{"id":"https://openalex.org/W4360995372","doi":"https://doi.org/10.1109/tifs.2023.3262123","title":"Web Privacy: A Formal Adversarial Model for Query Obfuscation","display_name":"Web Privacy: A Formal Adversarial Model for Query Obfuscation","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4360995372","doi":"https://doi.org/10.1109/tifs.2023.3262123"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3262123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3262123","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/2078.1/278124","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073216192","display_name":"Florimond Houssiau","orcid":"https://orcid.org/0000-0001-7412-4389"},"institutions":[{"id":"https://openalex.org/I4210128584","display_name":"The Alan Turing Institute","ror":"https://ror.org/035dkdb55","country_code":"GB","type":"facility","lineage":["https://openalex.org/I4210128584"]},{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Florimond Houssiau","raw_affiliation_strings":["The Alan Turing Institute, London, U.K","Alan Turing Institute and Imperial College London, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0001-7412-4389","affiliations":[{"raw_affiliation_string":"The Alan Turing Institute, London, U.K","institution_ids":["https://openalex.org/I4210128584"]},{"raw_affiliation_string":"Alan Turing Institute and Imperial College London, United Kingdom","institution_ids":["https://openalex.org/I4210128584","https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091214257","display_name":"Thibaut Li\u00e9nart","orcid":null},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Thibaut Li\u00e9nart","raw_affiliation_strings":["Imperial College London, London, U.K","Imperial College London, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Imperial College London, London, U.K","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Imperial College London, United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003883360","display_name":"Julien M. Hendrickx","orcid":"https://orcid.org/0000-0001-8214-8292"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Julien Hendrickx","raw_affiliation_strings":["ICTEAM institute, UCLouvain, Ottignies-Louvain-la-Neuve, Belgium"],"raw_orcid":"https://orcid.org/0000-0001-8214-8292","affiliations":[{"raw_affiliation_string":"ICTEAM institute, UCLouvain, Ottignies-Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078253058","display_name":"Yves-Alexandre de Montjoye","orcid":"https://orcid.org/0000-0002-2559-5616"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yves-Alexandre de Montjoye","raw_affiliation_strings":["Imperial College London, London, U.K","Imperial College London, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-2559-5616","affiliations":[{"raw_affiliation_string":"Imperial College London, London, U.K","institution_ids":["https://openalex.org/I47508984"]},{"raw_affiliation_string":"Imperial College London, United Kingdom","institution_ids":["https://openalex.org/I47508984"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073216192"],"corresponding_institution_ids":["https://openalex.org/I4210128584","https://openalex.org/I47508984"],"apc_list":null,"apc_paid":null,"fwci":0.6693,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73955685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"18","issue":null,"first_page":"2132","last_page":"2143"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8852499723434448},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8456646203994751},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5422074198722839},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5207838416099548},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.44091400504112244},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43175289034843445},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4060854911804199},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.28197991847991943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2553030252456665},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20389509201049805}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8852499723434448},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8456646203994751},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5422074198722839},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5207838416099548},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.44091400504112244},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43175289034843445},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4060854911804199},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28197991847991943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2553030252456665},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20389509201049805},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2023.3262123","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3262123","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:278124","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/278124","pdf_url":null,"source":{"id":"https://openalex.org/S4306401974","display_name":"DIAL (Catholic University of Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, Vol. 18, p. 2132-2143 (2023)","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:dial.uclouvain.be:boreal:278124","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/278124","pdf_url":null,"source":{"id":"https://openalex.org/S4306401974","display_name":"DIAL (Catholic University of Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Information Forensics and Security, Vol. 18, p. 2132-2143 (2023)","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2290496","https://openalex.org/W17500249","https://openalex.org/W1200299632","https://openalex.org/W1541064913","https://openalex.org/W1559067492","https://openalex.org/W1975409939","https://openalex.org/W1988374166","https://openalex.org/W1994865005","https://openalex.org/W2018881137","https://openalex.org/W2029917036","https://openalex.org/W2033887734","https://openalex.org/W2040246974","https://openalex.org/W2050033277","https://openalex.org/W2051976102","https://openalex.org/W2056700697","https://openalex.org/W2081086981","https://openalex.org/W2097724213","https://openalex.org/W2103647628","https://openalex.org/W2116950384","https://openalex.org/W2131443541","https://openalex.org/W2134167315","https://openalex.org/W2147080696","https://openalex.org/W2148888468","https://openalex.org/W2150307013","https://openalex.org/W2155393553","https://openalex.org/W2159024459","https://openalex.org/W2253805791","https://openalex.org/W2336193681","https://openalex.org/W2341111334","https://openalex.org/W2461023463","https://openalex.org/W2535603283","https://openalex.org/W2604380040","https://openalex.org/W2799067592","https://openalex.org/W3154109599","https://openalex.org/W4244821898","https://openalex.org/W6629028937","https://openalex.org/W6635426635","https://openalex.org/W6847205394"],"related_works":["https://openalex.org/W3167178445","https://openalex.org/W4303857474","https://openalex.org/W4320086283","https://openalex.org/W4288103807","https://openalex.org/W4320342947","https://openalex.org/W2963952467","https://openalex.org/W3177538078","https://openalex.org/W3179381308","https://openalex.org/W3016257699","https://openalex.org/W3195904173"],"abstract_inverted_index":{"The":[0,121],"queries":[1,35],"we":[2,6,11,135,143,160,197],"perform,":[3],"the":[4,9,26,33,37,50,55,78,106,127,151,172,177,212,252,261,281,301,307],"searches":[5],"make,":[7],"and":[8,62,99,153,167,174,204,215,225,248,251,271,306],"websites":[10],"visit":[12],"\u2013":[13],"this":[14,289],"sensitive":[15],"data":[16,282],"is":[17,123,229,241],"collected":[18],"at":[19,285],"scale":[20],"by":[21,156],"companies":[22],"as":[23,45],"part":[24],"of":[25,36,52,176,190,209,283,300,303,309],"services":[27],"they":[28],"provide.":[29,184],"Query":[30],"obfuscation,":[31],"intertwining":[32],"genuine":[34],"user":[38,79],"with":[39,117,192,260],"artificial":[40],"queries,":[41],"has":[42],"been":[43,273],"proposed":[44],"a":[46,59,188,207,236,242,293,297],"solution":[47],"to":[48,84,97,112,125,275,278,291],"protect":[49],"privacy":[51,68,178],"individuals":[53],"on":[54,150],"web.We":[56],"here":[57],"present":[58],"formal":[60],"model":[61],"formulate":[63],"through":[64],"attack":[65],"models":[66],"three":[67],"requirements":[69],"for":[70,114,140,206],"obfuscators:":[71],"(1)":[72],"<italic":[73,87,101,199],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[74,88,102,200],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">indistinguishability</i>":[75],",":[76,90,104],"that":[77,91,105,145,180,220,226],"query":[80,107,304],"should":[81,94,108],"be":[82,95,110,276,292],"hard":[83,96,111],"identify;":[85,98],"(2)":[86],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">coverage</i>":[89],"its":[92,227],"topic":[93],"(3)":[100],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">imprecision</i>":[103],"still":[109],"identify":[113],"an":[115,157,162,181],"attacker":[116],"additional":[118],"auxiliary":[119],"information.":[120],"latter":[122],"needed":[124],"make":[126],"former":[128],"two":[129,137],"guarantees":[130,179],"\u201cfuture-proof\u201d.":[131],"Using":[132],"our":[133,221],"framework,":[134],"derive":[136],"important":[138,163],"results":[139],"obfuscators.":[141,311],"First,":[142],"show":[144,218],"indistinguishability":[146,194],"imposes":[147],"strong":[148],"bounds":[149],"coverage":[152,166,214,247],"imprecision":[154,249],"achievable":[155,213],"obfuscator.":[158],"Second,":[159],"prove":[161],"tradeoff":[164,223],"between":[165,245],"imprecision,":[168],"which":[169,196],"inherently":[170],"limits":[171],"strength":[173],"robustness":[175],"obfuscator":[182],"can":[183],"We":[185,217,287],"then":[186],"introduce":[187],"family":[189],"obfuscators":[191,256,265,305],"provable":[193],"guarantees,":[195,250,270],"call":[198],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</i>":[201],"\u2013ball":[202],"obfuscators,":[203],"show,":[205],"range":[208],"parameter":[210],"values,":[211],"imprecision.":[216],"empirically":[219],"theoretical":[222],"holds,":[224],"bound":[228],"not":[230],"tight":[231],"in":[232,235],"practice:":[233],"even":[234],"simple":[237],"idealized":[238],"setting,":[239],"there":[240],"significant":[243],"gap":[244],"practical":[246],"optimal":[253],"bounds.":[254],"While":[255],"have":[257,272],"proven":[258],"popular":[259],"general":[262],"public,":[263],"all":[264],"currently":[266],"available":[267],"provide":[268],"adhoc":[269],"shown":[274],"vulnerable":[277],"attacks,":[279],"putting":[280],"users":[284],"risk.":[286],"hope":[288],"work":[290],"first":[294],"step":[295],"towards":[296],"robust":[298],"evaluation":[299],"properties":[302],"development":[308],"principled":[310]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-10-10T00:00:00"}
