Skip to search formSkip to main contentSkip to account menu

Inference attack

An Inference Attack is a data mining technique performed by analyzing data in order to illegitimately gain knowledge about a subject or database. A… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Various pieces of personal information are correlated to the My Number program, which establishes national identification numbers… 
Review
2016
Review
2016
Existing approaches that protect data from honest-but-curious data mining service providers include kanonymity technique, which… 
2016
2016
Cloud computing enables end-users to outsource their dataset and data management needs to a third-party service provider. One of… 
2016
2016
Twitter is a popular online social network service for sharing short messages (tweets) among friends. Its users frequently use… 
2015
2015
  • Isabel Wagner
  • 2015
  • Corpus ID: 8243514
The human genome uniquely identifies, and contains highly sensitive information about, individuals. This creates a high potential… 
Review
2015
Review
2015
The proliferation of mobile devices such as smartphones has enabled participatory sensing systems that collect data from users… 
Review
2015
Review
2015
Encryption can protect the confidentiality of data stored in the cloud, but also prevents search. To solve this problem… 
2015
2015
Abstract There is a growing interest in retaining and analyzing metadata. Motivated by this trend, the dissertation studies the… 
2013
2013
The explosion in the use of social networks has also created new kinds of security and privacy threats. Many users are unaware of… 
2009
2009
Location-based service (LBS) is gaining momentum as GPS-equipped mobile devices become increasingly affordable and popular. One…