摘要:
A method and system of recommending content and targeting advertisements for one or more users is provided. The system includes an aggregator that is connected to the one or more users and collects rich user data therefrom. The method includes collecting rich user data from one or more users; building one or more user profiles corresponding to the one or more users; storing the one or more user profiles in a memory database; requesting one or more content profiles from one or more providers; receiving the one or more content profiles; determining whether one of the user profiles is a target user profile for one of the content profiles based on the rich user data associated with the target user profile; and delivering content programs associated with the content profiles to the target user.
摘要:
A method comprising receiving an image, the image including associated contextual information; converting the received image into searchable image data, the searchable image data being descriptive of the received image; filtering information from a search database based on the contextual information associated with the received image to create a filtered information set; collecting a plurality of images from the filtered information set to create a seed data set; comparing the received image to the plurality of images from the seed data set using the searchable image data; and determining whether one of the plurality of images is related to the received image.
摘要:
A privacy auditor determines discrepancies between user privacy settings in a social network and installed applications. The privacy auditor can employ a privacy determinator that tests an installed application on various privacy levels to determine actual privacy settings of the installed application. The privacy auditor then uses a privacy comparator to derive differences between the actual privacy settings of the installed application and the user privacy settings from the social network.
摘要:
A method for providing data indicative of user engagement with content commences by first collecting data measuring user engagement with the content. The data is then aggregated in accordance with user-designated privacy constraints. Thereafter, a content profile is created for the user in accordance with the aggregated user engagement data. The content profile is then either provided to a provider of content, or used to sell services based on that content profile to the content provider
摘要:
A consumer electronic device hosts a media application that obtains media content use data for a user. The media application interfaces with a server that analyzes the media content use-related data based on a budget-constrained DCLEF and/or a distortion-constrained DCLEF mechanism. The user is then compensated for their disclosed use data based on the severity of the privacy incursion.
摘要:
The present embodiments focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data to an analyst, which is correlated with his private data, in the hope of getting some utility. When multiple data are released to one or more analyst, we design privacy preserving mappings in a decentralized fashion. In particular, each privacy preserving mapping is designed to protect against the inference of private data from each of the released data separately. Decentralization simplifies the design, by breaking one large joint optimization problem with many variables into several smaller optimizations with fewer variables.
摘要:
A methodology to protect private data when a user wishes to publicly release some data about himself, which is can be correlated with his private data. Specifically, the method and apparatus teach comparing public data with survey data having public data and associated private data. A joint probability distribution is performed to predict a private data wherein said prediction has a certain probability. At least one of said public data is altered or deleted in response to said probability exceeding a predetermined threshold.
摘要:
A method and apparatus for ensuring a level of privacy for answering a convolution query on data stored in a database is provided. The method and apparatus includes the activities of determining (402) the level of privacy associated with at least a portion of the data stored in the database and receiving (404) query data, from a querier, for use in performing a convolution over the data stored in the database. The database is searched (406) for data related to the received query data and the data that corresponds to the received query data is retrieved (408) from the database. An amount of noise based on the determined privacy level is generated (410) and added (412) to the retrieved data to create noisy data which is then communicated (414) to the querier.
摘要:
Disclosed are methods and apparatus for identifying users of content. The methods include identifying contextual information of a group of users, gathering user access data of the users on the basis of the contextual information of the group of users, analyzing temporal information of the user access data, and identifying particular users in the group of users on the basis of the analyzed temporal information and the contextual information.
摘要:
The present principles focus on the privacy-utility tradeoff encountered by a user who wishes to release some public data (denoted by X) to an analyst, that is correlated with his private data (denoted by S), in the hope of getting some utility. The public data is distorted before its release according to a probabilistic privacy preserving mapping mechanism, which limits information leakage under utility constraints. In particular, this probabilistic privacy mechanism is modeled as a conditional distribution, P_(Y|X), where Y is the actual released data to the analyst. The present principles design utility-aware privacy preserving mapping mechanisms against inference attacks, when only partial, or no, statistical knowledge of the prior distribution, P_(S,X), is available. Specifically, using maximal correlation techniques, the present principles provide a separability result on the information leakage that leads to the design of the privacy preserving mapping.