A Sensitive Information Detection Method Based on Network Traffic Restore

Author(s):  
Qiao Hong ◽  
Tian Zheng ◽  
Li Wenli ◽  
Tian Jianwei ◽  
Zhu Hongyu
2021 ◽  
Vol 1827 (1) ◽  
pp. 012181
Author(s):  
Shangsheng Zheng ◽  
Jiangzhou Zhang ◽  
Xiaobo Che ◽  
Yanqiang Li

2006 ◽  
Vol 13C (3) ◽  
pp. 283-294
Author(s):  
Koo-Hong Kang ◽  
Jin-Tae Oh ◽  
Jong-Soo Jang

2013 ◽  
Vol 18 (1) ◽  
pp. 15-21
Author(s):  
Tomasz Andrysiak ◽  
Łukasz Saganowski ◽  
Mirosław Maszewski

Abstract The article depicts possibility of using Matching Pursuit decomposition in order to recognize unspecified hazards in network traffic. Furthermore, the work aims to present feasible enhancements to the anomaly detection method, as well as their efficiency on the basis of a wide collection of pattern test traces.


2018 ◽  
Vol 2018 ◽  
pp. 1-18 ◽  
Author(s):  
Gesu Li ◽  
Zhipeng Cai ◽  
Guisheng Yin ◽  
Zaobo He ◽  
Madhuri Siddula

The recommender system is mainly used in the e-commerce platform. With the development of the Internet, social networks and e-commerce networks have broken each other’s boundaries. Users also post information about their favorite movies or books on social networks. With the enhancement of people’s privacy awareness, the personal information of many users released publicly is limited. In the absence of items rating and knowing some user information, we propose a novel recommendation method. This method provides a list of recommendations for target attributes based on community detection and known user attributes and links. Considering the recommendation list and published user information that may be exploited by the attacker to infer other sensitive information of users and threaten users’ privacy, we propose the CDAI (Infer Attributes based on Community Detection) method, which finds a balance between utility and privacy and provides users with safer recommendations.


Sign in / Sign up

Export Citation Format

Share Document