7 Hits in 9.4 sec

"I know what you did last summer"

Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
2007 Proceedings of the sixteenth ACM conference on Conference on information and knowledge management - CIKM '07  
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs.  ...  We study the application of simple classifiers to map a sequence of queries into the gender, age, and location of the user issuing the queries.  ...  We initiate the study of subtle cues to user identity that exist as vulnerabilities in web search query logs, which may be exploited in attacks on the privacy of users. Privacy attack models.  ... 
doi:10.1145/1321440.1321573 dblp:conf/cikm/JonesKPT07 fatcat:sxezsndjrbemvp3z3gn7b3exwe

I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild

Stefano Belloro, Alexios Mylonas
2018 IEEE Access  
Motivated by these results, this paper examines whether popular desktop and mobile browsers protect their users from tracking mechanisms that use Web Storage, Web SQL Database, and Indexed Database.  ...  INDEX TERMS Web tracking, web security, privacy, indexed database, indexedDB, web storage, Web SQL database.  ...  is logged in.  ... 
doi:10.1109/access.2018.2869251 fatcat:ofrsmmvyfndozkgcf3nqx7wa64

Big Data's Other Privacy Problem

James Grimmelmann
User privacy is about thoughts: Big Data knows you watched I Know What You Did Last Summer. With enough such data points, it can make a pretty good guess what you're likely to do next summer.  ...  He hasn't logged in to Bloomberg lately.  ... 
doi:10.17605/ fatcat:no2m5lupwfhvxntwpyas6s2us4

On the Differential Private Data Market: Endogenous Evolution, Dynamic Pricing, and Incentive Compatibility [article]

Tao Zhang, Quanyan Zhu
2021 arXiv   pre-print
into consideration the composability of differential privacy and the time-varying nature of privacy concerns.  ...  The buyer seeks to design a privacy allocation rule that dynamically specifies the degree of privacy protections and a payment rule to compensate for the privacy losses of the owners.  ...  ACM, 2007. [12] Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins, Andrew Tomkins, and Andrew Tomkins. I know what you did last summer: query logs and user privacy.  ... 
arXiv:2101.04357v2 fatcat:womp4nuzwzfnhkqcl4o25gagxa

FetchSGD: Communication-Efficient Federated Learning with Sketching [article]

Daniel Rothchild, Ashwinee Panda, Enayat Ullah, Nikita Ivkin, Ion Stoica, Vladimir Braverman, Joseph Gonzalez, Raman Arora
2020 arXiv   pre-print
rates and good convergence.  ...  We prove that FetchSGD has favorable convergence guarantees, and we demonstrate its empirical effectiveness by training two residual networks and a transformer model.  ...  Nikita Ivkin, Ran Ben Basat, Zaoxing Liu, Gil Einziger, Roy Friedman, and Vladimir Braverman. I know what you did last summer: Network monitoring using interval queries.  ... 
arXiv:2007.07682v2 fatcat:eyyxzlc7nzfatembmstefqkj3q

Survey on remnant data research: the artefacts recovered and the implications in a cyber security conscious world

Michael James, Patryk Szewczyk
Despite numerous government agencies providing advice on securing personal and corporate information, and news articles highlighting the need for data security, the availability of personal and confidential  ...  This paper highlights the ongoing issues and provides insight to the factors contributing to this growing trend.  ...  The following papers, some that where presented at the conference, and others that were not, have been analysed in this study:  I know what you did last summer… An Investigation into Remnant Data on USB  ... 
doi:10.4225/75/58a54dda54962 fatcat:i4tog2xpsvcqhhjvpen5lmdt4a

The Proceedings of 14th Australian Digital Forensics Conference, 5-6 December 2016, Edith Cowan University, Perth, Australia

Craig Valli
These efforts have included but not been limited to the reviewing and editing of the conference papers, and helping with the planning, organisation and execution of the conference.  ...  were accepted for final presentation and publication.  ...  The research conducted has verified that the remote applications do leave artefacts behind and can be assessed and reviewed in forensically sound manner.  ... 
doi:10.4225/75/58a5521ba2e9d fatcat:ck34qiw2l5bbfkauf7ua6oyrhy