Attribute inference attacks in online social networks
We propose new privacy attacks to infer attributes (eg, locations, occupations, and interests)
of online social network users. Our attacks leverage seemingly innocent user information …
of online social network users. Our attacks leverage seemingly innocent user information …
From the information bottleneck to the privacy funnel
We focus on the privacy-utility trade-off encountered by users who wish to disclose some
information to an analyst, that is correlated with their private data, in the hope of receiving …
information to an analyst, that is correlated with their private data, in the hope of receiving …
[HTML][HTML] Privacy in targeted advertising on mobile devices: a survey
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …
businesses, by creating new opportunities for advertisers to reach prospective customers by …
Privacy-preserving social media data publishing for personalized ranking-based recommendation
D Yang, B Qu, P Cudré-Mauroux - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Personalized recommendation is crucial to help users find pertinent information. It often
relies on a large collection of user data, in particular users' online activity (eg, tagging/rating …
relies on a large collection of user data, in particular users' online activity (eg, tagging/rating …
Principal inertia components and applications
F du Pin Calmon, A Makhdoumi… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
We explore properties and applications of the principal inertia components (PICs) between
two discrete random variables X and Y. The PICs lie in the intersection of information and …
two discrete random variables X and Y. The PICs lie in the intersection of information and …
On the relationship between inference and data privacy in decentralized IoT networks
In a decentralized Internet of Things (IoT) network, a fusion center receives information from
multiple sensors to infer a public hypothesis of interest. To prevent the fusion center from …
multiple sensors to infer a public hypothesis of interest. To prevent the fusion center from …
Managing your private and public data: Bringing down inference attacks against your privacy
S Salamatian, A Zhang… - IEEE Journal of …, 2015 - ieeexplore.ieee.org
We propose a practical methodology to protect a user's private data, when he wishes to
publicly release data that is correlated with his private data, to get some utility. Our approach …
publicly release data that is correlated with his private data, to get some utility. Our approach …
Privacy-utility tradeoff under statistical uncertainty
A Makhdoumi, N Fawaz - 2013 51st Annual Allerton …, 2013 - ieeexplore.ieee.org
We focus on the privacy-accuracy tradeoff encountered by a user who wishes to release
some data to an analyst, that is correlated with his private data, in the hope of receiving …
some data to an analyst, that is correlated with his private data, in the hope of receiving …
Fundamental limits of perfect privacy
FP Calmon, A Makhdoumi… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
We investigate the problem of intentionally disclosing information about a set of
measurement points X (useful information), while guaranteeing that little or no information is …
measurement points X (useful information), while guaranteeing that little or no information is …
Online location trace privacy: An information theoretic approach
We consider the problem of protecting individual user's location privacy at the trace-level
and study the privacy-utility trade-off, which has key applications in privacy-preserving …
and study the privacy-utility trade-off, which has key applications in privacy-preserving …