[HTML][HTML] Towards user-oriented privacy for recommender system data: A personalization-based approach to gender obfuscation for user profiles

M Slokom, A Hanjalic, M Larson - Information Processing & Management, 2021 - Elsevier
In this paper, we propose a new privacy solution for the data used to train a recommender
system, ie, the user–item matrix. The user–item matrix contains implicit information, which …

On privacy of dynamical systems: An optimal probabilistic mapping approach

C Murguia, I Shames, F Farokhi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We address the problem of maximizing privacy of stochastic dynamical systems whose state
information is released through quantized sensor data. In particular, we consider the setting …

Robust machine learning via privacy/rate-distortion theory

Y Wang, S Aeron, AS Rakin… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Robust machine learning formulations have emerged to address the prevalent vulnerability
of deep neural networks to adversarial examples. Our work draws the connection between …

Differential privacy for metric spaces: information-theoretic models for privacy and utility with new applications to metric domains

N Fernandes - 2021 - theses.hal.science
The problem of data privacy-protecting sensitive or personal data from discovery-has been a
long-standing research issue. In this regard, differential privacy, introduced in 2006, is …

Maximal Correlation Feature Selection and Suppression With Applications

JKW Lee - 2021 - dspace.mit.edu
In standard supervised learning, we assume that we are trying to learn some target variable
𝑌 from some data 𝑋. However, many learning problems can be framed as supervised …

Robust local differential privacy

M Lopuhaä-Zwakenberg… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
We consider data release protocols for data X=(S,U), where S is sensitive; the released data
Y contains as much information about X as possible, measured as I(X;Y), without leaking too …

A linear reduction method for local differential privacy and log-lift

N Ding, Y Liu, F Farokhi - 2021 IEEE International Symposium …, 2021 - ieeexplore.ieee.org
This paper considers the problem of publishing data X while protecting the correlated
sensitive information S. We propose a linear method to generate the sanitized data Y with …

An overview on protecting user private-attribute information on social networks

W Alnasser, G Beigi, H Liu - Handbook of Research on Cyber Crime …, 2021 - igi-global.com
Online social networks enable users to participate in different activities, such as connecting
with each other and sharing different contents online. These activities lead to the generation …

Towards universal adversarial examples and defenses

AS Rakin, Y Wang, S Aeron… - 2021 IEEE …, 2021 - ieeexplore.ieee.org
Adversarial examples have recently exposed the severe vulnerability of neural network
models. However, most of the existing attacks require some form of target model information …

ReFlat: A robust access pattern hiding solution for general cloud query processing based on K-isomorphism and hardware enclave

Z Han, H Hu, Q Ye - IEEE Transactions on Cloud Computing, 2021 - ieeexplore.ieee.org
The access frequency pattern leakage reveals sensitive information over encrypted cloud
data, such as query inclinations and interests. Even worse, adversaries can infer the content …