Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy
Nowadays gigantic crowd-sourced data from mobile devices have become widely available
in social networks, enabling the possibility of many important data mining applications to …
in social networks, enabling the possibility of many important data mining applications to …
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server
The continuous publication of aggregate statistics over crowd-sourced data to the public has
enabled many data mining applications (eg, real-time traffic analysis). Existing systems …
enabled many data mining applications (eg, real-time traffic analysis). Existing systems …
Publishing search logs—a comparative study of privacy guarantees
Search engine companies collect the “database of intentions,” the histories of their users'
search queries. These search logs are a gold mine for researchers. Search engine …
search queries. These search logs are a gold mine for researchers. Search engine …
Collaborative search log sanitization: Toward differential privacy and boosted utility
Severe privacy leakage in the AOL search log incident has attracted considerable worldwide
attention. However, all the web users' daily search intents and behavior are collected in such …
attention. However, all the web users' daily search intents and behavior are collected in such …
User k-anonymity for privacy preserving data mining of query logs
The anonymization of query logs is an important process that needs to be performed prior to
the publication of such sensitive data. This ensures the anonymity of the users in the logs, a …
the publication of such sensitive data. This ensures the anonymity of the users in the logs, a …
Privacy preserving text analytics: research challenges and strategies in name analysis
An e-mail address is a source of communication for major social networking sites. In
general, e-mail addresses hold identity in the form a surname as a substring in it. Identities …
general, e-mail addresses hold identity in the form a surname as a substring in it. Identities …
Anonymizing set-valued data by nonreciprocal recoding
Today there is a strong interest in publishing set-valued data in a privacy-preserving
manner. Such data associate individuals to sets of values (eg, preferences, shop** items …
manner. Such data associate individuals to sets of values (eg, preferences, shop** items …
A model-agnostic approach to differentially private topic mining
Topic mining extracts patterns and insights from text data (eg, documents, emails and
product reviews), which can be used in various applications such as intent detection …
product reviews), which can be used in various applications such as intent detection …
A survey of privacy-aware supply chain collaboration: From theory to applications
In the contemporary information era, the ubiquitous collection of data from different parties
frequently accommodates significant mutual benefits to the involved participants. However …
frequently accommodates significant mutual benefits to the involved participants. However …
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident.
However, storing and analyzing search logs can be very useful for many purposes (ie …
However, storing and analyzing search logs can be very useful for many purposes (ie …