Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,761 papers from all fields of science
Search
Sign In
Create Free Account
Inference attack
An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Broader (2)
Computer security
Data security
Data mining
Information
Information security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Access Control Model for the Inference Attacks with Access Histories
K. Hirotsugu
,
Morizumi Tetsuya
Annual International Computer Software and…
2017
Corpus ID: 21851886
Various pieces of personal information are correlated to the My Number program, which establishes national identification numbers…
Expand
Review
2016
Review
2016
User-defined Privacy Preferences for k-Anonymization in Electronic Crime Reporting Systems for Developing Nations
A. Sakpere
2016
Corpus ID: 53485993
Existing approaches that protect data from honest-but-curious data mining service providers include kanonymity technique, which…
Expand
2016
2016
Secure Data Outsourcing with Adversarial Data Dependency Constraints
Boxiang Dong
,
Wendy Hui Wang
,
Jie Yang
IEEE 2nd International Conference on Big Data…
2016
Corpus ID: 15279273
Cloud computing enables end-users to outsource their dataset and data management needs to a third-party service provider. One of…
Expand
2016
2016
Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata
Jonghyuk Song
,
Sangho Lee
,
Jong Kim
IEEE Transactions on Dependable and Secure…
2016
Corpus ID: 4399965
Twitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use…
Expand
2015
2015
Genomic Privacy Metrics: A Systematic Comparison
Isabel Wagner
IEEE Security and Privacy Workshops
2015
Corpus ID: 8243514
The human genome uniquely identifies, and contains highly sensitive information about, individuals. This creates a high potential…
Expand
Review
2015
Review
2015
Privacy-preserving participatory sensing
Qinghua Li
,
G. Cao
IEEE Communications Magazine
2015
Corpus ID: 5553123
The proliferation of mobile devices such as smartphones has enabled participatory sensing systems that collect data from users…
Expand
Review
2015
Review
2015
Secure Keyword Search over Data Archives in the Cloud - Performance and Security Aspects of Searchable Encryption
C. Neuhaus
,
Frank Feinbube
,
D. Janusz
,
A. Polze
International Conference on Cloud Computing and…
2015
Corpus ID: 39023720
Encryption can protect the confidentiality of data stored in the cloud, but also prevents search. To solve this problem…
Expand
2015
2015
Privacy issues in the Domain Name System and techniques for self-defense
Dominik Herrmann
it - Information Technology
2015
Corpus ID: 42657792
Abstract There is a growing interest in retaining and analyzing metadata. Motivated by this trend, the dissertation studies the…
Expand
2013
2013
Chapter 1 Links Reconstruction Attack Using Link Prediction Algorithms to Compromise Social Networks Privacy
Michael Fire
,
Gilad Katz
,
L. Rokach
,
Y. Elovici
2013
Corpus ID: 16945162
The explosion in the use of social networks has also created new kinds of security and privacy threats. Many users are unaware of…
Expand
2009
2009
Preserving Privacy for Location-Based Services with Continuous Queries
Yiming Wang
,
Lingyu Wang
,
B. Fung
IEEE International Conference on Communications
2009
Corpus ID: 15629682
Location-based service (LBS) is gaining momentum as GPS-equipped mobile devices become increasingly affordable and popular. One…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE