Skip to search formSkip to main contentSkip to account menu

Inference attack

An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Thesis (Ph.D.)-- Wichita State University, College of Engineering, Dept. of Electrical Engineering & Computer Science 
2017
2017
Various pieces of personal information are correlated to the My Number program, which establishes national identification numbers… 
2017
2017
Due to the increasing use of internet, Ecommerce has become part and parcel of everyone’s life. So there is a need to understand… 
2016
2016
Twitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use… 
2016
2016
Cloud computing enables end-users to outsource their dataset and data management needs to a third-party service provider. One of… 
Review
2015
Review
2015
Encryption can protect the confidentiality of data stored in the cloud, but also prevents search. To solve this problem… 
Review
2015
Review
2015
The proliferation of mobile devices such as smartphones has enabled participatory sensing systems that collect data from users… 
2014
2014
-As we know that mutual data shared in distributed information sharing environment. Information brokering system (IBS) used to… 
2011
2011
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly… 
2007
2007
Automated trust negotiation is an approach to build trust relationship between strangers by disclosing attribute credentials…