WiP: An On-device LLM-based Approach to Query Privacy Protection
Abstract
References
Recommendations
Web search query privacy: Evaluating query obfuscation and anonymizing networks
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines --of logging and analyzing users' queries --raises serious privacy concerns. In this paper, we concentrate on ...
Intent-aware Query Obfuscation for Privacy Protection in Personalized Web Search
SIGIR '18: The 41st International ACM SIGIR Conference on Research & Development in Information RetrievalModern web search engines exploit users' search history to personalize search results, with a goal of improving their service utility on a per-user basis. But it is this very dimension that leads to the risk of privacy infringement and raises serious ...
A privacy-aware visual query approach for location-based data
AbstractVisual querying of location-based data assists users in expressing query requirements, investigating query results and making inferences. However, directly accessing data records exposes individual location information and may cause privacy ...
Graphical abstractDisplay Omitted
Highlights- Directly query location data may lead to privacy issues.
- Anonymizing data preserves data privacy but limits data utility.
- Graph-based anonymization sanitizes data privacy effectively and dynamically.
- Interactive visual query ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/f8207f2e-1f0b-4aaa-9b80-cf44e9014053/3662006.cover.jpg)
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 90Total Downloads
- Downloads (Last 12 months)90
- Downloads (Last 6 weeks)86
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in