A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems
2021
2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics)
First, we introduce a Standard Vulnerability Profiling Library (SVPL) by arranging the nodes of an energy-CPS from maximum to minimum vulnerable based on their privacy loss. ...
However, most of the existing solutions have drawbacks, such as (i) lack of a proper vulnerability characterization model to accurately identify where privacy is needed, (ii) ignoring data providers privacy ...
In the VAAG, every malicious attack (a ∈ E) is the result of a vulnerability C(e) on that node according to two privacy risk factors: Privacy Loss Magnitude (PLM) and Frequency of Privacy Loss Events ( ...
doi:10.1109/ithings-greencom-cpscom-smartdata-cybermatics53846.2021.00045
fatcat:7ddy5t4gurchbnyplsz4ozjst4
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems
[article]
2021
arXiv
pre-print
First, we introduce a Standard Vulnerability Profiling Library (SVPL) by arranging the nodes of an energy-CPS from maximum to minimum vulnerable based on their privacy loss. ...
However, most of the existing solutions have drawbacks, such as (i) lack of a proper vulnerability characterization model to accurately identify where privacy is needed, (ii) ignoring data providers privacy ...
In the VAAG, every malicious attack (a ∈ E) is the result of a vulnerability C(e) on that node according to two privacy risk factors: Privacy Loss Magnitude (PLM) and Frequency of Privacy Loss Events ( ...
arXiv:2110.15417v2
fatcat:hxzvh6c7izc55i5iqvwkgwh6vq
On the Anonymity Risk of Time-Varying User Profiles
2017
Entropy
We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles. ...
Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/e19050190
fatcat:jggfrwzgdvf2bh3iersapzhe7i
Towards Understanding the Advertiser's Perspective of Smartphone User Privacy
2015
2015 IEEE 35th International Conference on Distributed Computing Systems
We further propose a privacy leakage inference framework and use real mobility traces and Foursquare data to quantify the consequences of privacy leakage. ...
Despite recent study on protection mechanisms and analysis on apps' behavior, the understanding about the consequences of such privacy losses remains limited. ...
In order to apply privacy leakage profiles to this dataset, we generate encounter events between participants as follows: for a particular venue, we give a visiting duration with a random length ranging ...
doi:10.1109/icdcs.2015.37
dblp:conf/icdcs/WangCYYL15
fatcat:o35u3rhb4vddranltirpfgvyfe
Privacy-by-design in big data analytics and social mining
2014
EPJ Data Science
As a result, privacy preservation simply cannot be accomplished by de-identification alone. ...
In this paper, we propose the privacy-by-design paradigm to develop technological frameworks for countering the threats of undesirable, unlawful effects of privacy violation, without obstructing the knowledge ...
to reveal zones with high frequency of movement events; (d) from the centroids of each cluster it is derived a voronoi tessellation of the territory; (e) original trajectories are generalized as sequence ...
doi:10.1140/epjds/s13688-014-0010-4
fatcat:z5jzjxbeqfdi3ko2rj3sok4dpi
POSTER
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
The mobile users are facing a serious risk of losing location privacy (e.g., users' location information transmitted by open advertisement network, and the reported event of involuntary tracking of mobile ...
With users' location profiles, LocMask can automatically determines the sensitiveness of these locations as well as their corresponding privacy protection level. ...
Location Profile Building Module One of the main features of LocMask is to correlate the privacy protection levels of different locations with users' location profiles, which can naturally differentiate ...
doi:10.1145/2660267.2662367
dblp:conf/ccs/XiaoCYLZLR14
fatcat:bsxez5c4kffctnzdyli2sjlsdi
D2P
2015
Proceedings of the VLDB Endowment
This paper presents D2P, a novel protocol that ensures a strong form of differential privacy, which we call distance-based differential privacy, and which is particularly well suited to recommenders. ...
D2P avoids revealing exact user profiles by creating altered profiles where each item is replaced with another one at some distance. ...
In a user-level privacy scheme, more than one event can differ for a profile in two adjacent profile sets, whereas in an event-level privacy approach a single event differs for a profile in two adjacent ...
doi:10.14778/2757807.2757811
fatcat:pvpfafba4vcojdmy2pog52ji4u
Privacy and incongruence-focused disaggregation of water consumption data in real time
2015
Procedia Engineering
This paper presents a system of algorithms that identify and detect water activity events, and then analyse disaggregated information to distinguish between privacy-sensitive behaviour and incongruent ...
While fixture-level disaggregation of water data has a number of applications in decision support systems, it also gives rise to data privacy risks. ...
Further, in privacy-preserving data mining, the statistical metric of differential privacy [2] studies a class of privacy perturbations that have negligible effect on publicized statistics. ...
doi:10.1016/j.proeng.2015.08.950
fatcat:n3zirsqxxvat5pwze5p2u72qga
Extended model for Privacy Enhanced Personalized Web Search Ranking System
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
This results to the acquisition of personalization a major place in Web search. But the use of personalization breaches privacy in searching. ...
To fulfill user need number of websites and webpages are added .The growing size of web data results to the difficulty in attaining useful information with a minimum clicks. ...
Two factors are taken for ranking-• Frequency of page visit-Number of times the user visit the page is counted. This record is kept in a database along with URL searched. ...
doi:10.35940/ijitee.j1194.0881019
fatcat:ue3oeo6w45ezlmb6kuuxif7jnu
Quantifying Web-Search Privacy
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
Then, we quantify privacy of users with respect to linkage attacks. ...
To illustrate our approach in practice, we analyze and compare privacy of users for two example obfuscation mechanisms on a set of real web-search logs. ...
Given a set of query events SO, the adversary first 1 Note that in this paper we limit the study on tuples of two events, however more complex structures (e.g. cliques of three or more queries) might improve ...
doi:10.1145/2660267.2660367
dblp:conf/ccs/GervaisSSCL14
fatcat:k7nfgxfb7rbadh2znr2p24znha
Assessing the Privacy Cost in Centralized Event-Based Demand Response for Microgrids
[article]
2018
arXiv
pre-print
Under the paradigm of differential privacy, this paper initiates a systematic empirical study on quantifying the trade-off between privacy and optimality in centralized DR systems for maximizing cumulative ...
The theoretical results derived from the analysis are complemented with empirical findings, corroborated extensively by simulations on a 4-bus MG system with up to thousands of customers. ...
consumption profile and privacy levels. ...
arXiv:1703.02382v3
fatcat:tb5grxfmkfgxjagdvyzoxr7k5y
Looking at, looking up or keeping up with people?
2008
Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems - CHI '08
User demographics, site visit patterns and the use of privacy settings were associated with different uses and gratifications. ...
These phrases were coded into 46 items which were completed by 241 Facebook users in Study 2. ...
ACKNOWLEDGEMENTS
Jeff Hancock, Mina Vasalou, Pam Briggs and Martin Weller are thanked for their advice and comments on an earlier draft of this paper, as are three anonymous reviewers and the associate ...
doi:10.1145/1357054.1357213
dblp:conf/chi/Joinson08
fatcat:qzdlpzbjpvfrnoogzbr4ytbnk4
Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes
[article]
2020
arXiv
pre-print
Furthermore, a holistic privacy protection approach for all metered resources must be adopted as the information leak from any of the resources has a potential to render the privacy preserving countermeasures ...
However, with the growing scarcity of natural resources, utilities other than electricity (such as water and natural gas) have also begun to be subject to HTG metering, which creates privacy issues similar ...
The most precise metering can be achieved by using ultrasonic sensors with sampling frequency of up to 2 MHz and a resolution of 1.8 mL. ...
arXiv:2004.13363v3
fatcat:5np7w6vxjza47f36we2ksmbozq
Routes for breaching and protecting genetic privacy
[article]
2013
bioRxiv
pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data. ...
However, one growing concern is the ability to protect the genetic privacy of the data originators. ...
This study was also supported by a gift from Cathy and Jim Stone. ...
doi:10.1101/000042
fatcat:gnmdq2mc2be7phgvcejoxu5clq
Routes for breaching and protecting genetic privacy
[article]
2013
arXiv
pre-print
Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data. ...
However, one growing concern is the ability to protect the genetic privacy of the data originators. ...
This study was also supported by a gift from Cathy and Jim Stone. ...
arXiv:1310.3197v1
fatcat:guexdcofhbhmfi2wblenbno5ni
« Previous
Showing results 1 — 15 out of 24,304 results