The publication of Web search logs is very useful for the scientific research community, but to preserve the users’ privacy, logs have to be submitted to an anonymization process. Random query swapping is a common technique used to protect logs that provides k-anonymity to the users in exchange for loss of utility. With the assumption that by swapping queries semantically close this utility loss can be reduced, we introduce a novel protection method that semantically microaggregates the logs using the Open Directory Project. That is, we extend a common method used in statistical disclosure control to protect search logs from a semantic perspective. The method has been tested with a random subset of AOL search logs, and it has been observed ...
We propose a method to protect the privacy of search engine users by decomposing the queries using s...
Abstract — Search engine spamming is a practice of misleading the search engine and increasing the p...
We propose a method to protect the privacy of search engine users by decomposing the queries using s...
Web search engines gather information from the queries performed by the user in the form of query lo...
Web search engines gather information from the queries performed by the user in the form of query lo...
Web query logs data contain information which can be very useful in research or marketing, however, ...
The anonymization of query logs is an important process that needs to be performed prior to the publ...
Search engine companies collect the “database of intentions,” the histories of their users' search q...
Releasing Web query logs which contain valuable infor-mation for research or marketing, can breach t...
Abstract—Search engine companies collect the “database of intentions”, the histories of their users ...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
www.idescat.cat/sort/ Semantic microaggregation for the anonymization of query logs using the open d...
Query-based web search is becoming an integral part of many people’s daily activities. Most do not r...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
Abstract We propose a method for search privacy on the Internet, focusing on enhancing plausible den...
We propose a method to protect the privacy of search engine users by decomposing the queries using s...
Abstract — Search engine spamming is a practice of misleading the search engine and increasing the p...
We propose a method to protect the privacy of search engine users by decomposing the queries using s...
Web search engines gather information from the queries performed by the user in the form of query lo...
Web search engines gather information from the queries performed by the user in the form of query lo...
Web query logs data contain information which can be very useful in research or marketing, however, ...
The anonymization of query logs is an important process that needs to be performed prior to the publ...
Search engine companies collect the “database of intentions,” the histories of their users' search q...
Releasing Web query logs which contain valuable infor-mation for research or marketing, can breach t...
Abstract—Search engine companies collect the “database of intentions”, the histories of their users ...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of u...
www.idescat.cat/sort/ Semantic microaggregation for the anonymization of query logs using the open d...
Query-based web search is becoming an integral part of many people’s daily activities. Most do not r...
Abstract. To preserve search log data utility, Google groups search queries in log bundles by deleti...
Abstract We propose a method for search privacy on the Internet, focusing on enhancing plausible den...
We propose a method to protect the privacy of search engine users by decomposing the queries using s...
Abstract — Search engine spamming is a practice of misleading the search engine and increasing the p...
We propose a method to protect the privacy of search engine users by decomposing the queries using s...