Results 11 to 20 of about 605 (220)

Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent [PDF]

open access: greenThe Computer Journal
Abstract This paper delves into a possible security flaw in large language models (LLMs), particularly in their capacity to identify malicious intent within intricate or ambiguous inquiries. We have discovered that LLMs might overlook the malicious nature of highly veiled requests, even without alterations to the malevolent text in those
Shang Shang   +7 more
  +5 more sources

A NOVEL APPROACH TO SECURE WEB SEARCH: PROXY-QUERY BASED QUERY OBFUSCATION

open access: bronzeINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Web search engines are used by people to access content on the internet. To improve the quality of the information received for individualized web searches, search engines keep query logs. User information, both sensitive and non-sensitive, is included in the query log.
A. Lakshmipathi Rao
openalex   +3 more sources

Evaluation of a Query-Obfuscation Mechanism for the Privacy Protection of User Profiles

open access: bronzeNetwork Protocols and Algorithms, 2014
Traces related to our identity are left every day while we browse the Internet. Being the user’s information a very valued asset for most of the companies, user activities on Internet are permanently monitored, and the information obtained from this process is used by big advertising companies.
José Antonio Estrada   +3 more
openalex   +6 more sources

Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing [PDF]

open access: green, 2014
The Domain Name System (DNS) does not provide query privacy. Query obfuscation schemes have been proposed to overcome this limitation, but, so far, they have not been evaluated in a realistic setting. In this paper we evaluate the security of a random set range query scheme in a real-world web surfing scenario.
Dominik Herrmann   +2 more
openalex   +5 more sources

Words Blending Boxes. Obfuscating Queries in Information Retrieval using Differential Privacy [PDF]

open access: green
Preprint submitted to Information Science ...
Francesco Luigi De Faveri   +2 more
openalex   +3 more sources

On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot [PDF]

open access: closed, 2010
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines - of logging and analyzing users' queries - raises serious privacy concerns. One viable solution to search privacy is query obfuscation, whereby a client-side software attempts to mask real user queries via ...
Sai Teja Peddinti, Nitesh Saxena
openalex   +2 more sources

Improving Kademlia Lookup Privacy through Query Obfuscation [PDF]

open access: goldProceedings of the 40th ACM/SIGAPP Symposium on Applied Computing
Erik S. Daniel   +2 more
openalex   +2 more sources

A Practical Query Correlation Obfuscator Applied in Conjunctive Searchable Encryption [PDF]

open access: goldProceedings of the 2025 4th International Conference on Big Data, Information and Computer Network
H. Liu, Chungen Xu, Lin Mei, Yanzhe Zhu
openalex   +2 more sources

Computing range queries on obfuscated data

open access: closed, 2004
L’articolo descrive una tecnica per la gestione della reputazione che tiene conto della dinamica nella costruzione di pareri da parte dei nodi di una rete ...
Stefano Paraboschi
  +5 more sources

Home - About - Disclaimer - Privacy