Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,961,546 papers from all fields of science
Search
Sign In
Create Free Account
Inference attack
An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Broader (2)
Computer security
Data security
Data mining
Information
Information security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Security and privacy of cyber and physical user interactions in the age of wearable computing
Anindya Maiti
2018
Corpus ID: 69355926
Thesis (Ph.D.)-- Wichita State University, College of Engineering, Dept. of Electrical Engineering & Computer Science
2017
2017
Access Control Model for the Inference Attacks with Access Histories
K. Hirotsugu
,
Morizumi Tetsuya
Annual International Computer Software and…
2017
Corpus ID: 21851886
Various pieces of personal information are correlated to the My Number program, which establishes national identification numbers…
Expand
2017
2017
A New Model for Privacy Preserving Multiparty Collaborative Data Mining
M. G. Vinay
,
V. G. Ravi Kumar
International Conference on Current Trends in…
2017
Corpus ID: 52161452
Due to the increasing use of internet, Ecommerce has become part and parcel of everyone’s life. So there is a need to understand…
Expand
2016
2016
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata
Jonghyuk Song
,
Sangho Lee
,
Jong Kim
IEEE Transactions on Dependable and Secure…
2016
Corpus ID: 4399965
Twitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use…
Expand
2016
2016
Secure Data Outsourcing with Adversarial Data Dependency Constraints
Boxiang Dong
,
Wendy Hui Wang
,
Jie Yang
IEEE 2nd International Conference on Big Data…
2016
Corpus ID: 15279273
Cloud computing enables end-users to outsource their dataset and data management needs to a third-party service provider. One of…
Expand
Review
2015
Review
2015
Secure Keyword Search over Data Archives in the Cloud - Performance and Security Aspects of Searchable Encryption
C. Neuhaus
,
Frank Feinbube
,
D. Janusz
,
A. Polze
International Conference on Cloud Computing and…
2015
Corpus ID: 39023720
Encryption can protect the confidentiality of data stored in the cloud, but also prevents search. To solve this problem…
Expand
Review
2015
Review
2015
Privacy-preserving participatory sensing
Qinghua Li
,
G. Cao
IEEE Communications Magazine
2015
Corpus ID: 5553123
The proliferation of mobile devices such as smartphones has enabled participatory sensing systems that collect data from users…
Expand
2014
2014
Security Enforcement and Query Forwarding While Preserving System Wide Privacy
Prof. K.D.Yesugade
,
Pooja Bhosale
,
Sayali P. Gavhane
2014
Corpus ID: 212546809
-As we know that mutual data shared in distributed information sharing environment. Information brokering system (IBS) used to…
Expand
2011
2011
Query-Aware Anonymization in Location-Based Service
Wei Li
,
Guangye Li
,
Chunlei Liu
Seventh International Conference on Computational…
2011
Corpus ID: 12859728
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly…
Expand
2007
2007
The Analysis of Inference Attack in Automated Trust Negotiation
Y. Qiu
2007
Corpus ID: 63975694
Automated trust negotiation is an approach to build trust relationship between strangers by disclosing attribute credentials…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE