Private Web Search Using Proxy-Query Based Query Obfuscation Scheme [PDF]
People use web search engines to retrieve information from the world wide web. Search engines maintain query logs to refine retrieved information for personalized web search.
Shariq Bashir, Akmal Saeed Khattak
doaj +3 more sources
Proxy-Terms Based Query Obfuscation Technique for Private Web Search [PDF]
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir +2 more
doaj +4 more sources
Query Formulation for Heuristic Retrieval in Obfuscated and Translated Partially Derived Text
Pre-retrieval query formulation is an important step for identifying local text reuse. Local reuse with high obfuscation, paraphrasing, and translation poses a challenge of finding the reused text in a document.
Kumar, Aarti, Das, Sujoy
doaj +3 more sources
Query Obfuscation Semantic Decomposition [PDF]
We propose a method to protect the privacy of search engine users by decomposing the queries using semantically \emph{related} and unrelated \emph{distractor} terms. Instead of a single query, the search engine receives multiple decomposed query terms. Next, we reconstruct the search results relevant to the original query term by aggregating the search
Danushka Bollegala +2 more
openalex +4 more sources
Web Privacy: A Formal Adversarial Model for Query Obfuscation
The queries we perform, the searches we make, and the websites we visit — this sensitive data is collected at scale by companies as part of the services they provide. Query obfuscation, intertwining the user queries with artificial queries, has been proposed as a solution to protect the privacy of individuals on the web. We here present a formal
Florimond Houssiau +3 more
openalex +4 more sources
Query Profile Obfuscation by Means of Optimal Query Exchange Between Users
Abstract—We address the problem of query profile obfuscation by means of partial query exchanges between two users, in order for their profiles of interest to appear distorted to the information provider (database, search engine, etc.). We illustrate a methodology to reach mutual privacy gain, that is, a situation where both users increase ...
David Rebollo‐Monedero +2 more
openalex +5 more sources
WordGame: Efficient & Effective LLM Jailbreak via Simultaneous Obfuscation in Query and Response [PDF]
The recent breakthrough in large language models (LLMs) such as ChatGPT has revolutionized production processes at an unprecedented pace. Alongside this progress also comes mounting concerns about LLMs' susceptibility to jailbreaking attacks, which leads to the generation of harmful or unsafe content.
Tianrong Zhang +5 more
+6 more sources
Intent-aware Query Obfuscation for Privacy Protection in Personalized Web Search [PDF]
Modern web search engines exploit users' search history to personalize search results, with a goal of improving their service utility on a per-user basis. But it is this very dimension that leads to the risk of privacy infringement and raises serious public concerns. In this work, we propose a client-centered intent-aware query obfuscation solution for
Wasi Uddin Ahmad +2 more
+4 more sources
Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location-Based Service Queries [PDF]
To access location-based service (LBS) and query surrounding points of interest (POIs), smartphone users typically use built-in positioning functions of their phones when traveling at unfamiliar places. However, when a query is submitted, personal information may be leaked when they provide their real location.
Jia-Ning Luo, Ming‐Hour Yang
openalex +2 more sources
Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches [PDF]
Accepted to TrustBus workshop of ARES ...
Anton Firc +2 more
openalex +3 more sources

