Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy in targeted advertising on mobile devices: a survey
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …
businesses, by creating new opportunities for advertisers to reach prospective customers by …
Attribute inference attacks in online social networks
We propose new privacy attacks to infer attributes (eg, locations, occupations, and interests)
of online social network users. Our attacks leverage seemingly innocent user information …
of online social network users. Our attacks leverage seemingly innocent user information …
From the information bottleneck to the privacy funnel
We focus on the privacy-utility trade-off encountered by users who wish to disclose some
information to an analyst, that is correlated with their private data, in the hope of receiving …
information to an analyst, that is correlated with their private data, in the hope of receiving …
Privacy-preserving social media data publishing for personalized ranking-based recommendation
Personalized recommendation is crucial to help users find pertinent information. It often
relies on a large collection of user data, in particular users' online activity (eg, tagging/rating …
relies on a large collection of user data, in particular users' online activity (eg, tagging/rating …
Principal inertia components and applications
We explore properties and applications of the principal inertia components (PICs) between
two discrete random variables X and Y. The PICs lie in the intersection of information and …
two discrete random variables X and Y. The PICs lie in the intersection of information and …
On the relationship between inference and data privacy in decentralized IoT networks
In a decentralized Internet of Things (IoT) network, a fusion center receives information from
multiple sensors to infer a public hypothesis of interest. To prevent the fusion center from …
multiple sensors to infer a public hypothesis of interest. To prevent the fusion center from …
Managing your private and public data: Bringing down inference attacks against your privacy
We propose a practical methodology to protect a user's private data, when he wishes to
publicly release data that is correlated with his private data, to get some utility. Our approach …
publicly release data that is correlated with his private data, to get some utility. Our approach …
Privacy-utility tradeoff under statistical uncertainty
We focus on the privacy-accuracy tradeoff encountered by a user who wishes to release
some data to an analyst, that is correlated with his private data, in the hope of receiving …
some data to an analyst, that is correlated with his private data, in the hope of receiving …
Online location trace privacy: An information theoretic approach
We consider the problem of protecting individual user's location privacy at the trace-level
and study the privacy-utility trade-off, which has key applications in privacy-preserving …
and study the privacy-utility trade-off, which has key applications in privacy-preserving …
Fundamental limits of perfect privacy
We investigate the problem of intentionally disclosing information about a set of
measurement points X (useful information), while guaranteeing that little or no information is …
measurement points X (useful information), while guaranteeing that little or no information is …