Tag #privacy
532 papers:
ASPLOS-2020-MireshghallahTR #learning #named- Shredder: Learning Noise Distributions to Protect Inference Privacy (FM, MT, PR, AJ, DMT, HE), pp. 3–18.
CC-2020-ZhangHLBR #case study #difference #profiling- A study of event frequency profiling with differential privacy (HZ, YH, SL, RB, AR), pp. 51–62.
ICSME-2019-LiuCLCRS #evolution- Continuous Collateral Privacy Risk Auditing of Evolving Autonomous Driving Software (CL, KC, ZL, ZC, DR, FS), p. 363.
SCAM-2019-0006LBR #analysis #android- Introducing Privacy in Screen Event Frequency Analysis for Android Apps (HZ0, SL, RB, AR), pp. 268–279.
- ICFP-2019-ZhangRHP0 #difference #logic #named
- Fuzzi: a three-level logic for differential privacy (HZ, ER, AH, BCP, AR0), p. 28.
CIKM-2019-BiswasGRB #approximate #clustering- Privacy Preserving Approximate K-means Clustering (CB, DG, DR, UB), pp. 1321–1330.
CIKM-2019-BoutetG #what- Inspect What Your Location History Reveals About You: Raising user awareness on privacy threats associated with disclosing his location data (AB, SG), pp. 2861–2864.
CIKM-2019-MaZLH0J #collaboration #data analysis #health- Privacy-Preserving Tensor Factorization for Collaborative Health Data Analysis (JM, QZ, JL, JCH, LX0, XJ), pp. 1291–1300.
CIKM-2019-TangFXLH - Achieve Privacy-Preserving Truth Discovery in Crowdsensing Systems (JT, SF, MX, YL, KH), pp. 1301–1310.
CIKM-2019-WangZYLYRS - Privacy-preserving Crowd-guided AI Decision-making in Ethical Dilemmas (TW, JZ, HY, JL, XY, XR, SS), pp. 1311–1320.
CIKM-2019-Zhang0LFW - Practical Access Pattern Privacy by Combining PIR and Oblivious Shuffle (ZZ, KW0, WL, AWCF, RCWW), pp. 1331–1340.
ICML-2019-AminKMV #bound #difference #trade-off- Bounding User Contributions: A Bias-Variance Trade-off in Differential Privacy (KA, AK, AMM, SV), pp. 263–271.
ICML-2019-BrutzkusGE #latency- Low Latency Privacy Preserving Inference (AB, RGB, OE), pp. 812–821.
ICML-2019-McKennaSM #difference #estimation #modelling- Graphical-model based estimation and inference for differential privacy (RM, DS, GM), pp. 4435–4444.
ICML-2019-MirshaniRS #functional- Formal Privacy for Functional Data with Gaussian Perturbations (AM, MR, ABS), pp. 4595–4604.
ICML-2019-Wang019a #difference #linear #on the- On Sparse Linear Regression in the Local Differential Privacy Model (DW, JX0), pp. 6628–6637.
ICML-2019-ZhuW #difference- Poission Subsampled Rényi Differential Privacy (YZ0, YXW), pp. 7634–7642.
KDD-2019-LiX #data mining #mining #named #scalability- PrivPy: General and Scalable Privacy-Preserving Data Mining (YL, WX), pp. 1299–1307.
KDD-2019-WangYMHLS #named- SurfCon: Synonym Discovery on Privacy-Aware Clinical Data (ZW, XY, SM, YH, SML, HS), pp. 1578–1586.
KDD-2019-XiaLGLCS #case study #detection #mobile #network #social- Characterizing and Detecting Malicious Accounts in Privacy-Centric Mobile Social Networks: A Case Study (ZX, CL, NZG, QL0, YC0, DS), pp. 2012–2022.
OOPSLA-2019-NearDASGWSZSSS #difference #higher-order #linear #named #type system- Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy (JPN, DD, CA, TS, PG, LW, NS, MZ0, NS, AS, DS), p. 30.
OOPSLA-2019-SalvaneschiKSHE #distributed #query- Language-integrated privacy-aware distributed queries (GS, MK, DS, PH, SE, MM), p. 30.
PLDI-2019-WangDWKZ #difference #execution #proving- Proving differential privacy with shadow execution (YW, ZD, GW, DK, DZ), pp. 655–669.
FASE-2019-TootsTYDGLMPPPT #analysis #process- Business Process Privacy Analysis in Pleak (AT, RT, MY, MD, LGB, PL, RM, AP, MP, PP, JT), pp. 306–312.
ICSA-2018-Yasaweerasinghelage #architecture #data analysis #modelling #performance #predict #simulation #using- Predicting the Performance of Privacy-Preserving Data Analytics Using Architecture Modelling and Simulation (RY, MS, IW, HYP), pp. 166–175.
FM-2018-FernandesDM #data flow #perspective- Processing Text for Privacy: An Information Flow Perspective (NF, MD, AM), pp. 3–21.
FSCD-2018-Delaune #encryption #protocol- Analysing Privacy-Type Properties in Cryptographic Protocols (Invited Talk) (SD), p. 21.
CIKM-2018-BuenrostroTRPC #ecosystem #semistructured data- Single-Setup Privacy Enforcement for Heterogeneous Data Ecosystems (IB, AT, VR, EP, ZC), pp. 1943–1946.
CIKM-2018-DeutchGM #detection #using- Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (DD, YG, TM), pp. 1935–1938.
CIKM-2018-DingZB0 #graph #scalability- Privacy-Preserving Triangle Counting in Large Graphs (XD, XZ, ZB, HJ0), pp. 1283–1292.
CIKM-2018-KenthapadiT #framework #named- PriPeARL: A Framework for Privacy-Preserving Analytics and Reporting at LinkedIn (KK, TTLT), pp. 2183–2191.
CIKM-2018-NguyenH #flexibility #modelling #parametricity- Privacy Protection for Flexible Parametric Survival Models (TTN, SCH), pp. 1273–1282.
CIKM-2018-SunZY #encoding #random- Randomized Bit Vector: Privacy-Preserving Encoding Mechanism (LS, LZ, XY), pp. 1263–1272.
CIKM-2018-ZhongS0 #automation #detection #multi #towards- Toward Automated Multiparty Privacy Conflict Detection (HZ, ACS, DJM0), pp. 1811–1814.
ICML-2018-0001ZK #constraints #scalability #summary- Scalable Deletion-Robust Submodular Maximization: Data Summarization with Privacy and Fairness Constraints (EK0, MZ, AK), pp. 2549–2558.
ICML-2018-BalleW #difference- Improving the Gaussian Mechanism for Differential Privacy: Analytical Calibration and Optimal Denoising (BB, YXW), pp. 403–412.
ICML-2018-NeelR #adaptation #bias #difference- Mitigating Bias in Adaptive Data Gathering via Differential Privacy (SN, AR0), pp. 3717–3726.
ICML-2018-ZhangKL #algorithm #distributed- Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms (XZ, MMK, ML), pp. 5791–5800.
KDD-2018-Abowd #difference- The U.S. Census Bureau Adopts Differential Privacy (JMA), p. 2867.
KDD-2018-LeeK #adaptation- Concentrated Differentially Private Gradient Descent with Adaptive per-Iteration Privacy Budget (JL, DK), pp. 1656–1665.
KDD-2018-LiMSGLDQ0 #performance- An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery (YL, CM, LS, JG0, QL0, BD, ZQ, KR0), pp. 1705–1714.
KDD-2018-NiuZWTGC #correlation #statistics- Unlocking the Value of Privacy: Trading Aggregate Statistics over Private Correlated Data (CN, ZZ, FW0, ST, XG, GC), pp. 2031–2040.
KDD-2018-ShengTWXZN #email #information management #scalability- Anatomy of a Privacy-Safe Large-Scale Information Extraction System Over Email (YS0, ST, JBW, JX0, QZ, MN), pp. 734–743.
KDD-2018-WangZBZCY #learning #mobile #performance- Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud (JW0, JZ, WB, XZ, BC, PSY), pp. 2407–2416.
POPL-2018-AlbarghouthiH #difference #proving- Synthesizing coupling proofs of differential privacy (AA, JH), p. 30.
ESEC-FSE-2018-Hosseini #android #natural language #policy #semantics- Semantic inference from natural language privacy policies and Android code (MBH), pp. 940–943.
- ICSE-2018-HadarHATBSB #design #developer
- Privacy by designers: software developers' privacy mindset (IH, TH, OA, ET, MB, SS, AB), p. 396.
- ICSE-2018-WangQHSB0 #android #named #policy
- GUILeak: tracing privacy policy claims on user input data for Android applications (XW, XQ, MBH, RS, TDB, JN0), pp. 37–47.
ICSME-2017-FanLZZZ #algorithm #challenge #empirical #fault #predict- The Utility Challenge of Privacy-Preserving Data-Sharing in Cross-Company Defect Prediction: An Empirical Study of the CLIFF&MORPH Algorithm (YF, CL, XZ, GZ, YZ), pp. 80–90.
- ICFP-2017-Winograd-CortHR #adaptation #difference #framework
- A framework for adaptive differential privacy (DWC, AH, AR0, BCP), p. 29.
CIKM-2017-EslamiBRW #online- Privacy of Hidden Profiles: Utility-Preserving Profile Removal in Online Forums (SE, AJB, RSR, GW), pp. 2063–2066.
CIKM-2017-LyuHLP #collaboration #learning #process #recognition- Privacy-Preserving Collaborative Deep Learning with Application to Human Activity Recognition (LL, XH, YWL, MP), pp. 1219–1228.
CIKM-2017-Mondal0L #distributed #email #profiling- Privacy Aware Temporal Profiling of Emails in Distributed Setup (SM, MS0, SL), pp. 1229–1238.
CIKM-2017-WangGLZJ #physics- From Fingerprint to Footprint: Revealing Physical World Privacy Leakage by Cyberspace Cookie Logs (HW, CG, YL0, ZLZ, DJ), pp. 1209–1218.
ICML-2017-AgarwalS #difference #learning #online- The Price of Differential Privacy for Online Learning (NA, KS), pp. 32–40.
ICML-2017-RubinsteinA #difference #random- Pain-Free Random Differential Privacy with Sensitivity Sampling (BIPR, FA), pp. 2950–2959.
KDD-2017-XieBLZ #distributed #learning #multi- Privacy-Preserving Distributed Multi-Task Learning with Asynchronous Updates (LX, IMB, KL, JZ), pp. 1195–1204.
ECMFA-2017-AhmadianSRJ #analysis #ecosystem #industrial #modelling- Model-Based Privacy Analysis in Industrial Ecosystems (ASA, DS, VR, JJ), pp. 215–231.
POPL-2017-ZhangK #automation #difference #named #proving #towards- LightDP: towards automating differential privacy proofs (DZ, DK), pp. 888–901.
ASE-2017-Guerriero #data-driven- Privacy-aware data-intensive applications (MG), pp. 1030–1033.
ESEC-FSE-2017-AhmadianPRJ #analysis #modelling #security- Model-based privacy and security analysis with CARiSMA (ASA, SP, QR, JJ), pp. 989–993.
ESEC-FSE-2017-DijkCHB #modelling #network #re-engineering- Model-driven software engineering in practice: privacy-enhanced filtering of network traffic (RvD, CC, JvdH, JvdB), pp. 860–865.
FASE-2017-AydinPTFP #mobile #policy #visual notation- Visual Configuration of Mobile Privacy Policies (AA, DP, OT, PF, MP), pp. 338–355.
CIKM-2016-HuangGHZC #named- PARC: Privacy-Aware Data Cleaning (DH, DG, YH, ZZ, FC), pp. 2433–2436.
CIKM-2016-JiangYCZY #network #query #reachability- Privacy-Preserving Reachability Query Services for Massive Networks (JJ, PY, BC, ZZ, XY0), pp. 145–154.
CIKM-2016-ZhangLDCKS #big data #locality #scalability #using- Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation (XZ, CL, WD, JC, KR, ZS), pp. 1793–1802.
ICML-2016-KairouzBR #estimation- Discrete Distribution Estimation under Local Privacy (PK, KB, DR), pp. 2436–2444.
KDD-2016-IyerNS #estimation- Privacy-preserving Class Ratio Estimation (ASI, JSN, SS), pp. 925–934.
KDD-2016-YuanYZH #approximate #difference #linear #optimisation #query- Convex Optimization for Linear Query Processing under Approximate Differential Privacy (GY, YY, ZZ, ZH), pp. 2005–2014.
ASE-2016-Keng #automation #behaviour #mobile #testing- Automated testing and notification of mobile app privacy leak-cause behaviours (JCJK), pp. 880–883.
ASE-2016-QiJZWC #estimation #learning #obfuscation #subclass- Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation (FQ, XYJ, XZ, FW, LC), pp. 75–86.
FSE-2016-Omoronyia #reasoning- Reasoning with imprecise privacy preferences (IO), pp. 952–955.
- ICSE-2016-SlavinWHHKBBN #android #detection #framework #policy #towards
- Toward a framework for detecting privacy policy violations in android application code (RS, XW, MBH, JH, RK, JB, TDB, JN0), pp. 25–36.
CASE-2016-FernandesYDS #detection #smarttech #social- Detection of privacy-sensitive situations for social robots in smart homes (FEFJ, GY, HMD, WS), pp. 727–732.
CASE-2016-KuoPWCXF #community- Dynamic demand-side management with user's privacy concern in residential community (HHK, SKP, CLW, PHC, YX, LCF), pp. 1094–1099.
CASE-2016-MahlerHNPCG #in the cloud- Privacy-preserving Grasp Planning in the Cloud (JM, BH, SN, FTP, RC, KG), pp. 468–475.
SIGMOD-2015-AllardHMP #clustering #named- Chiaroscuro: Transparency and Privacy for Massive Personal Time-Series Clustering (TA, GH, FM, EP), pp. 779–794.
SIGMOD-2015-YangSN #correlation #difference- Bayesian Differential Privacy on Correlated Data (BY, IS, HN), pp. 747–762.
VLDB-2015-GuerraouiKPT #difference #named #recommendation- D2P: Distance-Based Differential Privacy in Recommenders (RG, AMK, RP, MT), pp. 862–873.
VLDB-2015-HuYYDCYGZ #big data #difference #framework #platform- Differential Privacy in Telco Big Data Platform (XH, MY, JY, YD, LC, QY, HG, JZ), pp. 1692–1703.
VLDB-2015-RahmanLT0D #database #ranking- Privacy Implications of Database Ranking (MFR, WL, ST, NZ, GD), pp. 1106–1117.
EDM-2015-GasevicMPPSZ - Ethics and Privacy in EDM (DG, TM, ZAP, MP, JCS, ORZ), p. 13.
EDM-2015-SabourinKFM #data mining #education #industrial #mining #student- Student Privacy and Educational Data Mining: Perspectives from Industry (JS, LK, CF, SWM), pp. 164–170.
FM-2015-BringerCML #architecture #design #reasoning- Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures (JB, HC, DLM, RL), pp. 90–107.
CHI-2015-AhmedHCCK #behaviour #people #visual notation- Privacy Concerns and Behaviors of People with Visual Impairments (TA, RH, KC, DJC, AK), pp. 3523–3532.
CHI-2015-AlmuhimediSSAAG #case study #exclamation #mobile- Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging (HA, FS, NMS, IA, AA, JG, LFC, YA), pp. 787–796.
CHI-2015-ClarkSMK #comprehension #image #quote- “I Saw Images I Didn’t Even Know I Had”: Understanding User Perceptions of Cloud Storage Privacy (JWC, PS, DM, CK), pp. 1641–1644.
CHI-2015-EgelmanKC #crowdsourcing #platform #ubiquitous- Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms (SE, RK, RC), pp. 1669–1678.
CHI-2015-HoyleTACK #analysis #smarttech- Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
CHI-2015-LaseckiGLLBD #behaviour #crowdsourcing #trade-off #video- Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding (WSL, MG, WL, EL, JPB, SPD), pp. 1945–1954.
CHI-2015-PatilHSKL #feedback- Interrupt Now or Inform Later?: Comparing Immediate and Delayed Privacy Feedback (SP, RH, RS, AK, AJL), pp. 1415–1418.
CHI-2015-RenaudM - Regulating Access to Adult Content (with Privacy Preservation) (KR, JM), pp. 4019–4028.
CHI-2015-ShihLW #smarttech- Privacy Tipping Points in Smartphones Privacy Preferences (FS, IL, DJW), pp. 807–816.
CHI-2015-WangGXZYB #interactive #named #using #visualisation- VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
CSCW-2015-JiaWXRC #behaviour #learning #online #process- Risk-taking as a Learning Process for Shaping Teen’s Online Information Privacy Behaviors (HJ, PJW, HX, MBR, JMC), pp. 583–599.
CSCW-2015-KumarS #facebook #women- The Modern Day Baby Book: Enacting Good Mothering and Stewarding Privacy on Facebook (PK, SYS), pp. 1302–1312.
CSCW-2015-PapoutsiB #health- Privacy as Articulation Work in HIV Health Services (CP, IB), pp. 339–348.
CSCW-2015-WisniewskiIKP #network #social- Give Social Network Users the Privacy They Want (PJW, AKMNI, BPK, SP), pp. 1427–1441.
CSCW-2015-WisniewskiJXRC #behaviour #how #quote #social #social media- “Preventative” vs. “Reactive”: How Parental Mediation Influences Teens’ Social Media Privacy Behaviors (PJW, HJ, HX, MBR, JMC), pp. 302–316.
ICEIS-v2-2015-SmirnovP #architecture #hybrid #network #peer-to-peer #recommendation- Privacy-preserving Hybrid Peer-to-Peer Recommendation System Architecture — Locality-Sensitive Hashing in Structured Overlay Network (AVS, AP), pp. 532–542.
ICEIS-v3-2015-RosaZ #mobile #network #social- Location-sharing Model in Mobile Social Networks with Privacy Guarantee (TAR, SDZ), pp. 44–54.
CIKM-2015-ChenYC #clustering #difference- WaveCluster with Differential Privacy (LC, TY, RC), pp. 1011–1020.
CIKM-2015-LiP #multi #named #network- ReverseCloak: Protecting Multi-level Location Privacy over Road Networks (CL0, BP), pp. 673–682.
CIKM-2015-XiaKWHVM - Process-Driven Data Privacy (WX, MK, ZW, RH, YV, BAM), pp. 1021–1030.
CIKM-2015-YeZMJZ #approach #consistency #learning #multi #rank- Rank Consistency based Multi-View Learning: A Privacy-Preserving Approach (HJY, DCZ, YM, YJ0, ZHZ), pp. 991–1000.
ICML-2015-KairouzOV #composition #difference #theorem- The Composition Theorem for Differential Privacy (PK, SO, PV), pp. 1376–1385.
ICML-2015-WangFS #for free #monte carlo #probability- Privacy for Free: Posterior Sampling and Stochastic Gradient Monte Carlo (YXW, SEF, AJS), pp. 2493–2502.
KDD-2015-KarakasidisKV #scalability- Scalable Blocking for Privacy Preserving Record Linkage (AK, GK, VSV), pp. 527–536.
KDD-2015-LeeWK #consistency #constraints #difference- Maximum Likelihood Postprocessing for Differential Privacy under Consistency Constraints (JL, YW, DK), pp. 635–644.
RecSys-2015-BerliozFKBB #difference #matrix- Applying Differential Privacy to Matrix Factorization (AB, AF, MAK, RB, SB), pp. 107–114.
SIGIR-2015-YangS #information retrieval #security- Privacy-Preserving IR 2015: When Information Retrieval Meets Privacy and Security (HY, IS), pp. 1157–1158.
POPL-2015-BartheGAHRS #approximate #design #difference #higher-order #refinement #relational- Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy (GB, MG, EJGA, JH, AR, PYS), pp. 55–68.
POPL-2015-EbadiSS #difference- Differential Privacy: Now it’s Getting Personal (HE, DS, GS), pp. 69–81.
ICSE-v1-2015-LiBBKTARBOM #android #component #detection #named- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
ICSE-v1-2015-PetersML #fault #named #predict- LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction (FP, TM, LL), pp. 801–811.
ICSE-v2-2015-AnthonysamyR #in the large #re-engineering- Software Engineering for Privacy in-the-Large (PA, AR), pp. 947–948.
SAC-2015-BarnPB #approach #evaluation #requirements- An approach to early evaluation of informational privacy requirements (BSB, GP, RB), pp. 1370–1375.
SAC-2015-BassoMJV #architecture #design #evaluation #requirements #web- Requirements, design and evaluation of a privacy reference architecture for web applications and services (TB, RM, MJ, MV), pp. 1425–1432.
SAC-2015-HuangSZSXD #pseudo- A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs (JH, MS, SZ, YS, CCX, QD), pp. 688–694.
SAC-2015-Moawad0FKT #adaptation #ubiquitous- Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (AM, TH, FF, JK, YLT), pp. 2271–2278.
CASE-2015-HandokoL #delivery #order #performance- Efficient order sharing with privacy preservation via double auction with split delivery (SDH, HCL), pp. 69–74.
DAC-2015-SadeghiWW #challenge #industrial #internet #security- Security and privacy challenges in industrial internet of things (ARS, CW, MW), p. 6.
DAC-2015-SonghoriHSK #logic #nearest neighbour #synthesis #using- Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
DATE-2015-KonstantinouKM #encryption #functional #verification- Privacy-preserving functional IP verification utilizing fully homomorphic encryption (CK, AK, MM), pp. 333–338.
PDP-2015-CostantinoS #design #development #facebook- Design and Development of a Facebook Application to Raise Privacy Awareness (GC, DS), pp. 583–586.
LICS-2015-Kifer - Privacy and the Price of Data (DK), p. 16.
VMCAI-2015-CortesiFPT #mobile #policy #semantics #verification- Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications (AC, PF, MP, OT), pp. 61–79.
DocEng-2014-DavisonMM #named #semantics #similarity- P-GTM: privacy-preserving google tri-gram method for semantic text similarity (OD, AM, EEM), pp. 81–84.
HT-2014-SquicciariniCB #image #web- Analyzing images’ privacy for the modern web (ACS, CC, RB), pp. 136–147.
SIGMOD-2014-Dev14a #community #detection #graph #precise #social- Privacy preserving social graphs for high precision community detection (HD), pp. 1615–1616.
SIGMOD-2014-HeMD #policy #trade-off #using- Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
VLDB-2014-LiHMW #algorithm #difference #query- A Data- and Workload-Aware Query Answering Algorithm for Range Queries Under Differential Privacy (CL, MH, GM, YW), pp. 341–352.
VLDB-2014-LiLWB #in the cloud #performance #query- Fast Range Query Processing with Strong Privacy Protection for Cloud Computing (RL, AXL, ALW, BB), pp. 1953–1964.
VLDB-2014-LiXZJ #named- DPSynthesizer: Differentially Private Data Synthesizer for Privacy Preserving Data Sharing (HL, LX, LZ, XJ), pp. 1677–1680.
VLDB-2014-ToGS #crowdsourcing #framework- A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing (HT, GG, CS), pp. 919–930.
SEFM-2014-PardoS #framework #network #policy #social- A Formal Privacy Policy Framework for Social Networks (RP, GS), pp. 378–392.
CHI-PLAY-2014-SuknotCRK #game studies #named- Immaculacy: a game of privacy (AS, TC, NR, PGK), pp. 383–386.
CHI-2014-0005LACFS #facebook- A field trial of privacy nudges for facebook (YW, PGL, AA, LFC, AF, NMS), pp. 2367–2376.
CHI-2014-DaviesLCEFKS #network #personalisation #pervasive- Personalisation and privacy in future pervasive display networks (ND, ML, SC, IE, AF, TK, BS), pp. 2357–2366.
CHI-2014-DenningDK #artificial reality- In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies (TD, ZD, TK), pp. 2377–2386.
CHI-2014-HarbachHWS #communication #security #using- Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
CHI-2014-KobsaKL #behaviour #personalisation- Let’s do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization (AK, BPK, BL), pp. 81–90.
CHI-2014-ShklovskiMSB #mobile- Leakiness and creepiness in app space: perceptions of privacy and mobile app use (IS, SDM, HHS, HB), pp. 2347–2356.
CSCW-2014-MurphyRX #case study #collaboration- Privacy practices in collaborative environments: a study of emergency department staff (ARM, MCR, HX), pp. 269–282.
ICEIS-v3-2014-ObsivacBB #performance #student- Do Desperate Students Trade Their Privacy for a Hope? — An Evidence of the Privacy Settings Influence on the User Performance (TO, HB, MB), pp. 156–161.
CIKM-2014-DongLW #as a service #named- PraDa: Privacy-preserving Data-Deduplication-as-a-Service (BD, RL, WHW), pp. 1559–1568.
CIKM-2014-SongG #difference #named #query- Aroma: A New Data Protection Method with Differential Privacy and Accurate Query Answering (CS, TG), pp. 1569–1578.
CIKM-2014-VatsalanC #database #multi #scalability- Scalable Privacy-Preserving Record Linkage for Multiple Databases (DV, PC), pp. 1795–1798.
CIKM-2014-YeMAG #approach #visual notation- Negative FaceBlurring: A Privacy-by-Design Approach to Visual Lifelogging with Google Glass (TY, BM, RA, CG), pp. 2036–2038.
ICPR-2014-InaiPFFU - Selective Concealment of Characters for Privacy Protection (KI, MP, VF, YF, SU), pp. 333–338.
ICPR-2014-ZhangLNT - Anonymous Camera for Privacy Protection (YZ, YL, HN, RiT), pp. 4170–4175.
KDD-2014-AcsC #case study- A case study: privacy preserving release of spatio-temporal density in paris (GÁ, CC), pp. 1679–1688.
KDD-2014-LuM #difference #estimation #exponential #graph #random- Exponential random graph estimation under differential privacy (WL, GM), pp. 921–930.
KDD-2014-RamakrishnanW #question #social- Does social good justify risking personal privacy? (RR, GIW), p. 1965.
KDD-2014-ZhuXGC #mobile #recommendation #security- Mobile app recommendations with security and privacy awareness (HZ, HX, YG, EC), pp. 951–960.
KEOD-2014-KruppS0 #mobile #ontology #policy #security- An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
SIGIR-2014-SiY #information retrieval #security- Privacy-preserving IR: when information retrieval meets privacy and security (LS, HY), p. 1295.
RE-2014-Anton #security- Now more than ever: Privacy and security are required (AIA), p. 2.
RE-2014-BreauxS #policy #requirements #scalability- Scaling requirements extraction to the crowd: Experiments with privacy policies (TDB, FS), pp. 163–172.
ICSE-2014-ShethKM #case study #requirements- Us and them: a study of privacy requirements across north america, asia, and europe (SS, GEK, WM), pp. 859–870.
ICSE-2014-ThomasBPN #mobile #requirements- Distilling privacy requirements for mobile applications (KT, AKB, BAP, BN), pp. 871–882.
SAC-2014-A #authentication #health #mobile #network #research #student- Student research abstract: a privacy-preserving profile matching based authentication system for mobile health networks (DHA), pp. 196–197.
SAC-2014-BaeLKWP #network #social- Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
SAC-2014-BarbosaBAC #lightweight- Lightweight privacy for smart metering data by adding noise (PB, AB, HA, SC), pp. 531–538.
SAC-2014-BasuCKMVG0M #feedback #social- Privacy preserving trusted social feedback (AB, JCC, SK, SM, JV, GG, JZ, YM), pp. 1706–1711.
SAC-2014-LabdaMS #modelling #process- Modeling of privacy-aware business processes in BPMN to protect personal data (WL, NM, PS), pp. 1399–1405.
SAC-2014-PetrlicLS - Privacy-preserving reputation management (RP, SL, CS), pp. 1712–1718.
STOC-2014-BunUV #approximate #difference- Fingerprinting codes and the price of approximate differential privacy (MB, JU, SPV), pp. 1–10.
STOC-2014-DworkTT0 #analysis #bound #component- Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
CAV-2014-ChowdhuryJGD #monitoring #policy #runtime- Temporal Mode-Checking for Runtime Monitoring of Privacy Policies (OC, LJ, DG, AD), pp. 131–149.
LICS-CSL-2014-FredriksonJ #approach #satisfiability- Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
SIGMOD-2013-BonomiXL #integration #named- LinkIT: privacy preserving record linkage and integration via transformations (LB, LX, JJL), pp. 1029–1032.
SIGMOD-2013-ChenZ #difference #recursion #strict #towards- Recursive mechanism: towards node differential privacy and unrestricted joins (SC, SZ), pp. 653–664.
SIGMOD-2013-LinK #estimation #statistics- Information preservation in statistical privacy and bayesian estimation of unattributed histograms (BRL, DK), pp. 677–688.
VLDB-2013-Bonomi #difference #mining- Mining Frequent Patterns with Differential Privacy (LB), pp. 1422–1427.
VLDB-2013-KellarisP #difference- Practical Differential Privacy via Grouping and Smoothing (GK, SP), pp. 301–312.
VLDB-2013-XueZZXYTJZ #named #predict- DesTeller: A System for Destination Prediction Based on Trajectories with Privacy Protection (AYX, RZ, YZ, XX, JY, YT), pp. 1198–1201.
VLDB-2013-ZhangWYMC #integration #lightweight #peer-to-peer- Lightweight Privacy-Preserving Peer-to-Peer Data Integration (YZ, WKW, SMY, NM, DWC), pp. 157–168.
SIGITE-2013-PeltsvergerZ - Hands-on privacy labs (SP, GZ), pp. 137–138.
ICALP-v2-2013-BartheO #composition #difference #logic #probability #relational #source code #theorem- Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs (GB, FO), pp. 49–60.
CHI-2013-Egelman #exclamation #facebook #trade-off #verification- My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect (SE), pp. 2369–2378.
CHI-2013-KelleyCS #process- Privacy as part of the app decision-making process (PGK, LFC, NMS), pp. 3393–3402.
CHI-2013-KnijnenburgKJ #question- Preference-based location sharing: are more privacy options really better? (BPK, AK, HJ), pp. 2667–2676.
CHI-2013-PanjwaniSSJ #comprehension #perspective #web- Understanding the privacy-personalization dilemma for web search: a user perspective (SP, NS, SS, SJ), pp. 3427–3430.
CHI-2013-SpiliotopoulosO #comprehension #facebook #metric #network- Understanding motivations for facebook use: usage metrics, network structure, and privacy (TS, IO), pp. 3287–3296.
CSCW-2013-ChenX #comprehension- Privacy management in dynamic groups: understanding information privacy in medical practices (YC, HX), pp. 541–552.
CSCW-2013-OKaneMT #health #information management- Non-static nature of patient consent: shifting privacy perspectives in health information sharing (AAO, HMM, ET), pp. 553–562.
CSCW-2013-WangGX #empirical #online #social- An online experiment of privacy authorization dialogues for social applications (NW, JG, HX), pp. 261–272.
HCI-UC-2013-Acharya #named- SP-CIP: A Secure and Privacy Aware Patient Centric Information Portal (SA), pp. 3–9.
HCI-UC-2013-HeupelBK #trust- Trust and Privacy in the di.me Userware (MH, MB, DK), pp. 39–48.
CAiSE-2013-BarhamgiBOCCMT #execution- Secure and Privacy-Preserving Execution Model for Data Services (MB, DB, SO, NCB, FC, MM, HT), pp. 35–50.
ICEIS-v3-2013-BorgesRMS #facebook- Who Is This Guy Who Liked My Picture? — Privacy Control Mechanisms on Facebook for Generations X and Y (GB, TR, CM, PCdS), pp. 179–186.
CIKM-2013-BonomiX #algorithm #difference #mining- A two-phase algorithm for mining sequential patterns with differential privacy (LB, LX), pp. 269–278.
CIKM-2013-TianCZ #approach #database #hybrid #mobile #query- A hybrid approach for privacy-preserving processing of knn queries in mobile database systems (ST, YC, QZ), pp. 1161–1164.
CIKM-2013-ZhangLL #performance #robust #streaming- An efficient and robust privacy protection technique for massive streaming choice-based information (JZ, XL, YL), pp. 1169–1172.
ECIR-2013-ArampatzisDE #web- A Versatile Tool for Privacy-Enhanced Web Search (AA, GD, PSE), pp. 368–379.
KDD-2013-JohnsonS #data analysis- Privacy-preserving data exploration in genome-wide association studies (AJ, VS), pp. 1079–1087.
KDD-2013-ShenY #difference #graph #mining- Mining frequent graph patterns with differential privacy (ES, TY), pp. 545–553.
KDD-2013-WuNTWXX #framework- A privacy preserving framework for managing vehicle data in road pricing systems (HW, WSN, KLT, WW, SX, MX), pp. 1427–1435.
SEKE-2013-MaierS - Profiles for Convenient Front-end Privacy (RM, JS), pp. 125–130.
POPL-2013-GaboardiHHNP #dependent type #difference #linear- Linear dependent types for differential privacy (MG, AH, JH, AN, BCP), pp. 357–370.
QAPL-2013-GazeauMP #difference #semantics- Preserving differential privacy under finite-precision semantics (IG, DM, CP), pp. 1–18.
RE-2013-BreauxR #analysis #formal method #multi #requirements #specification- Formal analysis of privacy requirements specifications for multi-tier applications (TDB, AR), pp. 14–20.
ICSE-2013-OmoronyiaCSPN #adaptation #requirements- Engineering adaptive privacy: on the role of privacy awareness requirements (IO, LC, MS, LP, BN), pp. 632–641.
SAC-2013-DimitriouK #energy #smarttech- Privacy-friendly tasking and trading of energy in smart grids (TD, GK), pp. 652–659.
SAC-2013-MokarizadehDMB #matrix #social- Enhancing social matrix factorization with privacy (SM, ND, MM, RB), pp. 277–278.
STOC-2013-HsuRU #difference #equilibrium- Differential privacy for the analyst via private equilibrium computation (JH, AR, JU), pp. 341–350.
STOC-2013-NikolovTZ #approximate #difference #geometry- The geometry of differential privacy: the sparse and approximate cases (AN, KT, LZ), pp. 351–360.
STOC-2013-Ullman #difference #query- Answering n{2+o(1)} counting queries with differential privacy is hard (JU), pp. 361–370.
CAV-2013-ChevalCP #how- Lengths May Break Privacy — Or How to Check for Equivalences with Length (VC, VC, AP), pp. 708–723.
PODS-2012-ChoromanskiM #algorithm #database #graph #power of #statistics- The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases (KC, TM), pp. 65–76.
PODS-2012-KiferM #framework- A rigorous and customizable framework for privacy (DK, AM), pp. 77–88.
SIGMOD-2012-HuXCY #authentication- Authenticating location-based services without compromising location privacy (HH, JX, QC, ZY), pp. 301–312.
SIGMOD-2012-MeachamS #named #sql #transaction- JustMyFriends: full SQL, full transactional amenities, and access privacy (AM, DS), pp. 633–636.
SIGMOD-2012-MohanTSSC #data analysis #named- GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
SIGMOD-2012-PengYZWY #difference #multi #named- DP-tree: indexing multi-dimensional data under differential privacy (SP, YY, ZZ, MW, YY), p. 864.
SIGMOD-2012-YangZMWX #analysis #difference- Differential privacy in data publication and analysis (YY, ZZ, GM, MW, XX), pp. 601–606.
VLDB-2012-AgrawalAW #in the cloud #perspective- Secure and Privacy-Preserving Data Services in the Cloud: A Data Centric View (DA, AEA, SW), pp. 2028–2029.
VLDB-2012-CaoK #robust- Publishing Microdata with a Robust Privacy Guarantee (JC, PK), pp. 1388–1399.
VLDB-2012-LiM #adaptation #difference #query- An Adaptive Mechanism for Accurate Query Answering under Differential Privacy (CL, GM), pp. 514–525.
VLDB-2012-LiQSC #difference #mining #named- PrivBasis: Frequent Itemset Mining with Differential Privacy (NL, WHQ, DS, JC), pp. 1340–1351.
VLDB-2012-TerrovitisLMS - Privacy Preservation by Disassociation (MT, JL, NM, SS), pp. 944–955.
VLDB-2012-YuanZWXYH #difference #optimisation #query #rank- Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy (GY, ZZ, MW, XX, YY, ZH), pp. 1352–1363.
VLDB-2012-ZhangZXYW #analysis #difference #functional- Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
CHI-2012-Barkhuus #human-computer #using- The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI (LB), pp. 367–376.
CIKM-2012-BonomiXCF - Frequent grams based embedding for privacy preserving record linkage (LB, LX, RC, BCMF), pp. 1597–1601.
CIKM-2012-DhiaAS #named #network #social- Primates: a privacy management system for social networks (IBD, TA, MS), pp. 2746–2748.
CIKM-2012-DinhST #network #online #social- The walls have ears: optimize sharing for visibility and privacy in online social networks (TND, YS, MTT), pp. 1452–1461.
CIKM-2012-FanX #difference #monitoring #realtime- Real-time aggregate monitoring with differential privacy (LF, LX), pp. 2169–2173.
CIKM-2012-ZerrSH #classification #exclamation #image #retrieval- PicAlert!: a system for privacy-aware image classification and retrieval (SZ, SS, JSH), pp. 2710–2712.
ICPR-2012-NodariVG #artificial reality #image- Digital privacy: Replacing pedestrians from Google Street View images (AN, MV, IG), pp. 2889–2893.
ICPR-2012-OGorman #fault #segmentation #video- Video privacy filters with tolerance to segmentation errors for video conferencing and surveillance (LO), pp. 1835–1838.
SEKE-2012-DoranCG #api #how #network #social- How Social Network APIs Have Ended the Age of Privacy (DD, SC, SSG), pp. 400–405.
SIGIR-2012-ZerrSHD #classification #image- Privacy-aware image classification and search (SZ, SS, JSH, ED), pp. 35–44.
TOOLS-EUROPE-2012-CatanoHR #formal method #named #network #policy #social- Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
POPL-2012-BartheKOB #difference #probability #reasoning #relational- Probabilistic relational reasoning for differential privacy (GB, BK, FO, SZB), pp. 97–110.
POPL-2012-YangYS #automation #policy- A language for automatically enforcing privacy policies (JY, KY, ASL), pp. 85–96.
QAPL-2012-PalamidessiS #algebra #bound #constraints #difference #relational- Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems (CP, MS), pp. 92–105.
RE-2012-TunBPYHON #mobile #requirements- Privacy arguments: Analysing selective disclosure requirements for mobile applications (TTT, AKB, BAP, YY, CBH, IO, BN), pp. 131–140.
ASE-2012-OmoronyiaPSCDN #adaptation #named- Caprice: a tool for engineering adaptive privacy (IO, LP, MS, LC, GD, BN), pp. 354–357.
ASE-2012-XiaoTFHM #analysis- User-aware privacy control via extended static-information-flow analysis (XX, NT, MF, JdH, MM), pp. 80–89.
ICSE-2012-PetersM #fault #predict- Privacy and utility for defect prediction: Experiments with MORPH (FP, TM), pp. 189–199.
SAC-2012-BasuVDK #case study #collaboration #performance- Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study (AB, JV, TD, HK), pp. 447–452.
SAC-2012-CuellarOR - Indistinguishable regions in geographic privacy (JC, MO, RR), pp. 1463–1469.
SAC-2012-MannS #android #detection #framework #static analysis- A framework for static detection of privacy leaks in android applications (CM, AS), pp. 1457–1462.
OSDI-2012-DunnLJKSXSW - Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels (AMD, MZL, SJ, SK, MS, YX, VS, EW), pp. 61–75.
OSDI-2012-GiffinLSTMMR #named #web- Hails: Protecting Data Privacy in Untrusted Web Applications (DBG, AL, DS, DT, DM, JCM, AR), pp. 47–60.
STOC-2012-Li #design- Design extractors, non-malleable condensers and privacy amplification (XL), pp. 837–854.
LICS-2012-Feigenbaum - Privacy, Anonymity, and Accountability in Ad-Supported Services (JF), pp. 9–10.
ICDAR-2011-DuL #identification- Preservative License Plate De-identification for Privacy Protection (LD, HL), pp. 468–472.
PODS-2011-DavidsonKMPR - Provenance views for module privacy (SBD, SK, TM, DP, SR), pp. 175–186.
PODS-2011-HeBWN #complexity #on the- On the complexity of privacy-preserving complex event processing (YH, SB, DW, JFN), pp. 165–174.
SIGMOD-2011-BajajS #database #hardware #named- TrustedDB: a trusted hardware based database with privacy and data confidentiality (SB, RS), pp. 205–216.
SIGMOD-2011-GaoYJZWY #distance- Neighborhood-privacy protected shortest distance computing in cloud (JG, JXY, RJ, JZ, TW, DY), pp. 409–420.
SIGMOD-2011-HayLMPT #data transformation #network- Privacy-aware data management in information networks (MH, KL, GM, JP, ET), pp. 1201–1204.
SIGMOD-2011-KiferM - No free lunch in data privacy (DK, AM), pp. 193–204.
SIGMOD-2011-XiaoBHG #difference #fault #named- iReduct: differential privacy with reduced relative errors (XX, GB, MH, JG), pp. 229–240.
VLDB-2011-ChenMFDX #difference- Publishing Set-Valued Data via Differential Privacy (RC, NM, BCMF, BCD, LX), pp. 1087–1098.
VLDB-2012-LinJZXL11 #performance #query- A MovingObject Index for Efficient Query Processing with Peer-Wise Location Privacy (DL, CSJ, RZ, LX, JL), pp. 37–48.
SIGITE-2011-LevySB #trust- A trust-aware tag-based privacy control for eHealth 2.0 (KL, BS, YB), pp. 251–256.
ICALP-v2-2011-AlvimACP #data flow #difference #on the- On the Relation between Differential Privacy and Quantitative Information Flow (MSA, MEA, KC, CP), pp. 60–76.
ICALP-v2-2011-GoodrichM #outsourcing #ram #simulation- Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
CHI-2011-AyyavuJ #feedback #heuristic #security- Integrating user feedback with heuristic security and privacy management systems (PA, CJ), pp. 2305–2314.
CHI-2011-GillVPJ #analysis #taxonomy- Privacy dictionary: a linguistic taxonomy of privacy for content analysis (AJG, AV, CP, ANJ), pp. 3227–3236.
CHI-2011-NguyenBBH #empirical #video- Situating the concern for information privacy through an empirical study of responses to video recording (DHN, AB, AGB, GRH), pp. 3207–3216.
CHI-2011-RaijGKS #mobile #risk management #smarttech- Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment (AR, AG, SK, MBS), pp. 11–20.
CSCW-2011-BoltonKV #scalability- Privacy and sharing information on spherical and large flat displays (JB, KK, RV), pp. 573–574.
CSCW-2011-PatilPK #navigation #question #social- With a little help from my friends: can social navigation inform interpersonal privacy preferences? (SP, XP, AK), pp. 391–394.
DUXU-v2-2011-CoopamootooA #communication #evaluation #online- A Systematic Evaluation of the Communicability of Online Privacy Mechanisms with Respect to Communication Privacy Management (PLC, DA), pp. 384–393.
HIMI-v1-2011-Asahi #behaviour #research #ubiquitous- Privacy Concern in Ubiquitous Society and Research on Consumer Behavior (YA), pp. 291–300.
HIMI-v1-2011-Ibrahim #network #online #perspective #social- Exploring Informational Privacy Perceptions in the Context of Online Social Networks: A Phenomenology Perspective (ENMI), pp. 330–338.
HIMI-v1-2011-NguyenV #behaviour #online #question- Does Privacy Information Influence Users’ Online Purchasing Behavior? (JHN, KPLV), pp. 349–358.
OCSC-2011-CarstensG #interface #network #question #social- Is Your Social Networking Privacy Reliant on Intuitive Interfaces? (DSC, VG), pp. 309–318.
CIKM-2011-BaigLLW #independence #multi- Cloning for privacy protection in multiple independent data publications (MMB, JL, JL, HW), pp. 885–894.
CIKM-2011-BanerjeeC #distributed #feature model #using- Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
CIKM-2011-HsuC #analysis #component #independence- Privacy preservation by independent component analysis and variance control (CMH, MSC), pp. 925–930.
CIKM-2011-LiLSG #community #named #online #performance #recommendation #social- YANA: an efficient privacy-preserving recommender system for online social communities (DL, QL, LS, NG), pp. 2269–2272.
CIKM-2011-MajumdarRIV #information management #quality- Privacy protected knowledge management in services with emphasis on quality data (DM, RC, SI, KV), pp. 1889–1894.
CIKM-2011-PelekisGVKT #query- Privacy-aware querying over sensitive trajectory data (NP, AGD, MV, DK, YT), pp. 895–904.
CIKM-2011-TangWLMP #network- Privacy preserving indexing for eHealth information networks (YT, TW, LL, SM, BP), pp. 905–914.
KDD-2011-Cormode #learning- Personal privacy vs population privacy: learning to attack anonymization (GC), pp. 1253–1261.
KDD-2011-GundechaBL #network #social- Exploiting vulnerability to secure user privacy on a social networking site (PG, GB, HL), pp. 511–519.
KDD-2011-LeeOYK #semantics #using- Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
KDD-2011-PedarsaniG #network #on the- On the privacy of anonymized networks (PP, MG), pp. 1235–1243.
KDD-2011-TaiYYC #network #social- Privacy-preserving social network publication against friendship attacks (CHT, PSY, DNY, MSC), pp. 1262–1270.
KMIS-2011-SaharkhizS #multi #network #social- A Method for Preserving Privacy in Published Multi-relational Social Networks (AS, HRS), pp. 341–346.
SEKE-2011-KimLZKLS #approach #configuration management #modelling- A Feature-Based Modeling Approach to Configuring Privacy and Temporality in RBAC (SK, YTL, YZ, DKK, LL, VS), pp. 666–671.
SIGIR-2011-ChenBSCG #named #performance #personalisation #web- UPS: efficient privacy protection in personalized web search (GC, HB, LS, KC, YG), pp. 615–624.
ESEC-FSE-2011-TanejaGGX #testing- Testing software in age of data privacy: a balancing act (KT, MG, RG, TX), pp. 201–211.
SAC-2011-AhluwaliaGCY #mining- Target-based privacy preserving association rule mining (MA, AG, ZC, YY), pp. 962–967.
SAC-2011-RahmanHA11a #named #quantifier #towards- ProQuPri: towards anonymity protection with privacy quantification for context-aware applications (FR, MEH, SIA), pp. 453–454.
SAC-2011-RayNDF #interactive #verification- Verification of data pattern for interactive privacy preservation model (SR, MFN, SD, BCMF), pp. 1716–1723.
STOC-2011-Smith #convergence #estimation #statistics- Privacy-preserving statistical estimation with optimal convergence rates (AS), pp. 813–822.
ECDL-2010-HeidingerBHBM #folksonomy- Privacy-Aware Folksonomies (CH, EB, MH, KB, JMQ), pp. 156–167.
PODS-2010-GupteS - Universally optimal privacy mechanisms for minimax agents (MG, MS), pp. 135–146.
PODS-2010-KiferL #axiom #statistics #towards- Towards an axiomatization of statistical privacy and utility (DK, BRL), pp. 147–158.
PODS-2010-LiHRMM #difference #linear #optimisation #query- Optimizing linear counting queries under differential privacy (CL, MH, VR, GM, AM), pp. 123–134.
SIGMOD-2010-ChengFL #morphism #named #network- K-isomorphism: privacy preserving network publication against structural attacks (JC, AWCF, JL), pp. 459–470.
SIGMOD-2010-CurtmolaDRS #community #online #query- Load-balanced query dissemination in privacy-aware online communities (EC, AD, KKR, DS), pp. 471–482.
SIGMOD-2010-ElmeleegyOEA #integration #peer-to-peer- Preserving privacy and fairness in peer-to-peer data integration (HE, MO, AKE, AMA), pp. 759–770.
SIGMOD-2010-NabeelSZB #named- Mask: a system for privacy-preserving policy-based access to published content (MN, NS, JZ, EB), pp. 1239–1242.
SIGMOD-2010-WongMC - Non-homogeneous generalization in privacy preserving data publishing (WKW, NM, DWLC), pp. 747–758.
VLDB-2010-ChaytorW - Small Domain Randomization: Same Privacy, More Utility (RC, KW), pp. 608–618.
VLDB-2010-PangDX #query- Embellishing Text Search Queries To Protect User Privacy (HP, XD, XX), pp. 598–607.
VLDB-2010-PapadopoulosBP #nearest neighbour- Nearest Neighbor Search with Strong Location Privacy (SP, SB, DP), pp. 619–629.
VLDB-2010-VimercatiFJPS - Fragments and Loose Associations: Respecting Privacy in Data Publishing (SDCdV, SF, SJ, SP, PS), pp. 1370–1381.
VLDB-2011-YuanCY10 #network #personalisation #social- Personalized Privacy Protection in Social Networks (MY, LC, PSY), pp. 141–150.
SIGITE-2010-RutherfoordR #internet #security- Privacy and ethical concerns in internet security (RHR, JKR), pp. 131–134.
ICALP-v2-2010-BlockiW #complexity #problem- Resolving the Complexity of Some Data Privacy Problems (JB, RW), pp. 393–404.
ICFP-2010-ReedP #calculus #difference #distance- Distance makes the types grow stronger: a calculus for differential privacy (JR, BCP), pp. 157–168.
VS-Games-2010-VilelaCMSMPMM #challenge #grid- Privacy Challenges and Methods for Virtual Classrooms in Second Life Grid and OpenSimulator (AV, MC, DM, AS, LM, HP, PM0, LM), pp. 167–174.
CHI-2010-BesmerL - Moving beyond untagging: photo privacy in a tagged world (AB, HRL), pp. 1563–1572.
CHI-2010-BirnholtzJ #comprehension #independence #interactive- Independence and interaction: understanding seniors’ privacy and awareness needs for aging in place (JPB, MJR), pp. 143–152.
CHI-2010-KelleyCBC #approach #online #standard- Standardizing privacy notices: an online study of the nutrition label approach (PGK, LC, JB, LFC), pp. 1573–1582.
CHI-2010-LipfordWWFR #comparison #interface #policy #visual notation- Visual vs. compact: a comparison of privacy policy interfaces (HRL, JW, MW, KF, RWR), pp. 1111–1114.
CHI-2010-StutzmanK #behaviour #facebook- Friends only: examining a privacy-enhancing behavior in facebook (FS, JKD), pp. 1553–1562.
CHI-2010-WilliamsonRSMJB #social- Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous (JW, SR, CDS, RMS, MJ, SAB), pp. 1485–1494.
ICEIS-HCI-2010-Mital #mobile- Consumer Privacy Being Raided and Invaded — The Negative Side of Mobile Advertising (MM), pp. 117–123.
CIKM-2010-BonifatiWL #distributed #named #peer-to-peer #social- SPac: a distributed, peer-to-peer, secure and privacy-aware social space (AB, WHW, RL), pp. 1953–1954.
CIKM-2010-FreniVMBJ #network- Preserving location and absence privacy in geo-social networks (DF, CRV, SM, CB, CSJ), pp. 309–318.
ICML-2010-SakumaA #online #predict- Online Prediction with Privacy (JS, HA), pp. 935–942.
KDD-2010-FriedmanS #data mining #difference #mining- Data mining with differential privacy (AF, AS), pp. 493–502.
KDD-2010-JinZZD - Versatile publishing for privacy preservation (XJ, MZ, NZ, GD), pp. 353–362.
KDD-2010-LinC #outsourcing #random- Privacy-preserving outsourcing support vector machines with random transformation (KPL, MSC), pp. 363–372.
KDD-2010-YangNSS #data mining #mining- Collusion-resistant privacy-preserving data mining (BY, HN, IS, JS), pp. 483–492.
RecSys-2010-BaglioniBBCFVP #lightweight #mobile #recommendation- A lightweight privacy preserving SMS-based recommendation system for mobile users (EB, LB, LB, UMC, LF, AV, GP), pp. 191–198.
REFSQ-2010-IslamMW #elicitation #framework #requirements #security #towards- Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations (SI, HM, SW), pp. 255–261.
SAC-2010-ChakrabartiCGM #analysis #linear- Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
SAC-2010-CuzzocreaB #distributed #framework #multi #xml- A secure multiparty computation privacy preserving OLAP framework over distributed XML data (AC, EB), pp. 1666–1673.
SAC-2010-DAngeloVZ #web- Content cloaking: preserving privacy with Google Docs and other web applications (GD, FV, SZ), pp. 826–830.
DATE-2010-BalaschVP #embedded #framework- An embedded platform for privacy-friendly road charging applications (JB, IV, BP), pp. 867–872.
OSDI-2010-EnckGCCJMS #data flow #monitoring #named #realtime #smarttech- TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones (WE, PG, BGC, LPC, JJ, PM, AS), pp. 393–407.
PDP-2010-Ulltveit-MoeO #classification- Privacy Violation Classification of Snort Ruleset (NUM, VAO), pp. 654–658.
STOC-2010-ChandranKOR - Privacy amplification with asymptotically optimal entropy loss (NC, BK, RO, LR), pp. 785–794.
STOC-2010-DworkNPR #difference- Differential privacy under continual observation (CD, MN, TP, GNR), pp. 715–724.
STOC-2010-HardtT #difference #geometry #on the- On the geometry of differential privacy (MH, KT), pp. 705–714.
STOC-2010-RothR #interactive- Interactive privacy via the median mechanism (AR, TR), pp. 765–774.
PODS-2009-RastogiHMS #query- Relationship privacy: output perturbation for queries with joins (VR, MH, GM, DS), pp. 107–116.
SIGMOD-2009-DasguptaZDC #database #how #question #why- Privacy preservation of aggregates in hidden databases: why and how? (AD, NZ, GD, SC), pp. 153–164.
SIGMOD-2009-Kifer #theorem- Attacks on privacy and deFinetti’s theorem (DK), pp. 127–138.
SIGMOD-2009-McSherry #data analysis #framework #platform #query- Privacy integrated queries: an extensible platform for privacy-preserving data analysis (FM), pp. 19–30.
SIGMOD-2009-NehmeLBR #approach #data type #named #security #towards- StreamShield: a stream-centric approach towards security and privacy in data stream environments (RVN, HSL, EB, EAR), pp. 1027–1030.
VLDB-2009-MozafariZ #classification #naive bayes- Publishing Naive Bayesian Classifiers: Privacy without Accuracy Loss (BM, CZ), pp. 1173–1185.
VLDB-2009-WangL #mobile #network- Privacy-Aware Mobile Services over Road Networks (TW, LL), pp. 1042–1053.
VLDB-2009-XiaoTC #multi #random- Optimal Random Perturbation at Multiple Privacy Levels (XX, YT, MC), pp. 814–825.
VLDB-2009-ZouCO09a #framework #morphism #named #network- K-Automorphism: A General Framework For Privacy Preserving Network Publication (LZ, LC, MTÖ), pp. 946–957.
FM-2009-TschantzW #formal method- Formal Methods for Privacy (MCT, JMW), pp. 1–15.
CHI-2009-EgelmanTCA #online- Timing is everything?: the effects of timing and placement of online privacy indicators (SE, JYT, LFC, AA), pp. 319–328.
CHI-2009-KlasnjaCJGLPW #quote- “When I am on Wi-Fi, I am fearless”: privacy concerns & practices in everyday Wi-Fi use (PVK, SC, JJ, BG, LL, PP, DW), pp. 1993–2002.
CHI-2009-NovW #social- Social computing privacy concerns: antecedents and effects (ON, SW), pp. 333–336.
HIMI-DIE-2009-TarasewichNS #mobile #security- Exploring Employee Perspectives on Information Privacy and Security in the Mobile Environment (PT, BN, MS), pp. 171–180.
HIMI-II-2009-Bunnig #ubiquitous- Smart Privacy Management in Ubiquitous Computing Environments (CB), pp. 131–139.
HIMI-II-2009-MinC #approach #generative #personalisation- An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection (WHM, YGC), pp. 185–191.
CIKM-2009-Duan - Privacy without noise (YD), pp. 1517–1520.
CIKM-2009-LeeLLZ - Navigational path privacy protection: navigational path privacy protection (KCKL, WCL, HVL, BZ), pp. 691–700.
CIKM-2009-Muntes-MuleroN #dataset #scalability- Privacy and anonymization for very large datasets (VMM, JN), pp. 2117–2118.
KDD-2009-LiL #on the #trade-off- On the tradeoff between privacy and utility in data publishing (TL, NL), pp. 517–526.
KDD-2009-McSherryM #recommendation- Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders (FM, IM), pp. 627–636.
KDD-2009-ProvostDHZM #network #online #social- Audience selection for on-line brand advertising: privacy-friendly social network targeting (FJP, BD, RH, XZ, AM), pp. 707–716.
KDIR-2009-Zhan #collaboration #data mining #mining- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
KEOD-2009-Zhan #collaboration #data mining #mining- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
KMIS-2009-Zhan #collaboration #data mining #mining- Privacy-Preserving Collaborative Data Mining (JZ), p. 15.
MLDM-2009-ZhuFF #classification- Preserving Privacy in Time Series Data Classification by Discretization (YZ, YF, HF), pp. 53–67.
RecSys-2009-ShokriPTH #collaboration #distributed- Preserving privacy in collaborative filtering through distributed aggregation of offline profiles (RS, PP, GT, JPH), pp. 157–164.
SEKE-2009-Abu-NimehMM #requirements #security- Integrating Privacy Requirements into Security Requirements Engineering (SAN, SM, NRM), pp. 542–547.
SEKE-2009-ChaoS #clustering #data type- Privacy-preserving Clustering of Data Streams (CMC, CCS), pp. 530–535.
SPLC-2009-HendricksonWHTK #modelling #personalisation- Modeling PLA variation of privacy-enhancing personalized systems (SAH, YW, AvdH, RNT, AK), pp. 71–80.
SAC-2009-FungCDX - Privacy protection for RFID data (BCMF, MC, BCD, HX), pp. 1528–1535.
SAC-2009-HoqueRA #authentication #protocol #robust #security #using- Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
SAC-2009-MonjurA #framework #towards- Towards a landmark influence framework to protect location privacy (MM, SIA), pp. 219–220.
SAC-2009-Vaidya #linear #programming- Privacy-preserving linear programming (JV), pp. 2002–2007.
SAC-2009-XuLQ #predict- Privacy preserving churn prediction (SX, SL, MQ), pp. 1610–1614.
STOC-2009-DworkL #difference #robust #statistics- Differential privacy and robust statistics (CD, JL), pp. 371–380.
STOC-2009-GhoshRS - Universally utility-maximizing privacy mechanisms (AG, TR, MS), pp. 351–360.
PODS-2008-EvfimievskiFW - Epistemic privacy (AVE, RF, DPW), pp. 171–180.
SIGMOD-2008-ChowMH #monitoring #named #network- Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks (CYC, MFM, TH), pp. 1307–1310.
SIGMOD-2008-DuTZ #named #quantifier- Privacy-MaxEnt: integrating background knowledge in privacy quantification (WD, ZT, ZZ), pp. 459–472.
SIGMOD-2008-LiTX #proximity- Preservation of proximity privacy in publishing numerical sensitive data (JL, YT, XX), pp. 473–486.
SIGMOD-2008-XiaoT #analysis #statistics- Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
VLDB-2008-BuFWCL #composition- Privacy preserving serial data publishing by role composition (YB, AWCF, RCWW, LC, JL), pp. 845–856.
VLDB-2008-TerrovitisMK - Privacy-preserving anonymization of set-valued data (MT, NM, PK), pp. 115–125.
VLDB-2008-ZerrN #distributed #documentation #framework- Privacy preserving document indexing infrastructure for a distributed environment (SZ, WN), pp. 1638–1643.
SEFM-2008-SalasK #modelling #policy #testing #using- Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
CSCW-2008-IgnatPON #collaboration #multi- Providing awareness in multi-synchronous collaboration without compromising privacy (CLI, SP, GO, MCN), pp. 659–668.
CIKM-2008-JonesKPT - Vanity fair: privacy in querylog bundles (RJ, RK, BP, AT), pp. 853–862.
CIKM-2008-JurczykX #database- Privacy-preserving data publishing for horizontally partitioned databases (PJ, LX), pp. 1321–1322.
CIKM-2008-KorolovaMNX #network #social- Link privacy in social networks (AK, RM, SUN, YX), pp. 289–298.
CIKM-2008-PanXM #mobile- Protecting location privacy against location-dependent attack in mobile services (XP, JX, XM), pp. 1475–1476.
ICML-2008-SakumaKW #learning- Privacy-preserving reinforcement learning (JS, SK, RNW), pp. 864–871.
ICPR-2008-MoncrieffVW #visual notation- Context aware privacy in visual surveillance (SM, SV, GAWW), pp. 1–4.
KDD-2008-BrickellS #cost analysis- The cost of privacy: destruction of data-mining utility in anonymized data publishing (JB, VS), pp. 70–78.
KDD-2008-ChowGS #detection #using- Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
KDD-2008-GantaKS #composition- Composition attacks and auxiliary information in data privacy (SRG, SPK, AS), pp. 265–273.
KDD-2008-YuFRKRDL #analysis- Privacy-preserving cox regression for survival analysis (SY, GF, RR, SK, RBR, CDO, PL), pp. 1034–1042.
SEKE-2008-Chao #classification #data type- Privacy-preserving Classification of Data Streams (CMC), pp. 603–606.
SAC-2008-BodorikJW #consistency #semantics- Consistent privacy preferences (CPP): model, semantics, and properties (PB, DNJ, MXW), pp. 2368–2375.
SAC-2008-GantaA #adaptation #enterprise- Adaptive data anonymization against information fusion based privacy attacks on enterprise data (SRG, RA), pp. 1075–1076.
SAC-2008-HeSVA - Privacy-preserving link discovery (XH, BS, JV, NRA), pp. 909–915.
SAC-2008-HuangKV #challenge- Privacy preservation services: challenges and solutions (DH, VK, MV), pp. 2110–2115.
ASPLOS-2008-CastroCM #debugging- Better bug reporting with better privacy (MC, MC, JPM), pp. 319–328.
PDP-2008-KaropoulosKG #protocol- Privacy Protection in Context Transfer Protocol (GK, GK, SG), pp. 590–596.
STOC-2008-BlumLR #approach #database #learning- A learning theory approach to non-interactive database privacy (AB, KL, AR), pp. 609–618.
ICLP-2008-BonattiCOS #security #trust- Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
WICSA-2007-CardosoI #architecture #overview #pervasive- Architecting Pervasive Computing Systems for Privacy: A Survey (RSC, VI), p. 26.
PODS-2007-BarakCDKMT #consistency- Privacy, accuracy, and consistency too: a holistic solution to contingency table release (BB, KC, CD, SK, FM, KT), pp. 273–282.
SIGMOD-2007-ScannapiecoFBE - Privacy preserving schema and data matching (MS, IF, EB, AKE), pp. 653–664.
SIGMOD-2007-StahlbergML #analysis #database #forensics- Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
SIGMOD-2007-XiaoT #dataset #named #towards- M-invariance: towards privacy preserving re-publication of dynamic datasets (XX, YT), pp. 689–700.
VLDB-2007-ChenRL #multi- Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge (BCC, RR, KL), pp. 770–781.
VLDB-2007-Liu #algorithm #modelling- From Data Privacy to Location Privacy: Models and Algorithms (LL), pp. 1429–1430.
VLDB-2007-PapadimitriouLKY - Time Series Compressibility and Privacy (SP, FL, GK, PSY), pp. 459–470.
VLDB-2007-RastogiHS #bound- The Boundary Between Privacy and Utility in Data Publishing (VR, SH, DS), pp. 531–542.
VLDB-2007-WongFWP - Minimality Attack in Privacy Preserving Data Publishing (RCWW, AWCF, KW, JP), pp. 543–554.
CHI-2007-AhernEGKNN #mobile #online- Over-exposed?: privacy patterns and considerations in online and mobile photo sharing (SA, DE, NG, SK, MN, RN), pp. 357–366.
HCI-IPT-2007-CaoE #towards- Influence of Culture on Attitude Towards Instant Messaging: Balance Between Awareness and Privacy (JC, AE), pp. 236–240.
HCI-MIE-2007-CulenR #design #personalisation #security- Designing Personalized Media Center with Focus on Ethical Issues of Privacy and Security (ALC, YR), pp. 829–835.
HIMI-IIE-2007-Bhargav-SpantzelSYB #requirements- Privacy Requirements in Identity Management Solutions (ABS, ACS, MY, EB), pp. 694–702.
HIMI-IIE-2007-DarkM - Privacy and the Public Educator (MD, CM), pp. 289–298.
HIMI-IIE-2007-KrachinaRT #ontology #perspective #policy #semantics- Reconciling Privacy Policies and Regulations: Ontological Semantics Perspective (OK, VR, KET), pp. 730–739.
HIMI-IIE-2007-ProctorVA #specification #usability- Usability of User Agents for Privacy-Preference Specification (RWP, KPLV, MAA), pp. 766–776.
HIMI-IIE-2007-VuCGCSNPP #how #policy- How Users Read and Comprehend Privacy Policies (KPLV, VC, FPG, BC, JS, DN, RP, RWP), pp. 802–811.
HIMI-IIE-2007-VuGNSCCP #online #question #what- Examining User Privacy Practices While Shopping Online: What Are Users Looking for? (KPLV, FPG, DN, JS, BC, VC, RWP), pp. 792–801.
CAiSE-2007-HamadiPB #concept #modelling #protocol #web #web service- Conceptual Modeling of Privacy-Aware Web Service Protocols (RH, HYP, BB), pp. 233–248.
EDOC-2007-Kerschbaum #benchmark #enterprise #metric- Building a Privacy-Preserving Benchmarking Enterprise System (FK), pp. 87–96.
ICEIS-DISI-2007-NowalczykT #approach- A policy-based privacy storage approach (JN, FTC), pp. 605–608.
CIKM-2007-JonesKPT #query #quote #what- “I know what you did last summer”: query logs and user privacy (RJ, RK, BP, AT), pp. 909–914.
KDD-2007-Kleinberg #challenge #mining #network #process #social- Challenges in mining social network data: processes, privacy, and paradoxes (JMK), pp. 4–5.
KDD-2007-WanNHL - Privacy-preservation for gradient descent methods (LW, WKN, SH, VCSL), pp. 775–783.
MLDM-2007-TanN #data mining #mining #probability #re-engineering- Generic Probability Density Function Reconstruction for Randomization in Privacy-Preserving Data Mining (VYFT, SKN), pp. 76–90.
RecSys-2007-BerkovskyEKR #collaboration #distributed- Enhancing privacy and preserving accuracy of a distributed collaborative filtering (SB, YE, TK, FR), pp. 9–16.
SIGIR-2007-JiangSL - Protecting source privacy in federated search (WJ, LS, JL), pp. 761–762.
SAC-2007-KoralalageRMGC #approach #lifecycle #security- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
SAC-2007-LinL #mining #transaction- Privacy preserving itemset mining through fake transactions (JLL, JYCL), pp. 375–379.
SAC-2007-LoukidesS - Capturing data usefulness and privacy protection in K-anonymisation (GL, JS), pp. 370–374.
SAC-2007-PolatD #using- Effects of inconsistently masked data using RPT on CF with privacy (HP, WD), pp. 649–653.
STOC-2007-DworkMT - The price of privacy and the limits of LP decoding (CD, FM, KT), pp. 85–94.
PODS-2006-MachanavajjhalaG #on the #performance- On the efficiency of checking perfect privacy (AM, JG), pp. 163–172.
PODS-2006-MishraS #pseudo #sketching- Privacy via pseudorandom sketches (NM, MS), pp. 143–152.
SIGMOD-2006-XiaoT #personalisation- Personalized privacy preservation (XX, YT), pp. 229–240.
VLDB-2006-MokbelCA #query- The New Casper: Query Processing for Location Services without Compromising Privacy (MFM, CYC, WGA), pp. 763–774.
VLDB-2006-XiaoT #effectiveness #named- Anatomy: Simple and Effective Privacy Preservation (XX, YT), pp. 139–150.
ICALP-v2-2006-Dwork #difference- Differential Privacy (CD), pp. 1–12.
CHI-2006-HawkeyI #comprehension- Keeping up appearances: understanding the dimensions of incidental information privacy (KH, KMI), pp. 821–830.
CHI-2006-IachelloTAHS #experience #prototype #ubiquitous- Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world (GI, KNT, GDA, GRH, MMS), pp. 1009–1018.
CHI-2006-KaratKBF #authoring #interface #policy- Evaluating interfaces for privacy policy rule authoring (CMK, JK, CB, JF), pp. 83–92.
CHI-2006-MarchF #women- Girls, technology and privacy: “is my mother listening?” (WM, CF), pp. 107–110.
CHI-2006-TangKFH #approach #people- Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (KPT, PK, JF, JIH), pp. 93–102.
CSCW-2006-KhalilC - Context-aware telephony: privacy preferences and sharing patterns (AK, KC), pp. 469–478.
CIKM-2006-KapoorPTT #database #distributed #mining- Privacy preserving sequential pattern mining in distributed databases (VK, PP, FT, MT), pp. 758–767.
KDD-2006-AggarwalPZ #data mining #mining #on the- On privacy preservation against adversarial data mining (CCA, JP, BZ), pp. 510–516.
KDD-2006-WongLFW - (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing (RCWW, JL, AWCF, KW), pp. 754–759.
SIGIR-2006-FrankowskiCSTR #risk management #what- You are what you say: privacy risks of public mentions (DF, DC, SS, LGT, JR), pp. 565–572.
SPLC-2006-WangKHW #personalisation #runtime #web- PLA-based Runtime Dynamism in Support of Privacy-Enhanced Web Personalization (YW, AK, AvdH, JW), pp. 151–162.
SAC-2006-AimeurBFO - Privacy-preserving demographic filtering (EA, GB, JMF, FSMO), pp. 872–878.
SAC-2006-BaragliaLOSS #recommendation #web- A privacy preserving web recommender system (RB, CL, SO, MS, FS), pp. 559–563.
SAC-2006-GuoW #data mining #mining #on the #using- On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
SAC-2006-YoussefAA #mobile #semantics- Semantically enhanced enforcement of mobile consumer’s privacy preferences (MY, NRA, VA), pp. 1172–1176.
SAC-2006-YuJV #kernel #using- Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
PODS-2005-BlumDMN #framework- Practical privacy: the SuLQ framework (AB, CD, FM, KN), pp. 128–138.
PODS-2005-Gehrke #analysis #modelling #tutorial- Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
PODS-2005-ZhongYW - Privacy-enhancing k-anonymization of customer data (SZ, ZY, RNW), pp. 139–147.
SIGMOD-2005-AgrawalST - Privacy Preserving OLAP (RA, RS, DT), pp. 251–262.
VLDB-2005-ZhangZ #distributed #information management- Distributed Privacy Preserving Information Sharing (NZ, WZ), pp. 889–900.
TLCA-2005-MatwinFHC #data mining #formal method #mining #using- Privacy in Data Mining Using Formal Methods (SM, APF, ITH, VC), pp. 278–292.
CHI-2005-IachelloA #adaptation #design #evaluation #ubiquitous- Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing (GI, GDA), pp. 91–100.
CHI-2005-PatilL #configuration management #what- Who gets to know what when: configuring privacy permissions in an awareness application (SP, JL), pp. 101–110.
CIKM-2005-FanLHB #approach #novel #video- A novel approach for privacy-preserving video sharing (JF, HL, MSH, EB), pp. 609–616.
CIKM-2005-XiongSK #database #learning #multi- Privacy leakage in multi-relational databases via pattern based semi-supervised learning (HX, MS, VK), pp. 355–356.
KDD-2005-JagannathanW #clustering #distributed- Privacy-preserving distributed k-means clustering over arbitrarily partitioned data (GJ, RNW), pp. 593–599.
KDD-2005-ZhangWZ #classification- A new scheme on privacy-preserving data classification (NZ, SW, WZ), pp. 374–383.
SAC-2005-PolatD #collaboration- SVD-based collaborative filtering with privacy (HP, WD), pp. 791–795.
SAC-2005-ZhangM #learning- Privacy preserving learning in negotiation (SZ, FM), pp. 821–825.
CADE-2005-DufayFM #data flow #information management #ml- Privacy-Sensitive Information Flow with JML (GD, APF, SM), pp. 116–130.
ECDL-2004-Holmstrom #paradigm #policy #standard- Managing a Paradigm Shift — Aligning Management, Privacy Policy, Technology and Standards (JH), pp. 442–451.
VLDB-2004-AbiteboulABCFMS #distributed #peer-to-peer- An Electronic Patient Record “on Steroids”: Distributed, Peer-to-Peer, Secure and Privacy-conscious (SA, BA, OB, BC, IF, TM, AS), pp. 1273–1276.
VLDB-2004-AggarwalBGGKMMSTW - Vision Paper: Enabling Privacy for the Paranoids (GA, MB, PG, HGM, KK, NM, RM, US, DT, JW, YX), pp. 708–719.
VLDB-2004-HoreMT #query- A Privacy-Preserving Index for Range Queries (BH, SM, GT), pp. 720–731.
SIGITE-2004-OrgillRBO #effectiveness #social- The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems (GLO, GWR, MGB, PMO), pp. 177–181.
SIGITE-2004-RomneyR #education #question- Neglect of information privacy instruction: a case of educational malpractice? (VWR, GWR), pp. 79–82.
CHI-2004-JensenP #evaluation #online #policy #tool support- Privacy policies as decision-making tools: an evaluation of online privacy notices (CJ, CP), pp. 471–478.
ICEIS-v3-2004-ZviranNH #internet- Privacy Concerns in Internet Applications (MZ, SN, DH), pp. 592–595.
ICPR-v4-2004-KitaharaKH - Stealth Vision for Protecting Privacy (IK, KK, NH), pp. 404–407.
KDD-2004-GilburdSW #distributed #named #scalability- k-TTP: a new privacy model for large-scale distributed environments (BG, AS, RW), pp. 563–568.
KDD-2004-KantarciogluJC #data mining #mining #question- When do data mining results violate privacy? (MK, JJ, CC), pp. 599–604.
KDD-2004-SanilKLR #distributed #modelling- Privacy preserving regression modelling via distributed computation (APS, AFK, XL, JPR), pp. 677–682.
KDD-2004-WrightY #distributed #network #semistructured data- Privacy-preserving Bayesian network structure computation on distributed heterogeneous data (RNW, ZY), pp. 713–718.
KDD-2004-ZhuL #data mining #mining- Optimal randomization for privacy preserving data mining (MYZ, LL), pp. 761–766.
SAC-2004-BackesKBS #comparison #enterprise #performance #policy- Efficient comparison of enterprise privacy policies (MB, GK, WB, MS), pp. 375–382.
SAC-2004-SeigneurJ #trust #ubiquitous- Trust enhanced ubiquitous payment without too much privacy loss (JMS, CDJ), pp. 1593–1599.
HPDC-2004-GilburdSW #data mining #mining- Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants (BG, AS, RW), pp. 225–234.
PODS-2003-Agrawal - Privacy in data systems (RA), p. 37.
PODS-2003-DinurN - Revealing information while preserving privacy (ID, KN), pp. 202–210.
PODS-2003-EvfimievskiGS #data mining #mining- Limiting privacy breaches in privacy preserving data mining (AVE, JG, RS), pp. 211–222.
VLDB-2003-BawaBA #documentation #network- Privacy-Preserving Indexing of Documents on the Network (MB, RJBJ, RA), pp. 922–933.
VLDB-2003-CliftonFHKLS #data transformation #e-commerce- Privacy-Enhanced Data Management for Next-Generation e-Commerce (CC, IF, RH, BK, DFL, AS), p. 1147.
CHI-2003-GoodK #case study #usability- Usability and privacy: a study of Kazaa P2P file-sharing (NG, AK), pp. 137–144.
CHI-2003-PalenD - Unpacking “privacy” for a networked world (LP, PD), pp. 129–136.
KDD-2003-DuZ #data mining #mining #random #using- Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
KDD-2003-VaidyaC #clustering- Privacy-preserving k-means clustering over vertically partitioned data (JV, CC), pp. 206–215.
REFSQ-J-2002-AntonEC03 #behaviour #policy #requirements #security- Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
RE-2003-LiuYM #analysis #requirements #security #social- Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
SAC-2003-BodorikJ #architecture- Architecture for User-Controlled e-Privacy (PB, DNJ), pp. 609–616.
SAC-2003-CazierSL #trust- Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility (JC, BS, RSL), pp. 617–622.
VLDB-2002-RizviH #maintenance #mining- Maintaining Data Privacy in Association Rule Mining (SR, JRH), pp. 682–693.
KDD-2002-EvfimievskiSAG #mining- Privacy preserving mining of association rules (AVE, RS, RA, JG), pp. 217–228.
KDD-2002-Iyengar #constraints- Transforming data to satisfy privacy constraints (VSI), pp. 279–288.
KDD-2002-VaidyaC #mining- Privacy preserving association rule mining in vertically partitioned data (JV, CC), pp. 639–644.
SIGIR-2002-Canny #analysis #collaboration- Collaborative filtering with privacy via factor analysis (JFC), pp. 238–245.
RE-2002-AntonER #requirements #taxonomy #using- Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy (AIA, JBE, AR), pp. 23–31.
PODS-2001-AgrawalA #algorithm #data mining #design #mining #on the #quantifier- On the Design and Quantification of Privacy Preserving Data Mining Algorithms (DA, CCA).
CHI-2001-ShoemakerI - Single display privacyware: augmenting public displays with private information (GBDS, KI), pp. 522–529.
ICEIS-v2-2001-GochenouerT #internet #trust- Privacy Audits and Trust: The Internet Dilemma (JEG, MLT), pp. 905–909.
ICEIS-v2-2001-GochenouerT01a #internet- Voyeurism, Exhibitionism, and Privacy on the Internet (JEG, MLT), pp. 910–914.
TOOLS-USA-2001-McClure #delivery #how #security- Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
RE-2001-AntonEAP #policy #requirements- The Role of Policy and Stakeholder Privacy Values in Requirements Engineering (AIA, JBE, TAA, CP), pp. 138–145.
RE-2001-Spafford #security- The Hidden Meta-Requirements of Security and Privacy (EHS), p. 10.
SIGMOD-2000-AgrawalS #data mining #mining- Privacy-Preserving Data Mining (RA, RS), pp. 439–450.
CSCW-2000-BoyleEG #video- The effects of filtered video on awareness and privacy (MB, CE, SG), pp. 1–10.
CSCW-2000-GodefroidyHJL #approach #automation #verification- Ensuring privacy in presence awareness: an automated verification approach (PG, JDH, LJJ, DL), pp. 59–68.
KDD-2000-Catlett #data mining #mining- Among those dark electronic mills: privacy and data mining (JC), p. 4.
STOC-1998-GertnerIKM #information retrieval- Protecting Data Privacy in Private Information Retrieval Schemes (YG, YI, EK, TM), pp. 151–160.
ADL-1997-WinslettCJS #library #policy #security #transaction #web- Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies (MW, NC, VEJ, IS), pp. 140–152.
HCI-CC-1997-PaulD #concept #design #multi- Privacy and Acting in Groups-Key Concepts in Designing Multimedia-Supported Cooperative Work (HP, SD), pp. 281–284.
CSCW-1996-HudsonS #trade-off- Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems (SEH, IES), pp. 248–257.
STOC-1996-KushilevitzOR #linear- Characterizing Linear Size Circuits in Terms of Privacy (EK, RO, AR), pp. 541–550.
STOC-1995-FranklinY - Secure hypergraphs: privacy from partial broadcast (MKF, MY), pp. 36–44.
STOC-1989-ChorK - A Zero-One Law for Boolean Privacy (BC, EK), pp. 62–72.
PODS-1982-ReissPD - Non-reversible Privacy Transformations (SPR, MJP, TD), pp. 139–146.
VLDB-1978-Davida #security- Security and Privacy (GID), p. 54.
VLDB-1978-HsiaoKM #database #security- Privacy and Security of Data Communications and Data Bases (DKH, DSK, SEM), pp. 55–67.
SIGFIDET-1971-Browne #bibliography #perspective- Data Privacy and Integrity: An Overview (PSB), pp. 237–240.
SIGFIDET-1971-Dean #data transformation #online #requirements- Data Privacy and Integrity Requirements for Online Data Management Systems (ALDJ), pp. 279–298.