Sciweavers

18 search results - page 1 / 4
» Privacy Violations Using Microtargeted Ads: A Case Study
Sort
View
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
13 years 2 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova
ISI
2006
Springer
13 years 5 months ago
Spatial-Temporal Cross-Correlation Analysis: A New Measure and a Case Study in Infectious Disease Informatics
This paper aims to develop a new statistical measure to identify significant correlations among multiple events with spatial and temporal components. This new measure, ( , )K r t ,...
Jian Ma, Daniel Dajun Zeng, Hsinchun Chen
ICNP
2006
IEEE
13 years 11 months ago
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes
— The Internet is a complex structure arising from the interconnection of numerous autonomous systems (AS), each exercising its own administrative policies to reflect the commer...
Srinivasan Seetharaman, Mostafa H. Ammar
PODS
2008
ACM
174views Database» more  PODS 2008»
14 years 5 months ago
Epistemic privacy
We present a novel definition of privacy in the framework of offline (retroactive) database query auditing. Given information about the database, a description of sensitive data, ...
Alexandre V. Evfimievski, Ronald Fagin, David P. W...
RAID
2004
Springer
13 years 10 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee