A dummy-based user privacy protection approach for text information retrieval

Z Wu, S Shen, X Lian, X Su, E Chen - Knowledge-Based Systems, 2020 - Elsevier
Text retrieval enables people to efficiently obtain the desired data from massive text data, so
has become one of the most popular services in information retrieval community. However …

Privacy-and utility-preserving textual analysis via calibrated multivariate perturbations

O Feyisetan, B Balle, T Drake, T Diethe - … on web search and data mining, 2020 - dl.acm.org
Accurately learning from user data while providing quantifiable privacy guarantees provides
an opportunity to build better ML models while maintaining user trust. This paper presents a …

A differentially private text perturbation method using a regularized mahalanobis metric

Z Xu, A Aggarwal, O Feyisetan, N Teissier - arxiv preprint arxiv …, 2020 - arxiv.org
Balancing the privacy-utility tradeoff is a crucial requirement of many practical machine
learning systems that deal with sensitive customer data. A popular approach for privacy …

Modular order-preserving encryption, revisited

C Mavroforakis, N Chenette, A O'Neill… - Proceedings of the …, 2015 - dl.acm.org
Order-preserving encryption (OPE) schemes, whose ciphertexts preserve the natural
ordering of the plaintexts, allow efficient range query processing over outsourced encrypted …

Privacy preservation by disassociation

M Terrovitis, J Liagouris, N Mamoulis… - arxiv preprint arxiv …, 2012 - arxiv.org
In this work, we focus on protection against identity disclosure in the publication of sparse
multidimensional data. Existing multidimensional anonymization techniquesa) protect the …

An efficient approach for cross-silo federated learning to rank

Y Wang, Y Tong, D Shi, K Xu - 2021 IEEE 37th International …, 2021 - ieeexplore.ieee.org
Traditional learning-to-rank (LTR) models are usually trained in a centralized approach
based upon a large amount of data. However, with the increasing awareness of data …

On a utilitarian approach to privacy preserving text generation

Z Xu, A Aggarwal, O Feyisetan, N Teissier - arxiv preprint arxiv …, 2021 - arxiv.org
Differentially-private mechanisms for text generation typically add carefully calibrated noise
to input words and use the nearest neighbor to the noised input as the output word. When …

Covering the sensitive subjects to protect personal privacy in personalized recommendation

Z Wu, G Li, Q Liu, G Xu, E Chen - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Personalized recommendation has demonstrated its effectiveness in improving the problem
of information overload on the Internet. However, evidences show that due to the concerns …

A comprehensive study to the protection of digital library readers' privacy under an untrusted network environment

Z Wu, S Shen, H Li, H Zhou, D Zou - Library Hi Tech, 2021 - emerald.com
Purpose First, the authors analyze the key problems faced by the protection of digital library
readers' data privacy and behavior privacy. Second, the authors introduce the characteristics …

Personalization vs. privacy in big data analysis

B Habegger, O Hasan, L Brunie, N Bennani… - International Journal of …, 2014 - hal.science
Personalization is the process of adapting the output of a system to a user's context and
profile. User information such as geographical location, academic and professional …