This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contrast to traditional (explicit) privacy, implicit privacy has two essential properties: (1) It is not initially defined as a privacy attribute; (2) it is strongly associated with privacy attributes. In other words, attackers could utilize it to infer privacy attributes with a certain probability, indirectly resulting in the disclosure of private information. To deal with the implicit privacy disclosure problem, we give a measurable definition of implicit privacy, and propose an ex-ante implicit privacy-preserving framework based on data generation, called IMPOSTER. The framework consists of an implicit privacy detection module and an implicit p...
Abstract. In an implicit authentication system, a user profile is used as an additional factor to st...
With recent privacy failures in the release of personal data, differential privacy received consider...
There is now an incredible wealth of data about individuals, businesses and organizations. This data...
We propose a data-driven framework for optimizing privacy-preserving data release mechanisms to atta...
Part 1: PrivacyInternational audienceImplicit authentication consists of a server authenticating a u...
Preserving the utility of published datasets while simultaneously providing provable privacy guarant...
Today we are surrounded by IOT devices that constantly generate different kinds of data about its en...
In this paper, we propose generating artificial data that retain statistical properties of real data...
With the rise of modern information technology and the Internet, the worldwide interconnectivity is ...
Data mining has made broad significant multidisciplinary field used in vast application domains and ...
Over the last decade there have been great strides made in developing techniques to compute function...
Part 11: Privacy IIInternational audienceIn an implicit authentication system, a user profile is use...
We consider the problem of enhancing user privacy in common data analysis and machine learning devel...
Here we consider a common data encryption problem encountered by users who want to disclose some dat...
The well-known privacy-preserved data mining modifies existing data mining techniques to randomized ...
Abstract. In an implicit authentication system, a user profile is used as an additional factor to st...
With recent privacy failures in the release of personal data, differential privacy received consider...
There is now an incredible wealth of data about individuals, businesses and organizations. This data...
We propose a data-driven framework for optimizing privacy-preserving data release mechanisms to atta...
Part 1: PrivacyInternational audienceImplicit authentication consists of a server authenticating a u...
Preserving the utility of published datasets while simultaneously providing provable privacy guarant...
Today we are surrounded by IOT devices that constantly generate different kinds of data about its en...
In this paper, we propose generating artificial data that retain statistical properties of real data...
With the rise of modern information technology and the Internet, the worldwide interconnectivity is ...
Data mining has made broad significant multidisciplinary field used in vast application domains and ...
Over the last decade there have been great strides made in developing techniques to compute function...
Part 11: Privacy IIInternational audienceIn an implicit authentication system, a user profile is use...
We consider the problem of enhancing user privacy in common data analysis and machine learning devel...
Here we consider a common data encryption problem encountered by users who want to disclose some dat...
The well-known privacy-preserved data mining modifies existing data mining techniques to randomized ...
Abstract. In an implicit authentication system, a user profile is used as an additional factor to st...
With recent privacy failures in the release of personal data, differential privacy received consider...
There is now an incredible wealth of data about individuals, businesses and organizations. This data...