Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,122,107 papers from all fields of science
Search
Sign In
Create Free Account
Inference attack
An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Broader (2)
Computer security
Data security
Data mining
Information
Information security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Thwarting Location Inference Attacks in Database-Driven Spectrum Sharing
Sudeep Bhattarai
,
P. Vaka
,
J. Park
IEEE Transactions on Cognitive Communications and…
2018
Corpus ID: 49354643
The use of geolocation databases (GDBs) for enabling spectrum sharing has been mandated by the Federal Communications Commission…
Expand
2017
2017
Access Control Model for the Inference Attacks with Access Histories
K. Hirotsugu
,
Morizumi Tetsuya
Annual International Computer Software and…
2017
Corpus ID: 21851886
Various pieces of personal information are correlated to the My Number program, which establishes national identification numbers…
Expand
2017
2017
A New Model for Privacy Preserving Multiparty Collaborative Data Mining
M. Vinay
,
V. G. Ravi Kumar
International Conference on Current Trends in…
2017
Corpus ID: 52161452
Due to the increasing use of internet, Ecommerce has become part and parcel of everyone’s life. So there is a need to understand…
Expand
2016
2016
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata
Jonghyuk Song
,
Sangho Lee
,
Jong Kim
IEEE Transactions on Dependable and Secure…
2016
Corpus ID: 4399965
Twitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use…
Expand
Review
2015
Review
2015
Privacy-preserving participatory sensing
Qinghua Li
,
G. Cao
IEEE Communications Magazine
2015
Corpus ID: 5553123
The proliferation of mobile devices such as smartphones has enabled participatory sensing systems that collect data from users…
Expand
Review
2015
Review
2015
Secure Keyword Search over Data Archives in the Cloud - Performance and Security Aspects of Searchable Encryption
C. Neuhaus
,
Frank Feinbube
,
D. Janusz
,
A. Polze
International Conference on Cloud Computing and…
2015
Corpus ID: 39023720
Encryption can protect the confidentiality of data stored in the cloud, but also prevents search. To solve this problem…
Expand
2014
2014
Security Enforcement and Query Forwarding While Preserving System Wide Privacy
Prof. K.D.Yesugade
,
Pooja Bhosale
,
Sayali P. Gavhane
2014
Corpus ID: 212546809
-As we know that mutual data shared in distributed information sharing environment. Information brokering system (IBS) used to…
Expand
2011
2011
Query-Aware Anonymization in Location-Based Service
Wei Li
,
Guangye Li
,
Chunlei Liu
Seventh International Conference on Computational…
2011
Corpus ID: 12859728
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly…
Expand
2007
2007
The Analysis of Inference Attack in Automated Trust Negotiation
Y. Qiu
2007
Corpus ID: 63975694
Automated trust negotiation is an approach to build trust relationship between strangers by disclosing attribute credentials…
Expand
1999
1999
The Security Problem against Inference Attacks on Object-Oriented Databases
Yasunori Ishihara
,
T. Morita
,
Minoru Ito
Database Security
1999
Corpus ID: 7691102
Inference attacks mean that a user infers (or tries to infer) the result of an unau-thorized method execution using only…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE