Proceedings of the 18th International Conference on World Wide Web 2009
DOI: 10.1145/1526709.1526733
|View full text |Cite
|
Sign up to set email alerts
|

Releasing search queries and clicks privately

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
197
0
3

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 186 publications
(204 citation statements)
references
References 14 publications
4
197
0
3
Order By: Relevance
“…Click logs and/or query logs were also researched for Google and Yahoo search engines on cell phones [36]. Given a large query click log [26], click models provide a principled approach to inferring user-perceived relevance of web documents. There are click models as the click chain model [16] based on a solid Bayesian framework, the ImpressionRanks [5], the contextual advertising [25,43], the DBN [10], UBM [13], BBM [27] and GCM [49].…”
Section: Related Workmentioning
confidence: 99%
“…Click logs and/or query logs were also researched for Google and Yahoo search engines on cell phones [36]. Given a large query click log [26], click models provide a principled approach to inferring user-perceived relevance of web documents. There are click models as the click chain model [16] based on a solid Bayesian framework, the ImpressionRanks [5], the contextual advertising [25,43], the DBN [10], UBM [13], BBM [27] and GCM [49].…”
Section: Related Workmentioning
confidence: 99%
“…[43] argues that, for DP guarantees to be met, δ < 1/c, where c represents the number of clients answering this query. Since in our setting a client may answer the same query multiple times, we require δ < 1/(m × c), where m represents the maximum number of queries a client can answer.…”
Section: Noise At the Publishermentioning
confidence: 99%
“…There have been also a few recent works that specifically study anonymizing query logs [1,21,12,10,20]. Notably, [13,11] have demonstrated the ineffectiveness or privacy risks of naive anonymization schemes such as token based hashing and simple bundling.…”
Section: Related Workmentioning
confidence: 99%
“…Notably, [13,11] have demonstrated the ineffectiveness or privacy risks of naive anonymization schemes such as token based hashing and simple bundling. [12] provides an anonymization technique with rigorous differential privacy guarantee, however, the utility of the anonymized data is limited. [10] defines an interesting notion, k δ -anonymity, that addresses the sparsity of the query terms but does not prevent the linking attack between an individual and potentially sensitive queries.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation