Tag #privacy
532 papers:
- ASPLOS-2020-MireshghallahTR #learning #named
- Shredder: Learning Noise Distributions to Protect Inference Privacy (FM, MT, PR, AJ, DMT, HE), pp. 3–18.
- CC-2020-ZhangHLBR #case study #difference #profiling
- A study of event frequency profiling with differential privacy (HZ, YH, SL, RB, AR), pp. 51–62.
- ICSME-2019-LiuCLCRS #evolution
- Continuous Collateral Privacy Risk Auditing of Evolving Autonomous Driving Software (CL, KC, ZL, ZC, DR, FS), p. 363.
- SCAM-2019-0006LBR #analysis #android
- Introducing Privacy in Screen Event Frequency Analysis for Android Apps (HZ0, SL, RB, AR), pp. 268–279.
- ICFP-2019-ZhangRHP0 #difference #logic #named
- Fuzzi: a three-level logic for differential privacy (HZ, ER, AH, BCP, AR0), p. 28.
- CIKM-2019-BiswasGRB #approximate #clustering
- Privacy Preserving Approximate K-means Clustering (CB, DG, DR, UB), pp. 1321–1330.
- CIKM-2019-BoutetG #what
- Inspect What Your Location History Reveals About You: Raising user awareness on privacy threats associated with disclosing his location data (AB, SG), pp. 2861–2864.
- CIKM-2019-MaZLH0J #collaboration #data analysis #health
- Privacy-Preserving Tensor Factorization for Collaborative Health Data Analysis (JM, QZ, JL, JCH, LX0, XJ), pp. 1291–1300.
- CIKM-2019-TangFXLH
- Achieve Privacy-Preserving Truth Discovery in Crowdsensing Systems (JT, SF, MX, YL, KH), pp. 1301–1310.
- CIKM-2019-WangZYLYRS
- Privacy-preserving Crowd-guided AI Decision-making in Ethical Dilemmas (TW, JZ, HY, JL, XY, XR, SS), pp. 1311–1320.
- CIKM-2019-Zhang0LFW
- Practical Access Pattern Privacy by Combining PIR and Oblivious Shuffle (ZZ, KW0, WL, AWCF, RCWW), pp. 1331–1340.
- ICML-2019-AminKMV #bound #difference #trade-off
- Bounding User Contributions: A Bias-Variance Trade-off in Differential Privacy (KA, AK, AMM, SV), pp. 263–271.
- ICML-2019-BrutzkusGE #latency
- Low Latency Privacy Preserving Inference (AB, RGB, OE), pp. 812–821.
- ICML-2019-McKennaSM #difference #estimation #modelling
- Graphical-model based estimation and inference for differential privacy (RM, DS, GM), pp. 4435–4444.
- ICML-2019-MirshaniRS #functional
- Formal Privacy for Functional Data with Gaussian Perturbations (AM, MR, ABS), pp. 4595–4604.
- ICML-2019-Wang019a #difference #linear #on the
- On Sparse Linear Regression in the Local Differential Privacy Model (DW, JX0), pp. 6628–6637.
- ICML-2019-ZhuW #difference
- Poission Subsampled Rényi Differential Privacy (YZ0, YXW), pp. 7634–7642.
- KDD-2019-LiX #data mining #mining #named #scalability
- PrivPy: General and Scalable Privacy-Preserving Data Mining (YL, WX), pp. 1299–1307.
- KDD-2019-WangYMHLS #named
- SurfCon: Synonym Discovery on Privacy-Aware Clinical Data (ZW, XY, SM, YH, SML, HS), pp. 1578–1586.
- KDD-2019-XiaLGLCS #case study #detection #mobile #network #social
- Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study (ZX, CL, NZG, QL0, YC0, DS), pp. 2012–2022.
- OOPSLA-2019-NearDASGWSZSSS #difference #higher-order #linear #named #type system
- Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy (JPN, DD, CA, TS, PG, LW, NS, MZ0, NS, AS, DS), p. 30.
- OOPSLA-2019-SalvaneschiKSHE #distributed #query
- Language-integrated privacy-aware distributed queries (GS, MK, DS, PH, SE, MM), p. 30.
- PLDI-2019-WangDWKZ #difference #execution #proving
- Proving differential privacy with shadow execution (YW, ZD, GW, DK, DZ), pp. 655–669.
- FASE-2019-TootsTYDGLMPPPT #analysis #process
- Business Process Privacy Analysis in Pleak (AT, RT, MY, MD, LGB, PL, RM, AP, MP, PP, JT), pp. 306–312.
- ICSA-2018-Yasaweerasinghelage #architecture #data analysis #modelling #performance #predict #simulation #using
- Predicting the Performance of Privacy-Preserving Data Analytics Using Architecture Modelling and Simulation (RY, MS, IW, HYP), pp. 166–175.
- FM-2018-FernandesDM #data flow #perspective
- Processing Text for Privacy: An Information Flow Perspective (NF, MD, AM), pp. 3–21.
- FSCD-2018-Delaune #encryption #protocol
- Analysing Privacy-Type Properties in Cryptographic Protocols (Invited Talk) (SD), p. 21.
- CIKM-2018-BuenrostroTRPC #ecosystem #semistructured data
- Single-Setup Privacy Enforcement for Heterogeneous Data Ecosystems (IB, AT, VR, EP, ZC), pp. 1943–1946.
- CIKM-2018-DeutchGM #detection #using
- Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (DD, YG, TM), pp. 1935–1938.
- CIKM-2018-DingZB0 #graph #scalability
- Privacy-Preserving Triangle Counting in Large Graphs (XD, XZ, ZB, HJ0), pp. 1283–1292.
- CIKM-2018-KenthapadiT #framework #named
- PriPeARL: A Framework for Privacy-Preserving Analytics and Reporting at LinkedIn (KK, TTLT), pp. 2183–2191.
- CIKM-2018-NguyenH #flexibility #modelling #parametricity
- Privacy Protection for Flexible Parametric Survival Models (TTN, SCH), pp. 1273–1282.
- CIKM-2018-SunZY #encoding #random
- Randomized Bit Vector: Privacy-Preserving Encoding Mechanism (LS, LZ, XY), pp. 1263–1272.
- CIKM-2018-ZhongS0 #automation #detection #multi #towards
- Toward Automated Multiparty Privacy Conflict Detection (HZ, ACS, DJM0), pp. 1811–1814.
- ICML-2018-0001ZK #constraints #scalability #summary
- Scalable Deletion-Robust Submodular Maximization: Data Summarization with Privacy and Fairness Constraints (EK0, MZ, AK), pp. 2549–2558.
- ICML-2018-BalleW #difference
- Improving the Gaussian Mechanism for Differential Privacy: Analytical Calibration and Optimal Denoising (BB, YXW), pp. 403–412.
- ICML-2018-NeelR #adaptation #bias #difference
- Mitigating Bias in Adaptive Data Gathering via Differential Privacy (SN, AR0), pp. 3717–3726.
- ICML-2018-ZhangKL #algorithm #distributed
- Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms (XZ, MMK, ML), pp. 5791–5800.
- KDD-2018-Abowd #difference
- The U.S. Census Bureau Adopts Differential Privacy (JMA), p. 2867.
- KDD-2018-LeeK #adaptation
- Concentrated Differentially Private Gradient Descent with Adaptive per-Iteration Privacy Budget (JL, DK), pp. 1656–1665.
- KDD-2018-LiMSGLDQ0 #performance
- An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery (YL, CM, LS, JG0, QL0, BD, ZQ, KR0), pp. 1705–1714.
- KDD-2018-NiuZWTGC #correlation #statistics
- Unlocking the Value of Privacy: Trading Aggregate Statistics over Private Correlated Data (CN, ZZ, FW0, ST, XG, GC), pp. 2031–2040.
- KDD-2018-ShengTWXZN #email #information management #scalability
- Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email (YS0, ST, JBW, JX0, QZ, MN), pp. 734–743.
- KDD-2018-WangZBZCY #learning #mobile #performance
- Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud (JW0, JZ, WB, XZ, BC, PSY), pp. 2407–2416.
- POPL-2018-AlbarghouthiH #difference #proving
- Synthesizing coupling proofs of differential privacy (AA, JH), p. 30.
- ESEC-FSE-2018-Hosseini #android #natural language #policy #semantics
- Semantic inference from natural language privacy policies and Android code (MBH), pp. 940–943.
- ICSE-2018-HadarHATBSB #design #developer
- Privacy by designers: software developers' privacy mindset (IH, TH, OA, ET, MB, SS, AB), p. 396.
- ICSE-2018-WangQHSB0 #android #named #policy
- GUILeak: tracing privacy policy claims on user input data for Android applications (XW, XQ, MBH, RS, TDB, JN0), pp. 37–47.
- ICSME-2017-FanLZZZ #algorithm #challenge #empirical #fault #predict
- The Utility Challenge of Privacy-Preserving Data-Sharing in Cross-Company Defect Prediction: An Empirical Study of the CLIFF&MORPH Algorithm (YF, CL, XZ, GZ, YZ), pp. 80–90.
- ICFP-2017-Winograd-CortHR #adaptation #difference #framework
- A framework for adaptive differential privacy (DWC, AH, AR0, BCP), p. 29.
- CIKM-2017-EslamiBRW #online
- Privacy of Hidden Profiles: Utility-Preserving Profile Removal in Online Forums (SE, AJB, RSR, GW), pp. 2063–2066.
- CIKM-2017-LyuHLP #collaboration #learning #process #recognition
- Privacy-Preserving Collaborative Deep Learning with Application to Human Activity Recognition (LL, XH, YWL, MP), pp. 1219–1228.
- CIKM-2017-Mondal0L #distributed #email #profiling
- Privacy Aware Temporal Profiling of Emails in Distributed Setup (SM, MS0, SL), pp. 1229–1238.
- CIKM-2017-WangGLZJ #physics
- From Fingerprint to Footprint: Revealing Physical World Privacy Leakage by Cyberspace Cookie Logs (HW, CG, YL0, ZLZ, DJ), pp. 1209–1218.
- ICML-2017-AgarwalS #difference #learning #online
- The Price of Differential Privacy for Online Learning (NA, KS), pp. 32–40.
- ICML-2017-RubinsteinA #difference #random
- Pain-Free Random Differential Privacy with Sensitivity Sampling (BIPR, FA), pp. 2950–2959.
- KDD-2017-XieBLZ #distributed #learning #multi
- Privacy-Preserving Distributed Multi-Task Learning with Asynchronous Updates (LX, IMB, KL, JZ), pp. 1195–1204.
- ECMFA-2017-AhmadianSRJ #analysis #ecosystem #industrial #modelling
- Model-Based Privacy Analysis in Industrial Ecosystems (ASA, DS, VR, JJ), pp. 215–231.
- POPL-2017-ZhangK #automation #difference #named #proving #towards
- LightDP: towards automating differential privacy proofs (DZ, DK), pp. 888–901.
- ASE-2017-Guerriero #data-driven
- Privacy-aware data-intensive applications (MG), pp. 1030–1033.
- ESEC-FSE-2017-AhmadianPRJ #analysis #modelling #security
- Model-based privacy and security analysis with CARiSMA (ASA, SP, QR, JJ), pp. 989–993.
- ESEC-FSE-2017-DijkCHB #modelling #network #re-engineering
- Model-driven software engineering in practice: privacy-enhanced filtering of network traffic (RvD, CC, JvdH, JvdB), pp. 860–865.
- FASE-2017-AydinPTFP #mobile #policy #visual notation
- Visual Configuration of Mobile Privacy Policies (AA, DP, OT, PF, MP), pp. 338–355.
- CIKM-2016-HuangGHZC #named
- PARC: Privacy-Aware Data Cleaning (DH, DG, YH, ZZ, FC), pp. 2433–2436.
- CIKM-2016-JiangYCZY #network #query #reachability
- Privacy-Preserving Reachability Query Services for Massive Networks (JJ, PY, BC, ZZ, XY0), pp. 145–154.
- CIKM-2016-ZhangLDCKS #big data #locality #scalability #using
- Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation (XZ, CL, WD, JC, KR, ZS), pp. 1793–1802.
- ICML-2016-KairouzBR #estimation
- Discrete Distribution Estimation under Local Privacy (PK, KB, DR), pp. 2436–2444.
- KDD-2016-IyerNS #estimation
- Privacy-preserving Class Ratio Estimation (ASI, JSN, SS), pp. 925–934.
- KDD-2016-YuanYZH #approximate #difference #linear #optimisation #query
- Convex Optimization for Linear Query Processing under Approximate Differential Privacy (GY, YY, ZZ, ZH), pp. 2005–2014.
- ASE-2016-Keng #automation #behaviour #mobile #testing
- Automated testing and notification of mobile app privacy leak-cause behaviours (JCJK), pp. 880–883.
- ASE-2016-QiJZWC #estimation #learning #obfuscation #subclass
- Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation (FQ, XYJ, XZ, FW, LC), pp. 75–86.
- FSE-2016-Omoronyia #reasoning
- Reasoning with imprecise privacy preferences (IO), pp. 952–955.
- ICSE-2016-SlavinWHHKBBN #android #detection #framework #policy #towards
- Toward a framework for detecting privacy policy violations in android application code (RS, XW, MBH, JH, RK, JB, TDB, JN0), pp. 25–36.
- CASE-2016-FernandesYDS #detection #smarttech #social
- Detection of privacy-sensitive situations for social robots in smart homes (FEFJ, GY, HMD, WS), pp. 727–732.
- CASE-2016-KuoPWCXF #community
- Dynamic demand-side management with user's privacy concern in residential community (HHK, SKP, CLW, PHC, YX, LCF), pp. 1094–1099.
- CASE-2016-MahlerHNPCG #in the cloud
- Privacy-preserving Grasp Planning in the Cloud (JM, BH, SN, FTP, RC, KG), pp. 468–475.
- SIGMOD-2015-AllardHMP #clustering #named
- Chiaroscuro: Transparency and Privacy for Massive Personal Time-Series Clustering (TA, GH, FM, EP), pp. 779–794.
- SIGMOD-2015-YangSN #correlation #difference
- Bayesian Differential Privacy on Correlated Data (BY, IS, HN), pp. 747–762.
- VLDB-2015-GuerraouiKPT #difference #named #recommendation
- D2P: Distance-Based Differential Privacy in Recommenders (RG, AMK, RP, MT), pp. 862–873.
- VLDB-2015-HuYYDCYGZ #big data #difference #framework #platform
- Differential Privacy in Telco Big Data Platform (XH, MY, JY, YD, LC, QY, HG, JZ), pp. 1692–1703.
- VLDB-2015-RahmanLT0D #database #ranking
- Privacy Implications of Database Ranking (MFR, WL, ST, NZ, GD), pp. 1106–1117.
- EDM-2015-GasevicMPPSZ
- Ethics and Privacy in EDM (DG, TM, ZAP, MP, JCS, ORZ), p. 13.
- EDM-2015-SabourinKFM #data mining #education #industrial #mining #student
- Student Privacy and Educational Data Mining: Perspectives from Industry (JS, LK, CF, SWM), pp. 164–170.
- FM-2015-BringerCML #architecture #design #reasoning
- Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures (JB, HC, DLM, RL), pp. 90–107.
- CHI-2015-AhmedHCCK #behaviour #people #visual notation
- Privacy Concerns and Behaviors of People with Visual Impairments (TA, RH, KC, DJC, AK), pp. 3523–3532.
- CHI-2015-AlmuhimediSSAAG #case study #exclamation #mobile
- Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging (HA, FS, NMS, IA, AA, JG, LFC, YA), pp. 787–796.
- CHI-2015-ClarkSMK #comprehension #image #quote
- “I Saw Images I Didn’t Even Know I Had”: Understanding User Perceptions of Cloud Storage Privacy (JWC, PS, DM, CK), pp. 1641–1644.
- CHI-2015-EgelmanKC #crowdsourcing #platform #ubiquitous
- Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms (SE, RK, RC), pp. 1669–1678.
- CHI-2015-HoyleTACK #analysis #smarttech
- Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
- CHI-2015-LaseckiGLLBD #behaviour #crowdsourcing #trade-off #video
- Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding (WSL, MG, WL, EL, JPB, SPD), pp. 1945–1954.
- CHI-2015-PatilHSKL #feedback
- Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback (SP, RH, RS, AK, AJL), pp. 1415–1418.
- CHI-2015-RenaudM
- Regulating Access to Adult Content (with Privacy Preservation) (KR, JM), pp. 4019–4028.
- CHI-2015-ShihLW #smarttech
- Privacy Tipping Points in Smartphones Privacy Preferences (FS, IL, DJW), pp. 807–816.
- CHI-2015-WangGXZYB #interactive #named #using #visualisation
- VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
- CSCW-2015-JiaWXRC #behaviour #learning #online #process
- Risk-taking as a Learning Process for Shaping Teen’s Online Information Privacy Behaviors (HJ, PJW, HX, MBR, JMC), pp. 583–599.
- CSCW-2015-KumarS #facebook #women
- The Modern Day Baby Book: Enacting Good Mothering and Stewarding Privacy on Facebook (PK, SYS), pp. 1302–1312.
- CSCW-2015-PapoutsiB #health
- Privacy as Articulation Work in HIV Health Services (CP, IB), pp. 339–348.
- CSCW-2015-WisniewskiIKP #network #social
- Give Social Network Users the Privacy They Want (PJW, AKMNI, BPK, SP), pp. 1427–1441.
- CSCW-2015-WisniewskiJXRC #behaviour #how #quote #social #social media
- “Preventative” vs. “Reactive”: How Parental Mediation Influences Teens’ Social Media Privacy Behaviors (PJW, HJ, HX, MBR, JMC), pp. 302–316.
- ICEIS-v2-2015-SmirnovP #architecture #hybrid #network #peer-to-peer #recommendation
- Privacy-preserving Hybrid Peer-to-Peer Recommendation System Architecture — Locality-Sensitive Hashing in Structured Overlay Network (AVS, AP), pp. 532–542.
- ICEIS-v3-2015-RosaZ #mobile #network #social
- Location-sharing Model in Mobile Social Networks with Privacy Guarantee (TAR, SDZ), pp. 44–54.
- CIKM-2015-ChenYC #clustering #difference
- WaveCluster with Differential Privacy (LC, TY, RC), pp. 1011–1020.
- CIKM-2015-LiP #multi #named #network
- ReverseCloak: Protecting Multi-level Location Privacy over Road Networks (CL0, BP), pp. 673–682.
- CIKM-2015-XiaKWHVM
- Process-Driven Data Privacy (WX, MK, ZW, RH, YV, BAM), pp. 1021–1030.
- CIKM-2015-YeZMJZ #approach #consistency #learning #multi #rank
- Rank Consistency based Multi-View Learning: A Privacy-Preserving Approach (HJY, DCZ, YM, YJ0, ZHZ), pp. 991–1000.
- ICML-2015-KairouzOV #composition #difference #theorem
- The Composition Theorem for Differential Privacy (PK, SO, PV), pp. 1376–1385.
- ICML-2015-WangFS #for free #monte carlo #probability
- Privacy for Free: Posterior Sampling and Stochastic Gradient Monte Carlo (YXW, SEF, AJS), pp. 2493–2502.
- KDD-2015-KarakasidisKV #scalability
- Scalable Blocking for Privacy Preserving Record Linkage (AK, GK, VSV), pp. 527–536.
- KDD-2015-LeeWK #consistency #constraints #difference
- Maximum Likelihood Postprocessing for Differential Privacy under Consistency Constraints (JL, YW, DK), pp. 635–644.
- RecSys-2015-BerliozFKBB #difference #matrix
- Applying Differential Privacy to Matrix Factorization (AB, AF, MAK, RB, SB), pp. 107–114.
- SIGIR-2015-YangS #information retrieval #security
- Privacy-Preserving IR 2015: When Information Retrieval Meets Privacy and Security (HY, IS), pp. 1157–1158.
- POPL-2015-BartheGAHRS #approximate #design #difference #higher-order #refinement #relational
- Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy (GB, MG, EJGA, JH, AR, PYS), pp. 55–68.
- POPL-2015-EbadiSS #difference
- Differential Privacy: Now it’s Getting Personal (HE, DS, GS), pp. 69–81.
- ICSE-v1-2015-LiBBKTARBOM #android #component #detection #named
- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
- ICSE-v1-2015-PetersML #fault #named #predict
- LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction (FP, TM, LL), pp. 801–811.
- ICSE-v2-2015-AnthonysamyR #in the large #re-engineering
- Software Engineering for Privacy in-the-Large (PA, AR), pp. 947–948.
- SAC-2015-BarnPB #approach #evaluation #requirements
- An approach to early evaluation of informational privacy requirements (BSB, GP, RB), pp. 1370–1375.
- SAC-2015-BassoMJV #architecture #design #evaluation #requirements #web
- Requirements, design and evaluation of a privacy reference architecture for web applications and services (TB, RM, MJ, MV), pp. 1425–1432.
- SAC-2015-HuangSZSXD #pseudo
- A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
- SAC-2015-Moawad0FKT #adaptation #ubiquitous
- Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (AM, TH, FF, JK, YLT), pp. 2271–2278.
- CASE-2015-HandokoL #delivery #order #performance
- Efficient order sharing with privacy preservation via double auction with split delivery (SDH, HCL), pp. 69–74.
- DAC-2015-SadeghiWW #challenge #industrial #internet #security
- Security and privacy challenges in industrial internet of things (ARS, CW, MW), p. 6.
- DAC-2015-SonghoriHSK #logic #nearest neighbour #synthesis #using
- Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
- DATE-2015-KonstantinouKM #encryption #functional #verification
- Privacy-preserving functional IP verification utilizing fully homomorphic encryption (CK, AK, MM), pp. 333–338.
- PDP-2015-CostantinoS #design #development #facebook
- Design and Development of a Facebook Application to Raise Privacy Awareness (GC, DS), pp. 583–586.
- LICS-2015-Kifer
- Privacy and the Price of Data (DK), p. 16.
- VMCAI-2015-CortesiFPT #mobile #policy #semantics #verification
- Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
- DocEng-2014-DavisonMM #named #semantics #similarity
- P-GTM: privacy-preserving google tri-gram method for semantic text similarity (OD, AM, EEM), pp. 81–84.
- HT-2014-SquicciariniCB #image #web
- Analyzing images’ privacy for the modern web (ACS, CC, RB), pp. 136–147.
- SIGMOD-2014-Dev14a #community #detection #graph #precise #social
- Privacy preserving social graphs for high precision community detection (HD), pp. 1615–1616.
- SIGMOD-2014-HeMD #policy #trade-off #using
- Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
- VLDB-2014-LiHMW #algorithm #difference #query
- A Data- and Workload-Aware Query Answering Algorithm for Range Queries Under Differential Privacy (CL, MH, GM, YW), pp. 341–352.
- VLDB-2014-LiLWB #in the cloud #performance #query
- Fast Range Query Processing with Strong Privacy Protection for Cloud Computing (RL, AXL, ALW, BB), pp. 1953–1964.
- VLDB-2014-LiXZJ #named
- DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing (HL, LX, LZ, XJ), pp. 1677–1680.
- VLDB-2014-ToGS #crowdsourcing #framework
- A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing (HT, GG, CS), pp. 919–930.
- SEFM-2014-PardoS #framework #network #policy #social
- A Formal Privacy Policy Framework for Social Networks (RP, GS), pp. 378–392.
- CHI-PLAY-2014-SuknotCRK #game studies #named
- Immaculacy: a game of privacy (AS, TC, NR, PGK), pp. 383–386.
- CHI-2014-0005LACFS #facebook
- A field trial of privacy nudges for facebook (YW, PGL, AA, LFC, AF, NMS), pp. 2367–2376.
- CHI-2014-DaviesLCEFKS #network #personalisation #pervasive
- Personalisation and privacy in future pervasive display networks (ND, ML, SC, IE, AF, TK, BS), pp. 2357–2366.
- CHI-2014-DenningDK #artificial reality
- In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies (TD, ZD, TK), pp. 2377–2386.
- CHI-2014-HarbachHWS #communication #security #using
- Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
- CHI-2014-KobsaKL #behaviour #personalisation
- Let’s do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization (AK, BPK, BL), pp. 81–90.
- CHI-2014-ShklovskiMSB #mobile
- Leakiness and creepiness in app space: perceptions of privacy and mobile app use (IS, SDM, HHS, HB), pp. 2347–2356.
- CSCW-2014-MurphyRX #case study #collaboration
- Privacy practices in collaborative environments: a study of emergency department staff (ARM, MCR, HX), pp. 269–282.
- ICEIS-v3-2014-ObsivacBB #performance #student
- Do Desperate Students Trade Their Privacy for a Hope? — An Evidence of the Privacy Settings Influence on the User Performance (TO, HB, MB), pp. 156–161.
- CIKM-2014-DongLW #as a service #named
- PraDa: Privacy-preserving Data-Deduplication-as-a-Service (BD, RL, WHW), pp. 1559–1568.
- CIKM-2014-SongG #difference #named #query
- Aroma: A New Data Protection Method with Differential Privacy and Accurate Query Answering (CS, TG), pp. 1569–1578.
- CIKM-2014-VatsalanC #database #multi #scalability
- Scalable Privacy-Preserving Record Linkage for Multiple Databases (DV, PC), pp. 1795–1798.
- CIKM-2014-YeMAG #approach #visual notation
- Negative FaceBlurring: A Privacy-by-Design Approach to Visual Lifelogging with Google Glass (TY, BM, RA, CG), pp. 2036–2038.
- ICPR-2014-InaiPFFU
- Selective Concealment of Characters for Privacy Protection (KI, MP, VF, YF, SU), pp. 333–338.
- ICPR-2014-ZhangLNT
- Anonymous Camera for Privacy Protection (YZ, YL, HN, RiT), pp. 4170–4175.
- KDD-2014-AcsC #case study
- A case study: privacy preserving release of spatio-temporal density in paris (GÁ, CC), pp. 1679–1688.
- KDD-2014-LuM #difference #estimation #exponential #graph #random
- Exponential random graph estimation under differential privacy (WL, GM), pp. 921–930.
- KDD-2014-RamakrishnanW #question #social
- Does social good justify risking personal privacy? (RR, GIW), p. 1965.
- KDD-2014-ZhuXGC #mobile #recommendation #security
- Mobile app recommendations with security and privacy awareness (HZ, HX, YG, EC), pp. 951–960.
- KEOD-2014-KruppS0 #mobile #ontology #policy #security
- An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
- SIGIR-2014-SiY #information retrieval #security
- Privacy-preserving IR: when information retrieval meets privacy and security (LS, HY), p. 1295.
- RE-2014-Anton #security
- Now more than ever: Privacy and security are required (AIA), p. 2.
- RE-2014-BreauxS #policy #requirements #scalability
- Scaling requirements extraction to the crowd: Experiments with privacy policies (TDB, FS), pp. 163–172.
- ICSE-2014-ShethKM #case study #requirements
- Us and them: a study of privacy requirements across north america, asia, and europe (SS, GEK, WM), pp. 859–870.
- ICSE-2014-ThomasBPN #mobile #requirements
- Distilling privacy requirements for mobile applications (KT, AKB, BAP, BN), pp. 871–882.
- SAC-2014-A #authentication #health #mobile #network #research #student
- Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks (DHA), pp. 196–197.
- SAC-2014-BaeLKWP #network #social
- Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
- SAC-2014-BarbosaBAC #lightweight
- Lightweight privacy for smart metering data by adding noise (PB, AB, HA, SC), pp. 531–538.
- SAC-2014-BasuCKMVG0M #feedback #social
- Privacy preserving trusted social feedback (AB, JCC, SK, SM, JV, GG, JZ, YM), pp. 1706–1711.
- SAC-2014-LabdaMS #modelling #process
- Modeling of privacy-aware business processes in BPMN to protect personal data (WL, NM, PS), pp. 1399–1405.
- SAC-2014-PetrlicLS
- Privacy-preserving reputation management (RP, SL, CS), pp. 1712–1718.
- STOC-2014-BunUV #approximate #difference
- Fingerprinting codes and the price of approximate differential privacy (MB, JU, SPV), pp. 1–10.
- STOC-2014-DworkTT0 #analysis #bound #component
- Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
- CAV-2014-ChowdhuryJGD #monitoring #policy #runtime
- Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (OC, LJ, DG, AD), pp. 131–149.
- LICS-CSL-2014-FredriksonJ #approach #satisfiability
- Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
- SIGMOD-2013-BonomiXL #integration #named
- LinkIT: privacy preserving record linkage and integration via transformations (LB, LX, JJL), pp. 1029–1032.
- SIGMOD-2013-ChenZ #difference #recursion #strict #towards
- Recursive mechanism: towards node differential privacy and unrestricted joins (SC, SZ), pp. 653–664.
- SIGMOD-2013-LinK #estimation #statistics
- Information preservation in statistical privacy and bayesian estimation of unattributed histograms (BRL, DK), pp. 677–688.
- VLDB-2013-Bonomi #difference #mining
- Mining Frequent Patterns with Differential Privacy (LB), pp. 1422–1427.
- VLDB-2013-KellarisP #difference
- Practical Differential Privacy via Grouping and Smoothing (GK, SP), pp. 301–312.
- VLDB-2013-XueZZXYTJZ #named #predict
- DesTeller: A System for Destination Prediction Based on Trajectories with Privacy Protection (AYX, RZ, YZ, XX, JY, YT), pp. 1198–1201.
- VLDB-2013-ZhangWYMC #integration #lightweight #peer-to-peer
- Lightweight Privacy-Preserving Peer-to-Peer Data Integration (YZ, WKW, SMY, NM, DWC), pp. 157–168.
- SIGITE-2013-PeltsvergerZ
- Hands-on privacy labs (SP, GZ), pp. 137–138.
- ICALP-v2-2013-BartheO #composition #difference #logic #probability #relational #source code #theorem
- Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs (GB, FO), pp. 49–60.
- CHI-2013-Egelman #exclamation #facebook #trade-off #verification
- My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect (SE), pp. 2369–2378.
- CHI-2013-KelleyCS #process
- Privacy as part of the app decision-making process (PGK, LFC, NMS), pp. 3393–3402.
- CHI-2013-KnijnenburgKJ #question
- Preference-based location sharing: are more privacy options really better? (BPK, AK, HJ), pp. 2667–2676.
- CHI-2013-PanjwaniSSJ #comprehension #perspective #web
- Understanding the privacy-personalization dilemma for web search: a user perspective (SP, NS, SS, SJ), pp. 3427–3430.
- CHI-2013-SpiliotopoulosO #comprehension #facebook #metric #network
- Understanding motivations for facebook use: usage metrics, network structure, and privacy (TS, IO), pp. 3287–3296.
- CSCW-2013-ChenX #comprehension
- Privacy management in dynamic groups: understanding information privacy in medical practices (YC, HX), pp. 541–552.
- CSCW-2013-OKaneMT #health #information management
- Non-static nature of patient consent: shifting privacy perspectives in health information sharing (AAO, HMM, ET), pp. 553–562.
- CSCW-2013-WangGX #empirical #online #social
- An online experiment of privacy authorization dialogues for social applications (NW, JG, HX), pp. 261–272.
- HCI-UC-2013-Acharya #named
- SP-CIP: A Secure and Privacy Aware Patient Centric Information Portal (SA), pp. 3–9.
- HCI-UC-2013-HeupelBK #trust
- Trust and Privacy in the di.me Userware (MH, MB, DK), pp. 39–48.
- CAiSE-2013-BarhamgiBOCCMT #execution
- Secure and Privacy-Preserving Execution Model for Data Services (MB, DB, SO, NCB, FC, MM, HT), pp. 35–50.
- ICEIS-v3-2013-BorgesRMS #facebook
- Who Is This Guy Who Liked My Picture? — Privacy Control Mechanisms on Facebook for Generations X and Y (GB, TR, CM, PCdS), pp. 179–186.
- CIKM-2013-BonomiX #algorithm #difference #mining
- A two-phase algorithm for mining sequential patterns with differential privacy (LB, LX), pp. 269–278.
- CIKM-2013-TianCZ #approach #database #hybrid #mobile #query
- A hybrid approach for privacy-preserving processing of knn queries in mobile database systems (ST, YC, QZ), pp. 1161–1164.
- CIKM-2013-ZhangLL #performance #robust #streaming
- An efficient and robust privacy protection technique for massive streaming choice-based information (JZ, XL, YL), pp. 1169–1172.
- ECIR-2013-ArampatzisDE #web
- A Versatile Tool for Privacy-Enhanced Web Search (AA, GD, PSE), pp. 368–379.
- KDD-2013-JohnsonS #data analysis
- Privacy-preserving data exploration in genome-wide association studies (AJ, VS), pp. 1079–1087.
- KDD-2013-ShenY #difference #graph #mining
- Mining frequent graph patterns with differential privacy (ES, TY), pp. 545–553.
- KDD-2013-WuNTWXX #framework
- A privacy preserving framework for managing vehicle data in road pricing systems (HW, WSN, KLT, WW, SX, MX), pp. 1427–1435.
- SEKE-2013-MaierS
- Profiles for Convenient Front-end Privacy (RM, JS), pp. 125–130.
- POPL-2013-GaboardiHHNP #dependent type #difference #linear
- Linear dependent types for differential privacy (MG, AH, JH, AN, BCP), pp. 357–370.
- QAPL-2013-GazeauMP #difference #semantics
- Preserving differential privacy under finite-precision semantics (IG, DM, CP), pp. 1–18.
- RE-2013-BreauxR #analysis #formal method #multi #requirements #specification
- Formal analysis of privacy requirements specifications for multi-tier applications (TDB, AR), pp. 14–20.
- ICSE-2013-OmoronyiaCSPN #adaptation #requirements
- Engineering adaptive privacy: on the role of privacy awareness requirements (IO, LC, MS, LP, BN), pp. 632–641.
- SAC-2013-DimitriouK #energy #smarttech
- Privacy-friendly tasking and trading of energy in smart grids (TD, GK), pp. 652–659.
- SAC-2013-MokarizadehDMB #matrix #social
- Enhancing social matrix factorization with privacy (SM, ND, MM, RB), pp. 277–278.
- STOC-2013-HsuRU #difference #equilibrium
- Differential privacy for the analyst via private equilibrium computation (JH, AR, JU), pp. 341–350.
- STOC-2013-NikolovTZ #approximate #difference #geometry
- The geometry of differential privacy: the sparse and approximate cases (AN, KT, LZ), pp. 351–360.
- STOC-2013-Ullman #difference #query
- Answering n{2+o(1)} counting queries with differential privacy is hard (JU), pp. 361–370.
- CAV-2013-ChevalCP #how
- Lengths May Break Privacy — Or How to Check for Equivalences with Length (VC, VC, AP), pp. 708–723.
- PODS-2012-ChoromanskiM #algorithm #database #graph #power of #statistics
- The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases (KC, TM), pp. 65–76.
- PODS-2012-KiferM #framework
- A rigorous and customizable framework for privacy (DK, AM), pp. 77–88.
- SIGMOD-2012-HuXCY #authentication
- Authenticating location-based services without compromising location privacy (HH, JX, QC, ZY), pp. 301–312.
- SIGMOD-2012-MeachamS #named #sql #transaction
- JustMyFriends: full SQL, full transactional amenities, and access privacy (AM, DS), pp. 633–636.
- SIGMOD-2012-MohanTSSC #data analysis #named
- GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
- SIGMOD-2012-PengYZWY #difference #multi #named
- DP-tree: indexing multi-dimensional data under differential privacy (SP, YY, ZZ, MW, YY), p. 864.
- SIGMOD-2012-YangZMWX #analysis #difference
- Differential privacy in data publication and analysis (YY, ZZ, GM, MW, XX), pp. 601–606.
- VLDB-2012-AgrawalAW #in the cloud #perspective
- Secure and Privacy-Preserving Data Services in the Cloud: A Data Centric View (DA, AEA, SW), pp. 2028–2029.
- VLDB-2012-CaoK #robust
- Publishing Microdata with a Robust Privacy Guarantee (JC, PK), pp. 1388–1399.
- VLDB-2012-LiM #adaptation #difference #query
- An Adaptive Mechanism for Accurate Query Answering under Differential Privacy (CL, GM), pp. 514–525.
- VLDB-2012-LiQSC #difference #mining #named
- PrivBasis: Frequent Itemset Mining with Differential Privacy (NL, WHQ, DS, JC), pp. 1340–1351.
- VLDB-2012-TerrovitisLMS
- Privacy Preservation by Disassociation (MT, JL, NM, SS), pp. 944–955.
- VLDB-2012-YuanZWXYH #difference #optimisation #query #rank
- Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy (GY, ZZ, MW, XX, YY, ZH), pp. 1352–1363.
- VLDB-2012-ZhangZXYW #analysis #difference #functional
- Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
- CHI-2012-Barkhuus #human-computer #using
- The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI (LB), pp. 367–376.
- CIKM-2012-BonomiXCF
- Frequent grams based embedding for privacy preserving record linkage (LB, LX, RC, BCMF), pp. 1597–1601.
- CIKM-2012-DhiaAS #named #network #social
- Primates: a privacy management system for social networks (IBD, TA, MS), pp. 2746–2748.
- CIKM-2012-DinhST #network #online #social
- The walls have ears: optimize sharing for visibility and privacy in online social networks (TND, YS, MTT), pp. 1452–1461.
- CIKM-2012-FanX #difference #monitoring #realtime
- Real-time aggregate monitoring with differential privacy (LF, LX), pp. 2169–2173.
- CIKM-2012-ZerrSH #classification #exclamation #image #retrieval
- PicAlert!: a system for privacy-aware image classification and retrieval (SZ, SS, JSH), pp. 2710–2712.
- ICPR-2012-NodariVG #artificial reality #image
- Digital privacy: Replacing pedestrians from Google Street View images (AN, MV, IG), pp. 2889–2893.
- ICPR-2012-OGorman #fault #segmentation #video
- Video privacy filters with tolerance to segmentation errors for video conferencing and surveillance (LO), pp. 1835–1838.
- SEKE-2012-DoranCG #api #how #network #social
- How Social Network APIs Have Ended the Age of Privacy (DD, SC, SSG), pp. 400–405.
- SIGIR-2012-ZerrSHD #classification #image
- Privacy-aware image classification and search (SZ, SS, JSH, ED), pp. 35–44.
- TOOLS-EUROPE-2012-CatanoHR #formal method #named #network #policy #social
- Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
- POPL-2012-BartheKOB #difference #probability #reasoning #relational
- Probabilistic relational reasoning for differential privacy (GB, BK, FO, SZB), pp. 97–110.
- POPL-2012-YangYS #automation #policy
- A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
- QAPL-2012-PalamidessiS #algebra #bound #constraints #difference #relational
- Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems (CP, MS), pp. 92–105.
- RE-2012-TunBPYHON #mobile #requirements
- Privacy arguments: Analysing selective disclosure requirements for mobile applications (TTT, AKB, BAP, YY, CBH, IO, BN), pp. 131–140.
- ASE-2012-OmoronyiaPSCDN #adaptation #named
- Caprice: a tool for engineering adaptive privacy (IO, LP, MS, LC, GD, BN), pp. 354–357.
- ASE-2012-XiaoTFHM #analysis
- User-aware privacy control via extended static-information-flow analysis (XX, NT, MF, JdH, MM), pp. 80–89.
- ICSE-2012-PetersM #fault #predict
- Privacy and utility for defect prediction: Experiments with MORPH (FP, TM), pp. 189–199.
- SAC-2012-BasuVDK #case study #collaboration #performance
- Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study (AB, JV, TD, HK), pp. 447–452.
- SAC-2012-CuellarOR
- Indistinguishable regions in geographic privacy (JC, MO, RR), pp. 1463–1469.
- SAC-2012-MannS #android #detection #framework #static analysis
- A framework for static detection of privacy leaks in android applications (CM, AS), pp. 1457–1462.
- OSDI-2012-DunnLJKSXSW
- Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels (AMD, MZL, SJ, SK, MS, YX, VS, EW), pp. 61–75.
- OSDI-2012-GiffinLSTMMR #named #web
- Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
- STOC-2012-Li #design
- Design extractors, non-malleable condensers and privacy amplification (XL), pp. 837–854.
- LICS-2012-Feigenbaum
- Privacy, Anonymity, and Accountability in Ad-Supported Services (JF), pp. 9–10.
- ICDAR-2011-DuL #identification
- Preservative License Plate De-identification for Privacy Protection (LD, HL), pp. 468–472.
- PODS-2011-DavidsonKMPR
- Provenance views for module privacy (SBD, SK, TM, DP, SR), pp. 175–186.
- PODS-2011-HeBWN #complexity #on the
- On the complexity of privacy-preserving complex event processing (YH, SB, DW, JFN), pp. 165–174.
- SIGMOD-2011-BajajS #database #hardware #named
- TrustedDB: a trusted hardware based database with privacy and data confidentiality (SB, RS), pp. 205–216.
- SIGMOD-2011-GaoYJZWY #distance
- Neighborhood-privacy protected shortest distance computing in cloud (JG, JXY, RJ, JZ, TW, DY), pp. 409–420.
- SIGMOD-2011-HayLMPT #data transformation #network
- Privacy-aware data management in information networks (MH, KL, GM, JP, ET), pp. 1201–1204.
- SIGMOD-2011-KiferM
- No free lunch in data privacy (DK, AM), pp. 193–204.
- SIGMOD-2011-XiaoBHG #difference #fault #named
- iReduct: differential privacy with reduced relative errors (XX, GB, MH, JG), pp. 229–240.
- VLDB-2011-ChenMFDX #difference
- Publishing Set-Valued Data via Differential Privacy (RC, NM, BCMF, BCD, LX), pp. 1087–1098.
- VLDB-2012-LinJZXL11 #performance #query
- A MovingObject Index for Efficient Query Processing with Peer-Wise Location Privacy (DL, CSJ, RZ, LX, JL), pp. 37–48.
- SIGITE-2011-LevySB #trust
- A trust-aware tag-based privacy control for eHealth 2.0 (KL, BS, YB), pp. 251–256.
- ICALP-v2-2011-AlvimACP #data flow #difference #on the
- On the Relation between Differential Privacy and Quantitative Information Flow (MSA, MEA, KC, CP), pp. 60–76.
- ICALP-v2-2011-GoodrichM #outsourcing #ram #simulation
- Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
- CHI-2011-AyyavuJ #feedback #heuristic #security
- Integrating user feedback with heuristic security and privacy management systems (PA, CJ), pp. 2305–2314.
- CHI-2011-GillVPJ #analysis #taxonomy
- Privacy dictionary: a linguistic taxonomy of privacy for content analysis (AJG, AV, CP, ANJ), pp. 3227–3236.
- CHI-2011-NguyenBBH #empirical #video
- Situating the concern for information privacy through an empirical study of responses to video recording (DHN, AB, AGB, GRH), pp. 3207–3216.
- CHI-2011-RaijGKS #mobile #risk management #smarttech
- Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment (AR, AG, SK, MBS), pp. 11–20.
- CSCW-2011-BoltonKV #scalability
- Privacy and sharing information on spherical and large flat displays (JB, KK, RV), pp. 573–574.
- CSCW-2011-PatilPK #navigation #question #social
- With a little help from my friends: can social navigation inform interpersonal privacy preferences? (SP, XP, AK), pp. 391–394.
- DUXU-v2-2011-CoopamootooA #communication #evaluation #online
- A Systematic Evaluation of the Communicability of Online Privacy Mechanisms with Respect to Communication Privacy Management (PLC, DA), pp. 384–393.
- HIMI-v1-2011-Asahi #behaviour #research #ubiquitous
- Privacy Concern in Ubiquitous Society and Research on Consumer Behavior (YA), pp. 291–300.
- HIMI-v1-2011-Ibrahim #network #online #perspective #social
- Exploring Informational Privacy Perceptions in the Context of Online Social Networks: A Phenomenology Perspective (ENMI), pp. 330–338.
- HIMI-v1-2011-NguyenV #behaviour #online #question
- Does Privacy Information Influence Users’ Online Purchasing Behavior? (JHN, KPLV), pp. 349–358.
- OCSC-2011-CarstensG #interface #network #question #social
- Is Your Social Networking Privacy Reliant on Intuitive Interfaces? (DSC, VG), pp. 309–318.
- CIKM-2011-BaigLLW #independence #multi
- Cloning for privacy protection in multiple independent data publications (MMB, JL, JL, HW), pp. 885–894.
- CIKM-2011-BanerjeeC #distributed #feature model #using
- Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
- CIKM-2011-HsuC #analysis #component #independence
- Privacy preservation by independent component analysis and variance control (CMH, MSC), pp. 925–930.
- CIKM-2011-LiLSG #community #named #online #performance #recommendation #social
- YANA: an efficient privacy-preserving recommender system for online social communities (DL, QL, LS, NG), pp. 2269–2272.
- CIKM-2011-MajumdarRIV #information management #quality
- Privacy protected knowledge management in services with emphasis on quality data (DM, RC, SI, KV), pp. 1889–1894.
- CIKM-2011-PelekisGVKT #query
- Privacy-aware querying over sensitive trajectory data (NP, AGD, MV, DK, YT), pp. 895–904.
- CIKM-2011-TangWLMP #network
- Privacy preserving indexing for eHealth information networks (YT, TW, LL, SM, BP), pp. 905–914.
- KDD-2011-Cormode #learning
- Personal privacy vs population privacy: learning to attack anonymization (GC), pp. 1253–1261.
- KDD-2011-GundechaBL #network #social
- Exploiting vulnerability to secure user privacy on a social networking site (PG, GB, HL), pp. 511–519.
- KDD-2011-LeeOYK #semantics #using
- Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
- KDD-2011-PedarsaniG #network #on the
- On the privacy of anonymized networks (PP, MG), pp. 1235–1243.
- KDD-2011-TaiYYC #network #social
- Privacy-preserving social network publication against friendship attacks (CHT, PSY, DNY, MSC), pp. 1262–1270.
- KMIS-2011-SaharkhizS #multi #network #social
- A Method for Preserving Privacy in Published Multi-relational Social Networks (AS, HRS), pp. 341–346.
- SEKE-2011-KimLZKLS #approach #configuration management #modelling
- A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC (SK, YTL, YZ, DKK, LL, VS), pp. 666–671.
- SIGIR-2011-ChenBSCG #named #performance #personalisation #web
- UPS: efficient privacy protection in personalized web search (GC, HB, LS, KC, YG), pp. 615–624.
- ESEC-FSE-2011-TanejaGGX #testing
- Testing software in age of data privacy: a balancing act (KT, MG, RG, TX), pp. 201–211.
- SAC-2011-AhluwaliaGCY #mining
- Target-based privacy preserving association rule mining (MA, AG, ZC, YY), pp. 962–967.
- SAC-2011-RahmanHA11a #named #quantifier #towards
- ProQuPri: towards anonymity protection with privacy quantification for context-aware applications (FR, MEH, SIA), pp. 453–454.
- SAC-2011-RayNDF #interactive #verification
- Verification of data pattern for interactive privacy preservation model (SR, MFN, SD, BCMF), pp. 1716–1723.
- STOC-2011-Smith #convergence #estimation #statistics
- Privacy-preserving statistical estimation with optimal convergence rates (AS), pp. 813–822.
- ECDL-2010-HeidingerBHBM #folksonomy
- Privacy-Aware Folksonomies (CH, EB, MH, KB, JMQ), pp. 156–167.
- PODS-2010-GupteS
- Universally optimal privacy mechanisms for minimax agents (MG, MS), pp. 135–146.
- PODS-2010-KiferL #axiom #statistics #towards
- Towards an axiomatization of statistical privacy and utility (DK, BRL), pp. 147–158.
- PODS-2010-LiHRMM #difference #linear #optimisation #query
- Optimizing linear counting queries under differential privacy (CL, MH, VR, GM, AM), pp. 123–134.
- SIGMOD-2010-ChengFL #morphism #named #network
- K-isomorphism: privacy preserving network publication against structural attacks (JC, AWCF, JL), pp. 459–470.
- SIGMOD-2010-CurtmolaDRS #community #online #query
- Load-balanced query dissemination in privacy-aware online communities (EC, AD, KKR, DS), pp. 471–482.
- SIGMOD-2010-ElmeleegyOEA #integration #peer-to-peer
- Preserving privacy and fairness in peer-to-peer data integration (HE, MO, AKE, AMA), pp. 759–770.
- SIGMOD-2010-NabeelSZB #named
- Mask: a system for privacy-preserving policy-based access to published content (MN, NS, JZ, EB), pp. 1239–1242.
- SIGMOD-2010-WongMC
- Non-homogeneous generalization in privacy preserving data publishing (WKW, NM, DWLC), pp. 747–758.
- VLDB-2010-ChaytorW
- Small Domain Randomization: Same Privacy, More Utility (RC, KW), pp. 608–618.
- VLDB-2010-PangDX #query
- Embellishing Text Search Queries To Protect User Privacy (HP, XD, XX), pp. 598–607.
- VLDB-2010-PapadopoulosBP #nearest neighbour
- Nearest Neighbor Search with Strong Location Privacy (SP, SB, DP), pp. 619–629.
- VLDB-2010-VimercatiFJPS
- Fragments and Loose Associations: Respecting Privacy in Data Publishing (SDCdV, SF, SJ, SP, PS), pp. 1370–1381.
- VLDB-2011-YuanCY10 #network #personalisation #social
- Personalized Privacy Protection in Social Networks (MY, LC, PSY), pp. 141–150.
- SIGITE-2010-RutherfoordR #internet #security
- Privacy and ethical concerns in internet security (RHR, JKR), pp. 131–134.
- ICALP-v2-2010-BlockiW #complexity #problem
- Resolving the Complexity of Some Data Privacy Problems (JB, RW), pp. 393–404.
- ICFP-2010-ReedP #calculus #difference #distance
- Distance makes the types grow stronger: a calculus for differential privacy (JR, BCP), pp. 157–168.
- VS-Games-2010-VilelaCMSMPMM #challenge #grid
- Privacy Challenges and Methods for Virtual Classrooms in Second Life Grid and OpenSimulator (AV, MC, DM, AS, LM, HP, PM0, LM), pp. 167–174.
- CHI-2010-BesmerL
- Moving beyond untagging: photo privacy in a tagged world (AB, HRL), pp. 1563–1572.
- CHI-2010-BirnholtzJ #comprehension #independence #interactive
- Independence and interaction: understanding seniors’ privacy and awareness needs for aging in place (JPB, MJR), pp. 143–152.
- CHI-2010-KelleyCBC #approach #online #standard
- Standardizing privacy notices: an online study of the nutrition label approach (PGK, LC, JB, LFC), pp. 1573–1582.
- CHI-2010-LipfordWWFR #comparison #interface #policy #visual notation
- Visual vs. compact: a comparison of privacy policy interfaces (HRL, JW, MW, KF, RWR), pp. 1111–1114.
- CHI-2010-StutzmanK #behaviour #facebook
- Friends only: examining a privacy-enhancing behavior in facebook (FS, JKD), pp. 1553–1562.
- CHI-2010-WilliamsonRSMJB #social
- Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous (JW, SR, CDS, RMS, MJ, SAB), pp. 1485–1494.
- ICEIS-HCI-2010-Mital #mobile
- Consumer Privacy Being Raided and Invaded — The Negative Side of Mobile Advertising (MM), pp. 117–123.
- CIKM-2010-BonifatiWL #distributed #named #peer-to-peer #social
- SPac: a distributed, peer-to-peer, secure and privacy-aware social space (AB, WHW, RL), pp. 1953–1954.
- CIKM-2010-FreniVMBJ #network
- Preserving location and absence privacy in geo-social networks (DF, CRV, SM, CB, CSJ), pp. 309–318.
- ICML-2010-SakumaA #online #predict
- Online Prediction with Privacy (JS, HA), pp. 935–942.
- KDD-2010-FriedmanS #data mining #difference #mining
- Data mining with differential privacy (AF, AS), pp. 493–502.
- KDD-2010-JinZZD
- Versatile publishing for privacy preservation (XJ, MZ, NZ, GD), pp. 353–362.
- KDD-2010-LinC #outsourcing #random
- Privacy-preserving outsourcing support vector machines with random transformation (KPL, MSC), pp. 363–372.
- KDD-2010-YangNSS #data mining #mining
- Collusion-resistant privacy-preserving data mining (BY, HN, IS, JS), pp. 483–492.
- RecSys-2010-BaglioniBBCFVP #lightweight #mobile #recommendation
- A lightweight privacy preserving SMS-based recommendation system for mobile users (EB, LB, LB, UMC, LF, AV, GP), pp. 191–198.
- REFSQ-2010-IslamMW #elicitation #framework #requirements #security #towards
- Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations (SI, HM, SW), pp. 255–261.
- SAC-2010-ChakrabartiCGM #analysis #linear
- Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
- SAC-2010-CuzzocreaB #distributed #framework #multi #xml
- A secure multiparty computation privacy preserving OLAP framework over distributed XML data (AC, EB), pp. 1666–1673.
- SAC-2010-DAngeloVZ #web
- Content cloaking: preserving privacy with Google Docs and other web applications (GD, FV, SZ), pp. 826–830.
- DATE-2010-BalaschVP #embedded #framework
- An embedded platform for privacy-friendly road charging applications (JB, IV, BP), pp. 867–872.
- OSDI-2010-EnckGCCJMS #data flow #monitoring #named #realtime #smarttech
- TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones (WE, PG, BGC, LPC, JJ, PM, AS), pp. 393–407.
- PDP-2010-Ulltveit-MoeO #classification
- Privacy Violation Classification of Snort Ruleset (NUM, VAO), pp. 654–658.
- STOC-2010-ChandranKOR
- Privacy amplification with asymptotically optimal entropy loss (NC, BK, RO, LR), pp. 785–794.
- STOC-2010-DworkNPR #difference
- Differential privacy under continual observation (CD, MN, TP, GNR), pp. 715–724.
- STOC-2010-HardtT #difference #geometry #on the
- On the geometry of differential privacy (MH, KT), pp. 705–714.
- STOC-2010-RothR #interactive
- Interactive privacy via the median mechanism (AR, TR), pp. 765–774.
- PODS-2009-RastogiHMS #query
- Relationship privacy: output perturbation for queries with joins (VR, MH, GM, DS), pp. 107–116.
- SIGMOD-2009-DasguptaZDC #database #how #question #why
- Privacy preservation of aggregates in hidden databases: why and how? (AD, NZ, GD, SC), pp. 153–164.
- SIGMOD-2009-Kifer #theorem
- Attacks on privacy and deFinetti’s theorem (DK), pp. 127–138.
- SIGMOD-2009-McSherry #data analysis #framework #platform #query
- Privacy integrated queries: an extensible platform for privacy-preserving data analysis (FM), pp. 19–30.
- SIGMOD-2009-NehmeLBR #approach #data type #named #security #towards
- StreamShield: a stream-centric approach towards security and privacy in data stream environments (RVN, HSL, EB, EAR), pp. 1027–1030.
- VLDB-2009-MozafariZ #classification #naive bayes
- Publishing Naive Bayesian Classifiers: Privacy without Accuracy Loss (BM, CZ), pp. 1173–1185.
- VLDB-2009-WangL #mobile #network
- Privacy-Aware Mobile Services over Road Networks (TW, LL), pp. 1042–1053.
- VLDB-2009-XiaoTC #multi #random
- Optimal Random Perturbation at Multiple Privacy Levels (XX, YT, MC), pp. 814–825.
- VLDB-2009-ZouCO09a #framework #morphism #named #network
- K-Automorphism: A General Framework For Privacy Preserving Network Publication (LZ, LC, MTÖ), pp. 946–957.
- FM-2009-TschantzW #formal method
- Formal Methods for Privacy (MCT, JMW), pp. 1–15.
- CHI-2009-EgelmanTCA #online
- Timing is everything?: the effects of timing and placement of online privacy indicators (SE, JYT, LFC, AA), pp. 319–328.
- CHI-2009-KlasnjaCJGLPW #quote
- “When I am on Wi-Fi, I am fearless”: privacy concerns & practices in everyday Wi-Fi use (PVK, SC, JJ, BG, LL, PP, DW), pp. 1993–2002.
- CHI-2009-NovW #social
- Social computing privacy concerns: antecedents and effects (ON, SW), pp. 333–336.
- HIMI-DIE-2009-TarasewichNS #mobile #security
- Exploring Employee Perspectives on Information Privacy and Security in the Mobile Environment (PT, BN, MS), pp. 171–180.
- HIMI-II-2009-Bunnig #ubiquitous
- Smart Privacy Management in Ubiquitous Computing Environments (CB), pp. 131–139.
- HIMI-II-2009-MinC #approach #generative #personalisation
- An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection (WHM, YGC), pp. 185–191.
- CIKM-2009-Duan
- Privacy without noise (YD), pp. 1517–1520.
- CIKM-2009-LeeLLZ
- Navigational path privacy protection: navigational path privacy protection (KCKL, WCL, HVL, BZ), pp. 691–700.
- CIKM-2009-Muntes-MuleroN #dataset #scalability
- Privacy and anonymization for very large datasets (VMM, JN), pp. 2117–2118.
- KDD-2009-LiL #on the #trade-off
- On the tradeoff between privacy and utility in data publishing (TL, NL), pp. 517–526.
- KDD-2009-McSherryM #recommendation
- Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders (FM, IM), pp. 627–636.
- KDD-2009-ProvostDHZM #network #online #social
- Audience selection for on-line brand advertising: privacy-friendly social network targeting (FJP, BD, RH, XZ, AM), pp. 707–716.
- KDIR-2009-Zhan #collaboration #data mining #mining
- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
- KEOD-2009-Zhan #collaboration #data mining #mining
- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
- KMIS-2009-Zhan #collaboration #data mining #mining
- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
- MLDM-2009-ZhuFF #classification
- Preserving Privacy in Time Series Data Classification by Discretization (YZ, YF, HF), pp. 53–67.
- RecSys-2009-ShokriPTH #collaboration #distributed
- Preserving privacy in collaborative filtering through distributed aggregation of offline profiles (RS, PP, GT, JPH), pp. 157–164.
- SEKE-2009-Abu-NimehMM #requirements #security
- Integrating Privacy Requirements into Security Requirements Engineering (SAN, SM, NRM), pp. 542–547.
- SEKE-2009-ChaoS #clustering #data type
- Privacy-preserving Clustering of Data Streams (CMC, CCS), pp. 530–535.
- SPLC-2009-HendricksonWHTK #modelling #personalisation
- Modeling PLA variation of privacy-enhancing personalized systems (SAH, YW, AvdH, RNT, AK), pp. 71–80.
- SAC-2009-FungCDX
- Privacy protection for RFID data (BCMF, MC, BCD, HX), pp. 1528–1535.
- SAC-2009-HoqueRA #authentication #protocol #robust #security #using
- Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
- SAC-2009-MonjurA #framework #towards
- Towards a landmark influence framework to protect location privacy (MM, SIA), pp. 219–220.
- SAC-2009-Vaidya #linear #programming
- Privacy-preserving linear programming (JV), pp. 2002–2007.
- SAC-2009-XuLQ #predict
- Privacy preserving churn prediction (SX, SL, MQ), pp. 1610–1614.
- STOC-2009-DworkL #difference #robust #statistics
- Differential privacy and robust statistics (CD, JL), pp. 371–380.
- STOC-2009-GhoshRS
- Universally utility-maximizing privacy mechanisms (AG, TR, MS), pp. 351–360.
- PODS-2008-EvfimievskiFW
- Epistemic privacy (AVE, RF, DPW), pp. 171–180.
- SIGMOD-2008-ChowMH #monitoring #named #network
- Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks (CYC, MFM, TH), pp. 1307–1310.
- SIGMOD-2008-DuTZ #named #quantifier
- Privacy-MaxEnt: integrating background knowledge in privacy quantification (WD, ZT, ZZ), pp. 459–472.
- SIGMOD-2008-LiTX #proximity
- Preservation of proximity privacy in publishing numerical sensitive data (JL, YT, XX), pp. 473–486.
- SIGMOD-2008-XiaoT #analysis #statistics
- Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
- VLDB-2008-BuFWCL #composition
- Privacy preserving serial data publishing by role composition (YB, AWCF, RCWW, LC, JL), pp. 845–856.
- VLDB-2008-TerrovitisMK
- Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
- VLDB-2008-ZerrN #distributed #documentation #framework
- Privacy preserving document indexing infrastructure for a distributed environment (SZ, WN), pp. 1638–1643.
- SEFM-2008-SalasK #modelling #policy #testing #using
- Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
- CSCW-2008-IgnatPON #collaboration #multi
- Providing awareness in multi-synchronous collaboration without compromising privacy (CLI, SP, GO, MCN), pp. 659–668.
- CIKM-2008-JonesKPT
- Vanity fair: privacy in querylog bundles (RJ, RK, BP, AT), pp. 853–862.
- CIKM-2008-JurczykX #database
- Privacy-preserving data publishing for horizontally partitioned databases (PJ, LX), pp. 1321–1322.
- CIKM-2008-KorolovaMNX #network #social
- Link privacy in social networks (AK, RM, SUN, YX), pp. 289–298.
- CIKM-2008-PanXM #mobile
- Protecting location privacy against location-dependent attack in mobile services (XP, JX, XM), pp. 1475–1476.
- ICML-2008-SakumaKW #learning
- Privacy-preserving reinforcement learning (JS, SK, RNW), pp. 864–871.
- ICPR-2008-MoncrieffVW #visual notation
- Context aware privacy in visual surveillance (SM, SV, GAWW), pp. 1–4.
- KDD-2008-BrickellS #cost analysis
- The cost of privacy: destruction of data-mining utility in anonymized data publishing (JB, VS), pp. 70–78.
- KDD-2008-ChowGS #detection #using
- Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
- KDD-2008-GantaKS #composition
- Composition attacks and auxiliary information in data privacy (SRG, SPK, AS), pp. 265–273.
- KDD-2008-YuFRKRDL #analysis
- Privacy-preserving cox regression for survival analysis (SY, GF, RR, SK, RBR, CDO, PL), pp. 1034–1042.
- SEKE-2008-Chao #classification #data type
- Privacy-preserving Classification of Data Streams (CMC), pp. 603–606.
- SAC-2008-BodorikJW #consistency #semantics
- Consistent privacy preferences (CPP): model, semantics, and properties (PB, DNJ, MXW), pp. 2368–2375.
- SAC-2008-GantaA #adaptation #enterprise
- Adaptive data anonymization against information fusion based privacy attacks on enterprise data (SRG, RA), pp. 1075–1076.
- SAC-2008-HeSVA
- Privacy-preserving link discovery (XH, BS, JV, NRA), pp. 909–915.
- SAC-2008-HuangKV #challenge
- Privacy preservation services: challenges and solutions (DH, VK, MV), pp. 2110–2115.
- ASPLOS-2008-CastroCM #debugging
- Better bug reporting with better privacy (MC, MC, JPM), pp. 319–328.
- PDP-2008-KaropoulosKG #protocol
- Privacy Protection in Context Transfer Protocol (GK, GK, SG), pp. 590–596.
- STOC-2008-BlumLR #approach #database #learning
- A learning theory approach to non-interactive database privacy (AB, KL, AR), pp. 609–618.
- ICLP-2008-BonattiCOS #security #trust
- Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
- WICSA-2007-CardosoI #architecture #overview #pervasive
- Architecting Pervasive Computing Systems for Privacy: A Survey (RSC, VI), p. 26.
- PODS-2007-BarakCDKMT #consistency
- Privacy, accuracy, and consistency too: a holistic solution to contingency table release (BB, KC, CD, SK, FM, KT), pp. 273–282.
- SIGMOD-2007-ScannapiecoFBE
- Privacy preserving schema and data matching (MS, IF, EB, AKE), pp. 653–664.
- SIGMOD-2007-StahlbergML #analysis #database #forensics
- Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
- SIGMOD-2007-XiaoT #dataset #named #towards
- M-invariance: towards privacy preserving re-publication of dynamic datasets (XX, YT), pp. 689–700.
- VLDB-2007-ChenRL #multi
- Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge (BCC, RR, KL), pp. 770–781.
- VLDB-2007-Liu #algorithm #modelling
- From Data Privacy to Location Privacy: Models and Algorithms (LL), pp. 1429–1430.
- VLDB-2007-PapadimitriouLKY
- Time Series Compressibility and Privacy (SP, FL, GK, PSY), pp. 459–470.
- VLDB-2007-RastogiHS #bound
- The Boundary Between Privacy and Utility in Data Publishing (VR, SH, DS), pp. 531–542.
- VLDB-2007-WongFWP
- Minimality Attack in Privacy Preserving Data Publishing (RCWW, AWCF, KW, JP), pp. 543–554.
- CHI-2007-AhernEGKNN #mobile #online
- Over-exposed?: privacy patterns and considerations in online and mobile photo sharing (SA, DE, NG, SK, MN, RN), pp. 357–366.
- HCI-IPT-2007-CaoE #towards
- Influence of Culture on Attitude Towards Instant Messaging: Balance Between Awareness and Privacy (JC, AE), pp. 236–240.
- HCI-MIE-2007-CulenR #design #personalisation #security
- Designing Personalized Media Center with Focus on Ethical Issues of Privacy and Security (ALC, YR), pp. 829–835.
- HIMI-IIE-2007-Bhargav-SpantzelSYB #requirements
- Privacy Requirements in Identity Management Solutions (ABS, ACS, MY, EB), pp. 694–702.
- HIMI-IIE-2007-DarkM
- Privacy and the Public Educator (MD, CM), pp. 289–298.
- HIMI-IIE-2007-KrachinaRT #ontology #perspective #policy #semantics
- Reconciling Privacy Policies and Regulations: Ontological Semantics Perspective (OK, VR, KET), pp. 730–739.
- HIMI-IIE-2007-ProctorVA #specification #usability
- Usability of User Agents for Privacy-Preference Specification (RWP, KPLV, MAA), pp. 766–776.
- HIMI-IIE-2007-VuCGCSNPP #how #policy
- How Users Read and Comprehend Privacy Policies (KPLV, VC, FPG, BC, JS, DN, RP, RWP), pp. 802–811.
- HIMI-IIE-2007-VuGNSCCP #online #question #what
- Examining User Privacy Practices While Shopping Online: What Are Users Looking for? (KPLV, FPG, DN, JS, BC, VC, RWP), pp. 792–801.
- CAiSE-2007-HamadiPB #concept #modelling #protocol #web #web service
- Conceptual Modeling of Privacy-Aware Web Service Protocols (RH, HYP, BB), pp. 233–248.
- EDOC-2007-Kerschbaum #benchmark #enterprise #metric
- Building a Privacy-Preserving Benchmarking Enterprise System (FK), pp. 87–96.
- ICEIS-DISI-2007-NowalczykT #approach
- A policy-based privacy storage approach (JN, FTC), pp. 605–608.
- CIKM-2007-JonesKPT #query #quote #what
- “I know what you did last summer”: query logs and user privacy (RJ, RK, BP, AT), pp. 909–914.
- KDD-2007-Kleinberg #challenge #mining #network #process #social
- Challenges in mining social network data: processes, privacy, and paradoxes (JMK), pp. 4–5.
- KDD-2007-WanNHL
- Privacy-preservation for gradient descent methods (LW, WKN, SH, VCSL), pp. 775–783.
- MLDM-2007-TanN #data mining #mining #probability #re-engineering
- Generic Probability Density Function Reconstruction for Randomization in Privacy-Preserving Data Mining (VYFT, SKN), pp. 76–90.
- RecSys-2007-BerkovskyEKR #collaboration #distributed
- Enhancing privacy and preserving accuracy of a distributed collaborative filtering (SB, YE, TK, FR), pp. 9–16.
- SIGIR-2007-JiangSL
- Protecting source privacy in federated search (WJ, LS, JL), pp. 761–762.
- SAC-2007-KoralalageRMGC #approach #lifecycle #security
- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
- SAC-2007-LinL #mining #transaction
- Privacy preserving itemset mining through fake transactions (JLL, JYCL), pp. 375–379.
- SAC-2007-LoukidesS
- Capturing data usefulness and privacy protection in K-anonymisation (GL, JS), pp. 370–374.
- SAC-2007-PolatD #using
- Effects of inconsistently masked data using RPT on CF with privacy (HP, WD), pp. 649–653.
- STOC-2007-DworkMT
- The price of privacy and the limits of LP decoding (CD, FM, KT), pp. 85–94.
- PODS-2006-MachanavajjhalaG #on the #performance
- On the efficiency of checking perfect privacy (AM, JG), pp. 163–172.
- PODS-2006-MishraS #pseudo #sketching
- Privacy via pseudorandom sketches (NM, MS), pp. 143–152.
- SIGMOD-2006-XiaoT #personalisation
- Personalized privacy preservation (XX, YT), pp. 229–240.
- VLDB-2006-MokbelCA #query
- The New Casper: Query Processing for Location Services without Compromising Privacy (MFM, CYC, WGA), pp. 763–774.
- VLDB-2006-XiaoT #effectiveness #named
- Anatomy: Simple and Effective Privacy Preservation (XX, YT), pp. 139–150.
- ICALP-v2-2006-Dwork #difference
- Differential Privacy (CD), pp. 1–12.
- CHI-2006-HawkeyI #comprehension
- Keeping up appearances: understanding the dimensions of incidental information privacy (KH, KMI), pp. 821–830.
- CHI-2006-IachelloTAHS #experience #prototype #ubiquitous
- Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world (GI, KNT, GDA, GRH, MMS), pp. 1009–1018.
- CHI-2006-KaratKBF #authoring #interface #policy
- Evaluating interfaces for privacy policy rule authoring (CMK, JK, CB, JF), pp. 83–92.
- CHI-2006-MarchF #women
- Girls, technology and privacy: “is my mother listening?” (WM, CF), pp. 107–110.
- CHI-2006-TangKFH #approach #people
- Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (KPT, PK, JF, JIH), pp. 93–102.
- CSCW-2006-KhalilC
- Context-aware telephony: privacy preferences and sharing patterns (AK, KC), pp. 469–478.
- CIKM-2006-KapoorPTT #database #distributed #mining
- Privacy preserving sequential pattern mining in distributed databases (VK, PP, FT, MT), pp. 758–767.
- KDD-2006-AggarwalPZ #data mining #mining #on the
- On privacy preservation against adversarial data mining (CCA, JP, BZ), pp. 510–516.
- KDD-2006-WongLFW
- (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing (RCWW, JL, AWCF, KW), pp. 754–759.
- SIGIR-2006-FrankowskiCSTR #risk management #what
- You are what you say: privacy risks of public mentions (DF, DC, SS, LGT, JR), pp. 565–572.
- SPLC-2006-WangKHW #personalisation #runtime #web
- PLA-based Runtime Dynamism in Support of Privacy-Enhanced Web Personalization (YW, AK, AvdH, JW), pp. 151–162.
- SAC-2006-AimeurBFO
- Privacy-preserving demographic filtering (EA, GB, JMF, FSMO), pp. 872–878.
- SAC-2006-BaragliaLOSS #recommendation #web
- A privacy preserving web recommender system (RB, CL, SO, MS, FS), pp. 559–563.
- SAC-2006-GuoW #data mining #mining #on the #using
- On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
- SAC-2006-YoussefAA #mobile #semantics
- Semantically enhanced enforcement of mobile consumer’s privacy preferences (MY, NRA, VA), pp. 1172–1176.
- SAC-2006-YuJV #kernel #using
- Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
- PODS-2005-BlumDMN #framework
- Practical privacy: the SuLQ framework (AB, CD, FM, KN), pp. 128–138.
- PODS-2005-Gehrke #analysis #modelling #tutorial
- Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
- PODS-2005-ZhongYW
- Privacy-enhancing k-anonymization of customer data (SZ, ZY, RNW), pp. 139–147.
- SIGMOD-2005-AgrawalST
- Privacy Preserving OLAP (RA, RS, DT), pp. 251–262.
- VLDB-2005-ZhangZ #distributed #information management
- Distributed Privacy Preserving Information Sharing (NZ, WZ), pp. 889–900.
- TLCA-2005-MatwinFHC #data mining #formal method #mining #using
- Privacy in Data Mining Using Formal Methods (SM, APF, ITH, VC), pp. 278–292.
- CHI-2005-IachelloA #adaptation #design #evaluation #ubiquitous
- Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing (GI, GDA), pp. 91–100.
- CHI-2005-PatilL #configuration management #what
- Who gets to know what when: configuring privacy permissions in an awareness application (SP, JL), pp. 101–110.
- CIKM-2005-FanLHB #approach #novel #video
- A novel approach for privacy-preserving video sharing (JF, HL, MSH, EB), pp. 609–616.
- CIKM-2005-XiongSK #database #learning #multi
- Privacy leakage in multi-relational databases via pattern based semi-supervised learning (HX, MS, VK), pp. 355–356.
- KDD-2005-JagannathanW #clustering #distributed
- Privacy-preserving distributed k-means clustering over arbitrarily partitioned data (GJ, RNW), pp. 593–599.
- KDD-2005-ZhangWZ #classification
- A new scheme on privacy-preserving data classification (NZ, SW, WZ), pp. 374–383.
- SAC-2005-PolatD #collaboration
- SVD-based collaborative filtering with privacy (HP, WD), pp. 791–795.
- SAC-2005-ZhangM #learning
- Privacy preserving learning in negotiation (SZ, FM), pp. 821–825.
- CADE-2005-DufayFM #data flow #information management #ml
- Privacy-Sensitive Information Flow with JML (GD, APF, SM), pp. 116–130.
- ECDL-2004-Holmstrom #paradigm #policy #standard
- Managing a Paradigm Shift — Aligning Management, Privacy Policy, Technology and Standards (JH), pp. 442–451.
- VLDB-2004-AbiteboulABCFMS #distributed #peer-to-peer
- An Electronic Patient Record “on Steroids”: Distributed, Peer-to-Peer, Secure and Privacy-conscious (SA, BA, OB, BC, IF, TM, AS), pp. 1273–1276.
- VLDB-2004-AggarwalBGGKMMSTW
- Vision Paper: Enabling Privacy for the Paranoids (GA, MB, PG, HGM, KK, NM, RM, US, DT, JW, YX), pp. 708–719.
- VLDB-2004-HoreMT #query
- A Privacy-Preserving Index for Range Queries (BH, SM, GT), pp. 720–731.
- SIGITE-2004-OrgillRBO #effectiveness #social
- The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems (GLO, GWR, MGB, PMO), pp. 177–181.
- SIGITE-2004-RomneyR #education #question
- Neglect of information privacy instruction: a case of educational malpractice? (VWR, GWR), pp. 79–82.
- CHI-2004-JensenP #evaluation #online #policy #tool support
- Privacy policies as decision-making tools: an evaluation of online privacy notices (CJ, CP), pp. 471–478.
- ICEIS-v3-2004-ZviranNH #internet
- Privacy Concerns in Internet Applications (MZ, SN, DH), pp. 592–595.
- ICPR-v4-2004-KitaharaKH
- Stealth Vision for Protecting Privacy (IK, KK, NH), pp. 404–407.
- KDD-2004-GilburdSW #distributed #named #scalability
- k-TTP: a new privacy model for large-scale distributed environments (BG, AS, RW), pp. 563–568.
- KDD-2004-KantarciogluJC #data mining #mining #question
- When do data mining results violate privacy? (MK, JJ, CC), pp. 599–604.
- KDD-2004-SanilKLR #distributed #modelling
- Privacy preserving regression modelling via distributed computation (APS, AFK, XL, JPR), pp. 677–682.
- KDD-2004-WrightY #distributed #network #semistructured data
- Privacy-preserving Bayesian network structure computation on distributed heterogeneous data (RNW, ZY), pp. 713–718.
- KDD-2004-ZhuL #data mining #mining
- Optimal randomization for privacy preserving data mining (MYZ, LL), pp. 761–766.
- SAC-2004-BackesKBS #comparison #enterprise #performance #policy
- Efficient comparison of enterprise privacy policies (MB, GK, WB, MS), pp. 375–382.
- SAC-2004-SeigneurJ #trust #ubiquitous
- Trust enhanced ubiquitous payment without too much privacy loss (JMS, CDJ), pp. 1593–1599.
- HPDC-2004-GilburdSW #data mining #mining
- Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants (BG, AS, RW), pp. 225–234.
- PODS-2003-Agrawal
- Privacy in data systems (RA), p. 37.
- PODS-2003-DinurN
- Revealing information while preserving privacy (ID, KN), pp. 202–210.
- PODS-2003-EvfimievskiGS #data mining #mining
- Limiting privacy breaches in privacy preserving data mining (AVE, JG, RS), pp. 211–222.
- VLDB-2003-BawaBA #documentation #network
- Privacy-Preserving Indexing of Documents on the Network (MB, RJBJ, RA), pp. 922–933.
- VLDB-2003-CliftonFHKLS #data transformation #e-commerce
- Privacy-Enhanced Data Management for Next-Generation e-Commerce (CC, IF, RH, BK, DFL, AS), p. 1147.
- CHI-2003-GoodK #case study #usability
- Usability and privacy: a study of Kazaa P2P file-sharing (NG, AK), pp. 137–144.
- CHI-2003-PalenD
- Unpacking “privacy” for a networked world (LP, PD), pp. 129–136.
- KDD-2003-DuZ #data mining #mining #random #using
- Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
- KDD-2003-VaidyaC #clustering
- Privacy-preserving k-means clustering over vertically partitioned data (JV, CC), pp. 206–215.
- REFSQ-J-2002-AntonEC03 #behaviour #policy #requirements #security
- Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
- RE-2003-LiuYM #analysis #requirements #security #social
- Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
- SAC-2003-BodorikJ #architecture
- Architecture for User-Controlled e-Privacy (PB, DNJ), pp. 609–616.
- SAC-2003-CazierSL #trust
- Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility (JC, BS, RSL), pp. 617–622.
- VLDB-2002-RizviH #maintenance #mining
- Maintaining Data Privacy in Association Rule Mining (SR, JRH), pp. 682–693.
- KDD-2002-EvfimievskiSAG #mining
- Privacy preserving mining of association rules (AVE, RS, RA, JG), pp. 217–228.
- KDD-2002-Iyengar #constraints
- Transforming data to satisfy privacy constraints (VSI), pp. 279–288.
- KDD-2002-VaidyaC #mining
- Privacy preserving association rule mining in vertically partitioned data (JV, CC), pp. 639–644.
- SIGIR-2002-Canny #analysis #collaboration
- Collaborative filtering with privacy via factor analysis (JFC), pp. 238–245.
- RE-2002-AntonER #requirements #taxonomy #using
- Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy (AIA, JBE, AR), pp. 23–31.
- PODS-2001-AgrawalA #algorithm #data mining #design #mining #on the #quantifier
- On the Design and Quantification of Privacy Preserving Data Mining Algorithms (DA, CCA).
- CHI-2001-ShoemakerI
- Single display privacyware: augmenting public displays with private information (GBDS, KI), pp. 522–529.
- ICEIS-v2-2001-GochenouerT #internet #trust
- Privacy Audits and Trust: The Internet Dilemma (JEG, MLT), pp. 905–909.
- ICEIS-v2-2001-GochenouerT01a #internet
- Voyeurism, Exhibitionism, and Privacy on the Internet (JEG, MLT), pp. 910–914.
- TOOLS-USA-2001-McClure #delivery #how #security
- Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
- RE-2001-AntonEAP #policy #requirements
- The Role of Policy and Stakeholder Privacy Values in Requirements Engineering (AIA, JBE, TAA, CP), pp. 138–145.
- RE-2001-Spafford #security
- The Hidden Meta-Requirements of Security and Privacy (EHS), p. 10.
- SIGMOD-2000-AgrawalS #data mining #mining
- Privacy-Preserving Data Mining (RA, RS), pp. 439–450.
- CSCW-2000-BoyleEG #video
- The effects of filtered video on awareness and privacy (MB, CE, SG), pp. 1–10.
- CSCW-2000-GodefroidyHJL #approach #automation #verification
- Ensuring privacy in presence awareness: an automated verification approach (PG, JDH, LJJ, DL), pp. 59–68.
- KDD-2000-Catlett #data mining #mining
- Among those dark electronic mills: privacy and data mining (JC), p. 4.
- STOC-1998-GertnerIKM #information retrieval
- Protecting Data Privacy in Private Information Retrieval Schemes (YG, YI, EK, TM), pp. 151–160.
- ADL-1997-WinslettCJS #library #policy #security #transaction #web
- Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies (MW, NC, VEJ, IS), pp. 140–152.
- HCI-CC-1997-PaulD #concept #design #multi
- Privacy and Acting in Groups-Key Concepts in Designing Multimedia-Supported Cooperative Work (HP, SD), pp. 281–284.
- CSCW-1996-HudsonS #trade-off
- Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems (SEH, IES), pp. 248–257.
- STOC-1996-KushilevitzOR #linear
- Characterizing Linear Size Circuits in Terms of Privacy (EK, RO, AR), pp. 541–550.
- STOC-1995-FranklinY
- Secure hypergraphs: privacy from partial broadcast (MKF, MY), pp. 36–44.
- STOC-1989-ChorK
- A Zero-One Law for Boolean Privacy (BC, EK), pp. 62–72.
- PODS-1982-ReissPD
- Non-reversible Privacy Transformations (SPR, MJP, TD), pp. 139–146.
- VLDB-1978-Davida #security
- Security and Privacy (GID), p. 54.
- VLDB-1978-HsiaoKM #database #security
- Privacy and Security of Data Communications and Data Bases (DKH, DSK, SEM), pp. 55–67.
- SIGFIDET-1971-Browne #bibliography #perspective
- Data Privacy and Integrity: An Overview (PSB), pp. 237–240.
- SIGFIDET-1971-Dean #data transformation #online #requirements
- Data Privacy and Integrity Requirements for Online Data Management Systems (ALDJ), pp. 279–298.