Attribute inference attacks in online social networks

NZ Gong, B Liu - ACM Transactions on Privacy and Security (TOPS), 2018 - dl.acm.org
We propose new privacy attacks to infer attributes (eg, locations, occupations, and interests)
of online social network users. Our attacks leverage seemingly innocent user information …

From the information bottleneck to the privacy funnel

A Makhdoumi, S Salamatian, N Fawaz… - … Workshop (ITW 2014 …, 2014 - ieeexplore.ieee.org
We focus on the privacy-utility trade-off encountered by users who wish to disclose some
information to an analyst, that is correlated with their private data, in the hope of receiving …

[HTML][HTML] Privacy in targeted advertising on mobile devices: a survey

I Ullah, R Boreli, SS Kanhere - International Journal of Information …, 2023 - Springer
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …

Privacy-preserving social media data publishing for personalized ranking-based recommendation

D Yang, B Qu, P Cudré-Mauroux - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Personalized recommendation is crucial to help users find pertinent information. It often
relies on a large collection of user data, in particular users' online activity (eg, tagging/rating …

Principal inertia components and applications

F du Pin Calmon, A Makhdoumi… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
We explore properties and applications of the principal inertia components (PICs) between
two discrete random variables X and Y. The PICs lie in the intersection of information and …

On the relationship between inference and data privacy in decentralized IoT networks

M Sun, WP Tay - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
In a decentralized Internet of Things (IoT) network, a fusion center receives information from
multiple sensors to infer a public hypothesis of interest. To prevent the fusion center from …

Managing your private and public data: Bringing down inference attacks against your privacy

S Salamatian, A Zhang… - IEEE Journal of …, 2015 - ieeexplore.ieee.org
We propose a practical methodology to protect a user's private data, when he wishes to
publicly release data that is correlated with his private data, to get some utility. Our approach …

Privacy-utility tradeoff under statistical uncertainty

A Makhdoumi, N Fawaz - 2013 51st Annual Allerton …, 2013 - ieeexplore.ieee.org
We focus on the privacy-accuracy tradeoff encountered by a user who wishes to release
some data to an analyst, that is correlated with his private data, in the hope of receiving …

Fundamental limits of perfect privacy

FP Calmon, A Makhdoumi… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
We investigate the problem of intentionally disclosing information about a set of
measurement points X (useful information), while guaranteeing that little or no information is …

Online location trace privacy: An information theoretic approach

W Zhang, M Li, R Tandon, H Li - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We consider the problem of protecting individual user's location privacy at the trace-level
and study the privacy-utility trade-off, which has key applications in privacy-preserving …