Results 1 to 10 of about 605 (220)

Private Web Search Using Proxy-Query Based Query Obfuscation Scheme [PDF]

open access: goldIEEE Access, 2023
People use web search engines to retrieve information from the world wide web. Search engines maintain query logs to refine retrieved information for personalized web search.
Shariq Bashir, Akmal Saeed Khattak
doaj   +3 more sources

Proxy-Terms Based Query Obfuscation Technique for Private Web Search [PDF]

open access: goldIEEE Access, 2022
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir   +2 more
doaj   +4 more sources

Query Formulation for Heuristic Retrieval in Obfuscated and Translated Partially Derived Text

open access: diamondJournal of Information Science Theory and Practice, 2015
Pre-retrieval query formulation is an important step for identifying local text reuse. Local reuse with high obfuscation, paraphrasing, and translation poses a challenge of finding the reused text in a document.
Kumar, Aarti, Das, Sujoy
doaj   +3 more sources

Query Obfuscation Semantic Decomposition [PDF]

open access: green, 2019
We propose a method to protect the privacy of search engine users by decomposing the queries using semantically \emph{related} and unrelated \emph{distractor} terms. Instead of a single query, the search engine receives multiple decomposed query terms. Next, we reconstruct the search results relevant to the original query term by aggregating the search
Danushka Bollegala   +2 more
openalex   +4 more sources

Web Privacy: A Formal Adversarial Model for Query Obfuscation

open access: greenIEEE Transactions on Information Forensics and Security, 2023
The queries we perform, the searches we make, and the websites we visit — this sensitive data is collected at scale by companies as part of the services they provide. Query obfuscation, intertwining the user queries with artificial queries, has been proposed as a solution to protect the privacy of individuals on the web. We here present a formal
Florimond Houssiau   +3 more
openalex   +4 more sources

Query Profile Obfuscation by Means of Optimal Query Exchange Between Users

open access: greenIEEE Transactions on Dependable and Secure Computing, 2012
Abstract—We address the problem of query profile obfuscation by means of partial query exchanges between two users, in order for their profiles of interest to appear distorted to the information provider (database, search engine, etc.). We illustrate a methodology to reach mutual privacy gain, that is, a situation where both users increase ...
David Rebollo‐Monedero   +2 more
openalex   +5 more sources

WordGame: Efficient & Effective LLM Jailbreak via Simultaneous Obfuscation in Query and Response [PDF]

open access: greenFindings of the Association for Computational Linguistics: NAACL 2025
The recent breakthrough in large language models (LLMs) such as ChatGPT has revolutionized production processes at an unprecedented pace. Alongside this progress also comes mounting concerns about LLMs' susceptibility to jailbreaking attacks, which leads to the generation of harmful or unsafe content.
Tianrong Zhang   +5 more
  +6 more sources

Intent-aware Query Obfuscation for Privacy Protection in Personalized Web Search [PDF]

open access: goldThe 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018
Modern web search engines exploit users' search history to personalize search results, with a goal of improving their service utility on a per-user basis. But it is this very dimension that leads to the risk of privacy infringement and raises serious public concerns. In this work, we propose a client-centered intent-aware query obfuscation solution for
Wasi Uddin Ahmad   +2 more
  +4 more sources

Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location-Based Service Queries [PDF]

open access: hybridWireless Communications and Mobile Computing, 2017
To access location-based service (LBS) and query surrounding points of interest (POIs), smartphone users typically use built-in positioning functions of their phones when traveling at unfamiliar places. However, when a query is submitted, personal information may be leaked when they provide their real location.
Jia-Ning Luo, Ming‐Hour Yang
openalex   +2 more sources

Hiding in Plain Sight: Query Obfuscation via Random Multilingual Searches [PDF]

open access: green
Accepted to TrustBus workshop of ARES ...
Anton Firc   +2 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy