Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

Web data extraction, applications and techniques: A survey

E Ferrara, P De Meo, G Fiumara… - Knowledge-based …, 2014 - Elsevier
Abstract Web Data Extraction is an important problem that has been studied by means of
different scientific tools and in a broad range of applications. Many approaches to extracting …

Memguard: Defending against black-box membership inference attacks via adversarial examples

J Jia, A Salem, M Backes, Y Zhang… - Proceedings of the 2019 …, 2019 - dl.acm.org
In a membership inference attack, an attacker aims to infer whether a data sample is in a
target classifier's training dataset or not. Specifically, given a black-box access to the target …

A survey on trustworthy recommender systems

Y Ge, S Liu, Z Fu, J Tan, Z Li, S Xu, Y Li, Y Xian… - ACM Transactions on …, 2024 - dl.acm.org
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …

Targeted online password guessing: An underestimated threat

D Wang, Z Zhang, P Wang, J Yan… - Proceedings of the 2016 …, 2016 - dl.acm.org
While trawling online/offline password guessing has been intensively studied, only a few
studies have examined targeted online guessing, where an attacker guesses a specific …

{AttriGuard}: A practical defense against attribute inference attacks via adversarial machine learning

J Jia, NZ Gong - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
Users in various web and mobile applications are vulnerable to attribute inference attacks, in
which an attacker leverages a machine learning classifier to infer a target user's private …

[PDF][PDF] Dependence makes you vulnberable: Differential privacy under dependent tuples.

C Liu, S Chakraborty, P Mittal - NDSS, 2016 - princeton.edu
Differential privacy (DP) is a widely accepted mathematical framework for protecting data
privacy. Simply stated, it guarantees that the distribution of query results changes only …

Applications of differential privacy in social network analysis: A survey

H Jiang, J Pei, D Yu, J Yu, B Gong… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …

Privacy leakage of location sharing in mobile social networks: Attacks and defense

H Li, H Zhu, S Du, X Liang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Along with the popularity of mobile social networks (MSNs) is the increasing danger of
privacy breaches due to user location exposures. In this work, we take an initial step towards …

Exploiting innocuous activity for correlating users across sites

O Goga, H Lei, SHK Parthasarathi, G Friedland… - Proceedings of the …, 2013 - dl.acm.org
We study how potential attackers can identify accounts on different social network sites that
all belong to the same user, exploiting only innocuous activity that inherently comes with …