ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1402.3426
  4. Cited By
Privacy Games: Optimal User-Centric Data Obfuscation
v1v2v3 (latest)

Privacy Games: Optimal User-Centric Data Obfuscation

14 February 2014
Reza Shokri
ArXiv (abs)PDFHTML

Papers citing "Privacy Games: Optimal User-Centric Data Obfuscation"

30 / 30 papers shown
Title
Self-Defense: Optimal QIF Solutions and Application to Website
  Fingerprinting
Self-Defense: Optimal QIF Solutions and Application to Website Fingerprinting
Andreas Athanasiou
K. Chatzikokolakis
C. Palamidessi
AAML
54
0
0
15 Nov 2024
Starlit: Privacy-Preserving Federated Learning to Enhance Financial
  Fraud Detection
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection
Aydin Abadi
Bradley Doyle
Francesco Gini
Kieron Guinamard
S. K. Murakonda
...
Steven J. Murdoch
Mohammad Naseri
Hector Page
George Theodorakopoulos
Suzanne Weller
81
6
0
19 Jan 2024
Privacy engineering through obfuscation
Privacy engineering through obfuscation
Ero Balsa
23
1
0
24 Aug 2023
Adversary for Social Good: Leveraging Adversarial Attacks to Protect
  Personal Attribute Privacy
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy
Xiaoting Li
Ling-Hao Chen
Dinghao Wu
AAMLSILM
61
6
0
04 Jun 2023
OpBoost: A Vertical Federated Tree Boosting Framework Based on
  Order-Preserving Desensitization
OpBoost: A Vertical Federated Tree Boosting Framework Based on Order-Preserving Desensitization
Xiaochen Li
Yuke Hu
Weiran Liu
Hanwen Feng
Li Peng
Yuan Hong
Kui Ren
Zhan Qin
FedML
184
28
0
04 Oct 2022
PRIVIC: A privacy-preserving method for incremental collection of
  location data
PRIVIC: A privacy-preserving method for incremental collection of location data
Sayan Biswas
C. Palamidessi
26
11
0
21 Jun 2022
Large-Scale Privacy-Preserving Network Embedding against Private Link
  Inference Attacks
Large-Scale Privacy-Preserving Network Embedding against Private Link Inference Attacks
Xiao Han
Leye Wang
Junjie Wu
Yuncong Yang
58
4
0
28 May 2022
Privacy Preserving Release of Mobile Sensor Data
Privacy Preserving Release of Mobile Sensor Data
Rahat Masood
Wing Yan Cheng
Dinusha Vatsalan
Deepak Mishra
Hassan Jameel Asghar
M. Kâafar
46
0
0
13 May 2022
Robust Fingerprint of Location Trajectories Under Differential Privacy
Robust Fingerprint of Location Trajectories Under Differential Privacy
Yuzhou Jiang
Emre Yilmaz
Erman Ayday
40
0
0
10 Apr 2022
Geo-MOEA: A Multi-Objective Evolutionary Algorithm with Geo-obfuscation
  for Mobile Crowdsourcing Workers
Geo-MOEA: A Multi-Objective Evolutionary Algorithm with Geo-obfuscation for Mobile Crowdsourcing Workers
Shun Zhang
Tao Zhang
Zhili Chen
N. Xiong
43
1
0
27 Jan 2022
DPIVE: A Regionalized Location Obfuscation Scheme with Personalized
  Privacy Levels
DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels
Shun Zhang
Pengfei Lan
Benfei Duan
Zhili Chen
Hong Zhong
N. Xiong
34
5
0
01 Feb 2021
On the differential privacy of dynamic location obfuscation with
  personalized error bounds
On the differential privacy of dynamic location obfuscation with personalized error bounds
Shun Zhang
Benfei Duan
Zhili Chen
Hong Zhong
42
5
0
29 Jan 2021
Game-Theoretic and Machine Learning-based Approaches for Defensive
  Deception: A Survey
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey
Mu Zhu
Ahmed H. Anwar
Zelin Wan
Jin-Hee Cho
Charles A. Kamhoua
Munindar P. Singh
AAML
23
13
0
21 Jan 2021
Locality Sensitive Hashing with Extended Differential Privacy
Locality Sensitive Hashing with Extended Differential Privacy
Natasha Fernandes
Yusuke Kawamoto
Takao Murakami
57
12
0
19 Oct 2020
Against Membership Inference Attack: Pruning is All You Need
Against Membership Inference Attack: Pruning is All You Need
Yijue Wang
Chenghong Wang
Zigeng Wang
Shangli Zhou
Hang Liu
J. Bi
Caiwen Ding
Sanguthevar Rajasekaran
MIACV
147
49
0
28 Aug 2020
Ensuring Privacy in Location-Based Services: A Model-based Approach
Ensuring Privacy in Location-Based Services: A Model-based Approach
Alireza Partovi
Wei Zheng
Taeho Jung
Hai Lin
10
8
0
24 Feb 2020
Defending against Machine Learning based Inference Attacks via
  Adversarial Examples: Opportunities and Challenges
Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges
Jinyuan Jia
Neil Zhenqiang Gong
AAMLSILM
82
17
0
17 Sep 2019
Protecting Spatiotemporal Event Privacy in Continuous Location-Based
  Services
Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services
Yang Cao
Yonghui Xiao
Li Xiong
Liquan Bai
Masatoshi Yoshikawa
57
34
0
25 Jul 2019
Utility-aware and privacy-preserving mobile query services
Utility-aware and privacy-preserving mobile query services
Emre Yigitoglu
Mehmet Emre Gursoy
Ling Liu
16
0
0
15 Jul 2019
Optimal Obfuscation Mechanisms via Machine Learning
Optimal Obfuscation Mechanisms via Machine Learning
Marco Romanelli
K. Chatzikokolakis
C. Palamidessi
AAML
50
12
0
01 Apr 2019
Rethinking Location Privacy for Unknown Mobility Behaviors
Rethinking Location Privacy for Unknown Mobility Behaviors
Simon Oya
Carmela Troncoso
Fernando Perez-Gonzalez
20
5
0
12 Sep 2018
Utility-Optimized Local Differential Privacy Mechanisms for Distribution
  Estimation
Utility-Optimized Local Differential Privacy Mechanisms for Distribution Estimation
Takao Murakami
Yusuke Kawamoto
145
92
0
30 Jul 2018
Machine Learning with Membership Privacy using Adversarial
  Regularization
Machine Learning with Membership Privacy using Adversarial Regularization
Milad Nasr
Reza Shokri
Amir Houmansadr
FedMLMIACV
66
475
0
16 Jul 2018
AttriGuard: A Practical Defense Against Attribute Inference Attacks via
  Adversarial Machine Learning
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
Jinyuan Jia
Neil Zhenqiang Gong
AAML
72
166
0
13 May 2018
Artificial Impostors for Location Privacy Preservation
Artificial Impostors for Location Privacy Preservation
Cheng Wang
Z. Xie
16
2
0
21 Jan 2018
A Game-Theoretic Taxonomy and Survey of Defensive Deception for
  Cybersecurity and Privacy
A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
J. Pawlick
Edward Colbert
Quanyan Zhu
AAML
105
152
0
14 Dec 2017
Is Geo-Indistinguishability What You Are Looking for?
Is Geo-Indistinguishability What You Are Looking for?
Simon Oya
Carmela Troncoso
Fernando Perez-Gonzalez
70
36
0
19 Sep 2017
Back to the Drawing Board: Revisiting the Design of Optimal Location
  Privacy-preserving Mechanisms
Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms
Simon Oya
Carmela Troncoso
Fernando Perez-Gonzalez
AAML
72
77
0
24 May 2017
The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and
  Fundamental Limits
The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and Fundamental Limits
Weina Wang
Lei Ying
Junshan Zhang
45
61
0
22 Mar 2016
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for
  Location-Based Services
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services
George Theodorakopoulos
Reza Shokri
Carmela Troncoso
Jean-Pierre Hubaux
J. L. Boudec
91
66
0
05 Sep 2014
1