Searched for: subject%3A%22Obfuscation%22
(1 - 9 of 9)
document
Chorus, C.G. (author), van Cranenburgh, S. (author), Daniel, A.M. (author), Sandorf, Erlend Dancke (author), Sobhani, Anae (author), Szép, T. (author)
Theories of decision-making are routinely based on the notion that decision-makers choose alternatives which align with their underlying preferences—and hence that their preferences can be inferred from their choices. In some situations, however, a decision-maker may wish to hide his or her preferences from an onlooker. This paper argues that...
journal article 2021
document
Rieger, A. (author), Draws, T.A. (author), Theune, Mariët (author), Tintarev, N. (author)
During online information search, users tend to select search results that confirm previous beliefs and ignore competing possibilities. This systematic pattern in human behavior is known as confirmation bias. In this paper, we study the effect of obfuscation (i.e., hiding the result unless the user clicks on it) with warning labels and the...
conference paper 2021
document
Tang, T. (author), Ghorbani, Amineh (author), Chorus, C.G. (author)
In the field of opinion dynamics, the hiding of opinions is routinely modeled as staying silent. However, staying silent is not always feasible. In situations where opinions are indirectly expressed by one’s observable actions, people may however try to hide their opinions via a more complex and intelligent strategy called obfuscation, which...
journal article 2021
document
Slokom, M. (author), Hanjalic, A. (author), Larson, M.A. (author)
In this paper, we propose a new privacy solution for the data used to train a recommender system, i.e., the user–item matrix. The user–item matrix contains implicit information, which can be inferred using a classifier, leading to potential privacy violations. Our solution, called Personalized Blurring (PerBlur), is a simple, yet effective,...
journal article 2021
document
Langhout, Chris (author)
Although writing code seems trivial at times, problems arise when humans misinterpret what source code actually does. One of the potential causes are “atoms of confusion”; the smallest possible patterns of misinterpretable source code. The misunderstandings and errors have been studied in past for the C programming language. They are found to...
master thesis 2020
document
Ugwuoke, C.I. (author), Erkin, Z. (author), Reinders, M.J.T. (author), Lagendijk, R.L. (author)
Genome sequencing has rapidly advanced in the last decade, making it easier for anyone to obtain digital genomes at low costs from companies such as Helix, MyHeritage, and 23andMe. Companies now offer their services in a direct-to-consumer (DTC) model without the intervention of a medical institution. Thereby, providing people with direct...
conference paper 2020
document
Çalış, Metin (author)
Consensus problem has been a topic of interest for many research areas allowing multiple agents to reach an agreement through local information exchange. The explicit share of the state variables, however, may cause privacy issues due to the confidentiality of the initial values. In this work, asynchronous privacy-preserving consensus average...
master thesis 2019
document
Nandakumar, Lakshminarayanan (author), Tillem, G. (author), Erkin, Z. (author), Keviczky, T. (author)
Smart grids promise a more reliable, efficient, economically viable, and environment-friendly electricity infrastructure for the future. State estimation in smart grids plays a pivotal role in system monitoring, reliable operation, automation, and grid stabilization. However, the power consumption data collected from the users during state...
journal article 2019
document
Strucks, Christopher (author), Slokom, M. (author), Larson, M.A. (author)
Past research has demonstrated that removing implicit gender information from the user-item matrix does not result in substantial performance losses. Such results point towards promising solutions for protecting users’ privacy without compromising prediction performance, which are of particular interest in multistakeholder environments. Here,...
conference paper 2019
Searched for: subject%3A%22Obfuscation%22
(1 - 9 of 9)