2013
DOI: 10.1016/j.ins.2012.06.025
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
39
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 55 publications
(40 citation statements)
references
References 33 publications
1
39
0
Order By: Relevance
“…There are different strategies to achieve this goal in the literature [20,[29][30][31], and we also have found in recent publications very similar approaches to the ones we had presented for the development of DisPA [32,33]. This shows a common interest of the research community towards the development of protocols that strive for a trade-off between utility and privacy in web search.…”
Section: Related Worksupporting
confidence: 67%
“…There are different strategies to achieve this goal in the literature [20,[29][30][31], and we also have found in recent publications very similar approaches to the ones we had presented for the development of DisPA [32,33]. This shows a common interest of the research community towards the development of protocols that strive for a trade-off between utility and privacy in web search.…”
Section: Related Worksupporting
confidence: 67%
“…GooPIR, [16], [17], attempts to disguise a user's "true" queries by adding masking keywords directly into a true query before submitting to a recommender system. Results are then filtered to extract items that are relevant to the user's original true query.…”
Section: Related Workmentioning
confidence: 99%
“…Comparison of PRI+ with alternative implementations was performed by taking results from Multinomial Naive Bayes (NB) and Linear SVM (SVM) classifiers to estimate the probabilities in the definition of M k in (17). The intent of the comparison is to determine which of the NB, PRI+ and SVM estimators detect privacy threats, using the definition of M k in (17), for test items previously labeled as "sensitive" by examining the topic of the query used.…”
Section: A Preliminariesmentioning
confidence: 99%
“…Sanchez et al in [6], propose a mechanism where users are in control of the amount of private information they reveal vs. the degree of richness their user profiles retain. Their solution obfuscates the original query by adding "k" number of fake queries to the original query set.…”
Section: Related Workmentioning
confidence: 99%