Inference attack

An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Releasing social network data could seriously breach user privacy. User profile and friendship relations are inherently private… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 2
Is this relevant?
2018
2018
The unprecedented success of deep learning is largely dependent on the availability of massive amount of training data. In many… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2017
Highly Cited
2017
We quantitatively investigate how machine learning models leak information about the individual data records on which they were… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
  • Jihun Hamm
  • Journal of Machine Learning Research
  • 2017
Preserving privacy of continuous and/or high-dimensional data such as images, videos and audios, can be challenging with… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
Wearable devices such as smartwatches have become popular. The accelerometer embedded in smartwatch can record the movement of… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • table II
Is this relevant?
Highly Cited
2014
Highly Cited
2014
The security of smartphone GUI frameworks remains an important yet under-scrutinized topic. In this paper, we report that on the… (More)
  • figure 1
  • figure 3
  • figure 4
  • table 1
  • figure 6
Is this relevant?
Highly Cited
2013
Highly Cited
2013
With the advent of GPS-equipped devices, a massive amount of location data is being collected, raising the issue of the privacy… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Recent researches have shown that motion sensors may be used as a side channel to infer keystrokes on the touchscreen of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Although the privacy threats and countermeasures associated with location data are well known, there has not been a thorough… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?