Skip to search formSkip to main contentSkip to account menu

Inference attack

An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The use of geolocation databases (GDBs) for enabling spectrum sharing has been mandated by the Federal Communications Commission… 
2017
2017
Various pieces of personal information are correlated to the My Number program, which establishes national identification numbers… 
2017
2017
Due to the increasing use of internet, Ecommerce has become part and parcel of everyone’s life. So there is a need to understand… 
2016
2016
Twitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use… 
Review
2015
Review
2015
The proliferation of mobile devices such as smartphones has enabled participatory sensing systems that collect data from users… 
Review
2015
Review
2015
Encryption can protect the confidentiality of data stored in the cloud, but also prevents search. To solve this problem… 
2014
2014
-As we know that mutual data shared in distributed information sharing environment. Information brokering system (IBS) used to… 
2011
2011
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly… 
2007
2007
Automated trust negotiation is an approach to build trust relationship between strangers by disclosing attribute credentials… 
1999
1999
Inference attacks mean that a user infers (or tries to infer) the result of an unau-thorized method execution using only…