Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy

Q Wang, Y Zhang, X Lu, Z Wang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Nowadays gigantic crowd-sourced data from mobile devices have become widely available
in social networks, enabling the possibility of many important data mining applications to …

Privacy-preserving crowd-sourced statistical data publishing with an untrusted server

Z Wang, X Pang, Y Chen, H Shao… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
The continuous publication of aggregate statistics over crowd-sourced data to the public has
enabled many data mining applications (eg, real-time traffic analysis). Existing systems …

Publishing search logs—a comparative study of privacy guarantees

M Gotz, A Machanavajjhala, G Wang… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Search engine companies collect the “database of intentions,” the histories of their users'
search queries. These search logs are a gold mine for researchers. Search engine …

Collaborative search log sanitization: Toward differential privacy and boosted utility

Y Hong, J Vaidya, H Lu, P Karras… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Severe privacy leakage in the AOL search log incident has attracted considerable worldwide
attention. However, all the web users' daily search intents and behavior are collected in such …

User k-anonymity for privacy preserving data mining of query logs

G Navarro-Arribas, V Torra, A Erola… - Information Processing & …, 2012 - Elsevier
The anonymization of query logs is an important process that needs to be performed prior to
the publication of such sensitive data. This ensures the anonymity of the users in the logs, a …

Privacy preserving text analytics: research challenges and strategies in name analysis

S Veluru, Y Rahulamathavan, BB Gupta… - … tools, and applications, 2015 - igi-global.com
An e-mail address is a source of communication for major social networking sites. In
general, e-mail addresses hold identity in the form a surname as a substring in it. Identities …

Anonymizing set-valued data by nonreciprocal recoding

M Xue, P Karras, C Raïssi, J Vaidya… - Proceedings of the 18th …, 2012 - dl.acm.org
Today there is a strong interest in publishing set-valued data in a privacy-preserving
manner. Such data associate individuals to sets of values (eg, preferences, shop** items …

A model-agnostic approach to differentially private topic mining

H Wang, J Sharma, S Feng, K Shu… - Proceedings of the 28th …, 2022 - dl.acm.org
Topic mining extracts patterns and insights from text data (eg, documents, emails and
product reviews), which can be used in various applications such as intent detection …

A survey of privacy-aware supply chain collaboration: From theory to applications

Y Hong, J Vaidya, S Wang - Journal of Information Systems, 2014 - publications.aaahq.org
In the contemporary information era, the ubiquitous collection of data from different parties
frequently accommodates significant mutual benefits to the involved participants. However …

Differentially private search log sanitization with optimal output utility

Y Hong, J Vaidya, H Lu, M Wu - … of the 15th International Conference on …, 2012 - dl.acm.org
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident.
However, storing and analyzing search logs can be very useful for many purposes (ie …