Academic literature on the topic 'Online Inference Attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Online Inference Attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Online Inference Attacks"

1

Gong, Neil Zhenqiang, and Bin Liu. "Attribute Inference Attacks in Online Social Networks." ACM Transactions on Privacy and Security 21, no. 1 (2018): 1–30. http://dx.doi.org/10.1145/3154793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lachat, Paul, Nadia Bennani, Veronika Rehn-Sonigo, Lionel Brunie, and Harald Kosch. "Detecting Inference Attacks Involving Raw Sensor Data: A Case Study." Sensors 22, no. 21 (2022): 8140. http://dx.doi.org/10.3390/s22218140.

Full text
Abstract:
With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data can be diverted to infer personal data that customers do not consent to share. This indirect access to data that are not collected corresponds to inference attacks involving raw sensor data (IASD). Towards these new kinds of attacks, existing inference detection systems do not suit the representatio
APA, Harvard, Vancouver, ISO, and other styles
3

Srivastava, Agrima, and G. Geethakumari. "Privacy preserving solution to prevent classification inference attacks in online social networks." International Journal of Data Science 4, no. 1 (2019): 31. http://dx.doi.org/10.1504/ijds.2019.098357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Srivastava, Agrima, and G. Geethakumari. "Privacy preserving solution to prevent classification inference attacks in online social networks." International Journal of Data Science 4, no. 1 (2019): 31. http://dx.doi.org/10.1504/ijds.2019.10019813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nithish Ranjan Gowda, Et al. "Preserve data-while-sharing: An Efficient Technique for Privacy Preserving in OSNs." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 3341–53. http://dx.doi.org/10.17762/ijritcc.v11i9.9540.

Full text
Abstract:
Online Social Networks (OSNs) have become one of the major platforms for social interactions, such as building up relationships, sharing personal experiences, and providing other services. Rapid growth in Social Network has attracted various groups like the scientific community and business enterprise to use these huge social network data to serve their various purposes. The process of disseminating extensive datasets from online social networks for the purpose of conducting diverse trend analyses gives rise to apprehensions regarding privacy, owing to the disclosure of personal information di
APA, Harvard, Vancouver, ISO, and other styles
6

Lakshmanan, Nitya, Abdelhak Bentaleb, Byoungjun Choi, Roger Zimmermann, Jun Han, and Min Suk Kang. "On Privacy Risks of Watching YouTube over Cellular Networks with Carrier Aggregation." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 1 (2022): 1–22. http://dx.doi.org/10.1145/3517261.

Full text
Abstract:
One's core values, personality, and social status may be reflected in the watch history of online video streaming services such as YouTube. Unfortunately, several prior research work demonstrates that man-in-the-middle or malware-assisted attackers can accurately infer the titles of encrypted streaming videos by exploiting the inherent correlation between the encoded video contents and the traffic rate changes. In this paper, we present a novel video-inference attack called Moba that further exacerbates the problem by only requiring the adversary to simply eavesdrop the broadcast messages of a
APA, Harvard, Vancouver, ISO, and other styles
7

He, Xiaoyun, and Haibing Lu. "Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework." Journal of Information Privacy and Security 13, no. 3 (2017): 104–19. http://dx.doi.org/10.1080/15536548.2017.1357383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ruan, Yefeng, and Arjan Durresi. "A survey of trust management systems for online social communities – Trust modeling, trust inference and attacks." Knowledge-Based Systems 106 (August 2016): 150–63. http://dx.doi.org/10.1016/j.knosys.2016.05.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

R, Balamurugan, Dhivakar M, Muruganantham G, and Ramprakash S. "Securing Heterogeneous Privacy Protection in Social Network Records based Encryption Scheme." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 3 (2019): 10–13. http://dx.doi.org/10.17762/ijritcc.v7i3.5249.

Full text
Abstract:
This survey places of interest the major issues concerning privacy and security in online social networks. Firstly, we discuss investigate that aims to protect user data from the an assortment of attack vantage points together with other users, advertisers, third party request developers, and the online social arrangement provider itself. Next we cover social network supposition of user attributes, locate hubs, and link prediction. Because online social networks are so saturated with sensitive information, network inference plays a major privacy role. Social Networking sites go upwards since o
APA, Harvard, Vancouver, ISO, and other styles
10

Vasin, N. N., and K. S. Kakabian. "Application of Adaptive Neuro-Fuzzy Inference System for DDoS Attack Detection Based on CIC-DDoS-2019 Dataset." Proceedings of Telecommunication Universities 11, no. 3 (2025): 87–96. https://doi.org/10.31854/1813-324x-2025-11-3-87-96.

Full text
Abstract:
The relevance. Distributed Denial of Service (DDoS) attacks remain a significant threat to the availability of online services. Traditional intrusion detection systems based on signatures or anomaly analysis face limitations in detecting new and complex attacks, while machine learning-based approaches, while showing high potential, often lack interpretability. Hybrid systems, such as the Adaptive Neuro-Fuzzy Inference System (ANFIS), combine the advantages of neural networks and fuzzy logic, offering both accuracy and interpretability. However, their effectiveness with respect to modern datase
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Online Inference Attacks"

1

Alipour, Pijani Bizhan. "Attaques par inférence d'attributs sur les publications des réseaux sociaux." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.

Full text
Abstract:
Les réseaux sociaux contiennent de nombreuses informations personnelles telles que le genre, l'âge ou le statut d'une relation. Leur popularité et leur importance en font des cibles privilégiés pour des activités malveillantes menaçant la vie privée des utilisateurs. Les paramètres de sécurité disponibles sur les réseaux sociaux n'empêchent pas les attaques par inférence d'attribut, qui consistent pour l'attaquant à obtenir des données privées (comme le genre) à partir d'informations publiques. La divulgation d'une information personnelle peut avoir des conséquences négatives comme devenir la
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Jiayi. "Defending against inference attack in online social networks." Thesis, 2017. https://dspace.library.uvic.ca//handle/1828/8364.

Full text
Abstract:
The privacy issues in online social networks (OSNs) have been increasingly arousing the public awareness since it is possible for attackers to launch several kinds of attacks to obtain users' sensitive and private information by exploiting the massive data obtained from the networks. Even if users conceal their sensitive information, attackers can infer their secrets by studying the correlations between private and public information with background knowledge. To address these issues, the thesis focuses on the inference attack and its countermeasures. First, we study how to launch the infe
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Online Inference Attacks"

1

Abid, Younes, Abdessamad Imine, and Michaël Rusinowitch. "Online Testing of User Profile Resilience Against Inference Attacks in Social Networks." In Communications in Computer and Information Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00063-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eidizadehakhcheloo, Sanaz, Bizhan Alipour Pijani, Abdessamad Imine, and Michaël Rusinowitch. "Divide-and-Learn: A Random Indexing Approach to Attribute Inference Attacks in Online Social Networks." In Data and Applications Security and Privacy XXXV. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81242-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reza, Khondker Jahid, Md Zahidul Islam, and Vladimir Estivill-Castro. "Protection of User-Defined Sensitive Attributes on Online Social Networks Against Attribute Inference Attack via Adversarial Data Mining." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alnasser, Walaa, Ghazaleh Beigi, and Huan Liu. "An Overview on Protecting User Private-Attribute Information on Social Networks." In Handbook of Research on Cyber Crime and Information Privacy. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5728-0.ch006.

Full text
Abstract:
Online social networks enable users to participate in different activities, such as connecting with each other and sharing different contents online. These activities lead to the generation of vast amounts of user data online. Publishing user-generated data causes the problem of user privacy as this data includes information about users' private and sensitive attributes. This privacy issue mandates social media data publishers to protect users' privacy by anonymizing user-generated social media data. Existing private-attribute inference attacks can be classified into two classes: friend-based
APA, Harvard, Vancouver, ISO, and other styles
5

Ravikiran, Dr D. Naga, Dr Neelima Guntupalli, Dr Vasantha Rudramalla, and Sai Srinivasvellela. "SMART HEALTHCARE DATA TO IMPROVE THE EFFICIENCY USING CLOUD COMPUTING FRAMEWORK." In Futuristic Trends in IOT Volume 3 Book 8. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3baio8p5ch1.

Full text
Abstract:
Cloud computing technologies have developed the healthcare sector in recent years. It consists of on-demand services for storage, computing power, servers, networking, applications, and various other IT resources that are based on the Internet. A number of privacy and security issues, such as authentication, authorization, inference manage, controls over access, confidentiality of information, cloud-based medical data abuse, and integrity, are brought up by the transition from offline to online computing as medical technology progresses. A trustworthy and effective security and data protection
APA, Harvard, Vancouver, ISO, and other styles
6

Hai-Jew, Shalin. "In Plaintext." In The Dark Web. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3163-0.ch012.

Full text
Abstract:
People have long gone online to groom their online identities, to communicate some aspects of themselves in the real. The information shared is purposive and strategic. Inevitably, the information is selective and incomplete. The cyber may evoke something about the physical only to a degree, in the cyber-physical confluence. In an asymmetrical information environment, those who have the most accurate and requisite information often have the advantage. It is said that much of intelligence is conducted using Open-Source Intelligence (OSINT), which suggests a need for reading between the lines of
APA, Harvard, Vancouver, ISO, and other styles
7

Hai-Jew, Shalin. "In Plaintext." In Remote Workforce Training. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5137-1.ch011.

Full text
Abstract:
People have long gone online to groom their online identities, to communicate some aspects of themselves in the real. The information shared is purposive and strategic. Inevitably, the information is selective and incomplete. The cyber may evoke something about the physical only to a degree, in the cyber-physical confluence. In an asymmetrical information environment, those who have the most accurate and requisite information often have the advantage. It is said that much of intelligence is conducted using Open-Source Intelligence (OSINT), which suggests a need for reading between the lines of
APA, Harvard, Vancouver, ISO, and other styles
8

Arul, E., A. Punidha, K. Gunasekaran, P. Radhakrishnan, and VD Ashok Kumar. "Malicious Attack Identification Using Deep Non Linear Bag-of-Words (FAI-DLB)." In Advances in Parallel Computing. IOS Press, 2021. http://dx.doi.org/10.3233/apc210110.

Full text
Abstract:
Online media have flourished in modern years to connect with the world. Most of those stuff users share on blogs like facebook, twitter and many other are pessimistic or just middle spirited. Further, an increasingly professional anti - spyware technologies are dependent on Machine Learning(ML) technology to secure malicious consumers. Over the past few years, revolutionary learning approaches have yielded remarkable outcomes and have immediately generated photos, characters and text interpretations of dynamic weak points. The Purple consumer frequency makes the troll and attacker aim an entic
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Online Inference Attacks"

1

Liu, Junlin, and Xinchen Lyu. "Distance-Based Online Label Inference Attacks Against Split Learning." In ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2023. http://dx.doi.org/10.1109/icassp49357.2023.10096955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tricomi, Pier Paolo, Lisa Facciolo, Giovanni Apruzzese, and Mauro Conti. "Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2." In CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy. ACM, 2023. https://doi.org/10.1145/3577923.3583653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Ashish, and N. C. Rathore. "Improving Attribute Inference Attack Using Link Prediction in Online Social Networks." In International Conference on Recent Advances in Mathematics, Statistics and Computer Science 2015. WORLD SCIENTIFIC, 2016. http://dx.doi.org/10.1142/9789814704830_0046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kido, Hiroyuki, and Keishi Okamoto. "A Bayesian Approach to Argument-Based Reasoning for Attack Estimation." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/36.

Full text
Abstract:
The web is a source of a large amount of arguments and their acceptability statuses (e.g., votes for and against the arguments). However, relations existing between the fore-mentioned arguments are typically not available. This study investigates the utilisation of acceptability semantics to statistically estimate an attack relation between arguments wherein the acceptability statuses of arguments are provided. A Bayesian network model of argument-based reasoning is defined in which Dung's theory of abstract argumentation gives the substance of Bayesian inference. The model correctness is demo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!