The privacy implications of cyber security systems: A technological survey

E Toch, C Bettini, E Shmueli, L Radaelli… - ACM Computing …, 2018 - dl.acm.org
Cyber-security systems, which protect networks and computers against cyber attacks, are
becoming common due to increasing threats and government regulation. At the same time …

Multi-view embedding-based synonyms for email search

C Li, M Zhang, M Bendersky, H Deng… - Proceedings of the …, 2019 - dl.acm.org
Synonym expansion is a technique that adds related words to search queries, which may
lead to more relevant documents being retrieved, thus improving recall. There is extensive …

Anatomy of a privacy-safe large-scale information extraction system over email

Y Sheng, S Tata, JB Wendt, J Xie, Q Zhao… - Proceedings of the 24th …, 2018 - dl.acm.org
Extracting structured data from emails can enable several assistive experiences, such as
reminding the user when a bill payment is due, answering queries about the departure time …

The demographics of mail search and their application to query suggestion

D Carmel, L Lewin-Eytan, A Libov, Y Maarek… - Proceedings of the 26th …, 2017 - dl.acm.org
Web mail search is an emerging topic, which has not been the object of as many studies as
traditional Web search. In particular, little is known about the characteristics of mail …

Multi-level privacy preserving k-anonymity

JH Weng, PW Chi - 2021 16th Asia Joint Conference on …, 2021 - ieeexplore.ieee.org
k-anonymity is a well-known definition of privacy, which guarantees that any person in the
released dataset cannot be distinguished from at least k-1 other individuals. In the protection …

Search and discovery in personal email collections

M Bendersky, X Wang, M Najork… - Proceedings of the …, 2022 - dl.acm.org
Email has been an essential communication medium for many years. As a result, the
information accumulated in our mailboxes has become valuable for all of our personal and …

Template induction over unstructured email corpora

J Proskurnia, MA Cartright, L Garcia-Pueyo… - Proceedings of the 26th …, 2017 - dl.acm.org
Unsupervised template induction over email data is a central component in applications
such as information extraction, document classification, and auto-reply. The benefits of …

Privacy-aware document ranking with neural signals

J Shao, S Ji, T Yang - Proceedings of the 42nd International ACM SIGIR …, 2019 - dl.acm.org
The recent work on neural ranking has achieved solid relevance improvement, by exploring
similarities between documents and queries using word embeddings. It is an open problem …

A comparative study on the application of text mining in cybersecurity

K Barik, S Misra, K Konar, M Kaushik… - Recent Advances in …, 2023 - ingentaconnect.com
Aims: This paper aims to conduct a Systematic Literature Review (SLR) of the relative
applications of text mining in cybersecurity. Objectives: The amount of data generated …

Privacy-preserving active learning on sensitive data for user intent classification

O Feyisetan, T Drake, B Balle, T Diethe - arXiv preprint arXiv:1903.11112, 2019 - arxiv.org
Active learning holds promise of significantly reducing data annotation costs while
maintaining reasonable model performance. However, it requires sending data to …