{"id":"https://openalex.org/W2604380040","doi":"https://doi.org/10.1109/tifs.2017.2769025","title":"Plausible Deniability in Web Search\u2014From Detection to Assessment","display_name":"Plausible Deniability in Web Search\u2014From Detection to Assessment","publication_year":2017,"publication_date":"2017-11-01","ids":{"openalex":"https://openalex.org/W2604380040","doi":"https://doi.org/10.1109/tifs.2017.2769025","mag":"2604380040"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2769025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2769025","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028352369","display_name":"P\u00f3l Mac Aonghusa","orcid":"https://orcid.org/0000-0002-7640-9668"},"institutions":[{"id":"https://openalex.org/I205274468","display_name":"Trinity College Dublin","ror":"https://ror.org/02tyrky19","country_code":"IE","type":"education","lineage":["https://openalex.org/I205274468"]},{"id":"https://openalex.org/I4210145784","display_name":"IBM Research - Ireland","ror":"https://ror.org/04jnxr720","country_code":"IE","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210145784"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Pol Mac Aonghusa","raw_affiliation_strings":["IBM Research, Dublin, Ireland","School of Computer Science and Statistics, Trinity College at Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"IBM Research, Dublin, Ireland","institution_ids":["https://openalex.org/I4210145784"]},{"raw_affiliation_string":"School of Computer Science and Statistics, Trinity College at Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I205274468"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086446911","display_name":"Douglas J. Leith","orcid":"https://orcid.org/0000-0003-4056-4014"},"institutions":[{"id":"https://openalex.org/I205274468","display_name":"Trinity College Dublin","ror":"https://ror.org/02tyrky19","country_code":"IE","type":"education","lineage":["https://openalex.org/I205274468"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Douglas J. Leith","raw_affiliation_strings":["School of Computer Science and Statistics, Trinity College at Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Statistics, Trinity College at Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I205274468"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5028352369"],"corresponding_institution_ids":["https://openalex.org/I205274468","https://openalex.org/I4210145784"],"apc_list":null,"apc_paid":null,"fwci":1.9345,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.88994953,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"13","issue":"4","first_page":"874","last_page":"887"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8204535841941833},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.43196651339530945},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3507246971130371},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.342396080493927}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8204535841941833},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.43196651339530945},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3507246971130371},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.342396080493927}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2769025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2769025","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W17500249","https://openalex.org/W1530869392","https://openalex.org/W1559067492","https://openalex.org/W1583059097","https://openalex.org/W1608104707","https://openalex.org/W1640628807","https://openalex.org/W1976525506","https://openalex.org/W2018585566","https://openalex.org/W2026002400","https://openalex.org/W2026078295","https://openalex.org/W2081086981","https://openalex.org/W2084330204","https://openalex.org/W2095414649","https://openalex.org/W2095932468","https://openalex.org/W2101234009","https://openalex.org/W2109882182","https://openalex.org/W2111944679","https://openalex.org/W2144093215","https://openalex.org/W2146707221","https://openalex.org/W2146708230","https://openalex.org/W2157800990","https://openalex.org/W2181631377","https://openalex.org/W2238342614","https://openalex.org/W2253805791","https://openalex.org/W2296759492","https://openalex.org/W2336193681","https://openalex.org/W2351971637","https://openalex.org/W2461023463","https://openalex.org/W2584956383","https://openalex.org/W2949769118","https://openalex.org/W3083206818","https://openalex.org/W6675354045","https://openalex.org/W6681435262","https://openalex.org/W6691852628"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Web":[0],"personalization":[1,17],"uses":[2],"what":[3],"systems":[4],"know":[5],"about":[6],"us":[7],"to":[8,31,77,82,95,118,125,139],"create":[9],"content":[10],"targeted":[11],"at":[12],"our":[13,43,173],"interests.":[14],"When":[15],"unwanted":[16],"suggests":[18],"we":[19,65],"are":[20,98],"interested":[21],"in":[22,55,86,106,122,172],"sensitive":[23,87],"or":[24,47],"embarrassing":[25],"topics,":[26],"a":[27,36,50,67,75,153,165],"natural":[28],"reaction":[29],"is":[30,35,45,89,114],"deny":[32,84],"interest.":[33],"This":[34],"practical":[37,68],"response":[38],"only":[39],"if":[40],"denial":[41],"of":[42,52,59,63,116,120,169],"interest":[44,85,121],"credible":[46],"plausible.":[48],"Adopting":[49],"definition":[51],"plausible":[53,96,170],"deniability":[54,97,119,171],"the":[56,61,103,135],"usual":[57],"sense":[58],"\u201con":[60],"balance":[62],"probabilities,\u201d":[64],"develop":[66],"and":[69,127,148,160],"scalable":[70],"tool":[71],"called":[72],"PDE,":[73],"allowing":[74],"user":[76],"decide":[78],"when":[79,137],"their":[80],"ability":[81],"plausibly":[83],"topics":[88,104,123,159],"compromised.":[90],"We":[91,130,151],"show":[92,131,161],"that":[93,132,162],"threats":[94,117],"readily":[99],"detectable":[100],"for":[101],"all":[102],"tested":[105],"an":[107],"extensive":[108],"testing":[109],"program.":[110],"Of":[111],"particular":[112],"concern":[113],"observation":[115],"related":[124],"health":[126],"sexual":[128],"preferences.":[129],"this":[133],"remains":[134],"case":[136],"attempting":[138],"disrupt":[140],"search":[141],"engine":[142],"learning":[143],"through":[144],"noise":[145],"query":[146],"injection":[147],"click":[149],"obfuscation.":[150],"design":[152],"defense":[154,168],"technique":[155],"exploiting":[156],"uninteresting,":[157],"proxy":[158],"it":[163],"provides":[164],"more":[166],"effective":[167],"experiments.":[174]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
