WiP: An On-device LLM-based Approach to Query Privacy Protection
Abstract
References
Recommendations
A privacy controller approach for privacy protection in web services
SWS '07: Proceedings of the 2007 ACM workshop on Secure web servicesThe growth of the Internet has been accompanied by the growth of web services (e.g. e-commerce, e-health). This increased use of web services has meant that more and more user personal information is being shared with web service providers, leading to ...
A privacy-aware visual query approach for location-based data
AbstractVisual querying of location-based data assists users in expressing query requirements, investigating query results and making inferences. However, directly accessing data records exposes individual location information and may cause privacy ...
Graphical abstractDisplay Omitted
Highlights- Directly query location data may lead to privacy issues.
- Anonymizing data preserves data privacy but limits data utility.
- Graph-based anonymization sanitizes data privacy effectively and dynamically.
- Interactive visual query ...
Web search query privacy: Evaluating query obfuscation and anonymizing networks
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines --of logging and analyzing users' queries --raises serious privacy concerns. In this paper, we concentrate on ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/92cf5e87-4536-45cb-9418-8f5395a95a1b/3662006.cover.jpg)
Sponsors
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 37Total Downloads
- Downloads (Last 12 months)37
- Downloads (Last 6 weeks)37
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in