852
-
Privacy protection in personalized search
-
X. Shen, B. Tan, and C. Zhai. Privacy Protection in Personalized Search. SIGIR Forum 41(1): 4-17 (2007)
-
(2007)
SIGIR Forum
, vol.41
, Issue.1
, pp. 4-17
-
-
Shen, X.1
Tan, B.2
Zhai, C.3
-
31
-
-
84889599807
-
A taxonomy of privacy-preserving record linkage techniques
-
D. Vatsalan, P. Christen, and V. S. Verykios. A taxonomy of privacy-preserving record linkage techniques. Inf. Syst. 38(6): 946-969 (2013)
-
(2013)
Inf. Syst.
, vol.38
, Issue.6
, pp. 946-969
-
-
Vatsalan, D.1
Christen, P.2
Verykios, V.S.3
-
32
-
-
84901753101
-
On masking topical intent in keyword search
-
P. Wang and C. V. Ravishankar. On Masking Topical Intent in Keyword Search. ICDE 2014
-
ICDE 2014
-
-
Wang, P.1
Ravishankar, C.V.2
-
33
-
-
85014324638
-
Privacy risk in anonymized heterogeneous information networks
-
Athens, Greece, March 24-28
-
A. Zhang, X. Xie, K. C. Chang, C. A. Gunter, J. Han, and X. Wang. Privacy Risk in Anonymized Heterogeneous Information Networks. In Proc. 17th International Conference on Extending Database Technology (EDBT 2014), Athens, Greece, March 24-28, 2014
-
(2014)
Proc. 17th International Conference on Extending Database Technology (EDBT 2014)
-
-
Zhang, A.1
Xie, X.2
Chang, K.C.3
Gunter, C.A.4
Han, J.5
Wang, X.6
|