{"id":"https://openalex.org/W6947984083","doi":"https://doi.org/10.4233/uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","title":"Towards Purpose-aware Privacy-Preserving Techniques for Predictive Applications","display_name":"Towards Purpose-aware Privacy-Preserving Techniques for Predictive Applications","publication_year":2024,"publication_date":"2024-06-13","ids":{"openalex":"https://openalex.org/W6947984083","doi":"https://doi.org/10.4233/uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb"},"language":"en","primary_location":{"id":"pmh:oai:tudelft.nl:uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","pdf_url":"https://repository.tudelft.nl/file/File_240edb20-27e3-4cf2-af85-8a5647476437","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doctoral thesis"},"type":"dissertation","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://repository.tudelft.nl/file/File_240edb20-27e3-4cf2-af85-8a5647476437","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Slokom, M.","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Slokom, M.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.08659999817609787,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.08659999817609787,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13568","display_name":"Wood and Agarwood Research","score":0.07989999651908875,"subfield":{"id":"https://openalex.org/subfields/1605","display_name":"Organic Chemistry"},"field":{"id":"https://openalex.org/fields/16","display_name":"Chemistry"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10111","display_name":"Remote Sensing in Agriculture","score":0.06040000170469284,"subfield":{"id":"https://openalex.org/subfields/2303","display_name":"Ecology"},"field":{"id":"https://openalex.org/fields/23","display_name":"Environmental Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6075000166893005},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5992000102996826},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4968999922275543},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.48539999127388},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4814999997615814},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.45419999957084656},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4122999906539917},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3953000009059906}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7749999761581421},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6075000166893005},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5992000102996826},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4968999922275543},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.48539999127388},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4814999997615814},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.45419999957084656},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4122999906539917},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3953000009059906},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3797999918460846},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.376800000667572},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3718000054359436},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3571000099182129},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3352999985218048},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.28279998898506165},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.27140000462532043},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.2540999948978424},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.2459000051021576},{"id":"https://openalex.org/C72634772","wikidata":"https://www.wikidata.org/wiki/Q386824","display_name":"Data integration","level":2,"score":0.23960000276565552},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.23819999396800995},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.2363000065088272},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23019999265670776},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.2290000021457672},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.22840000689029694},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.1972000002861023},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.19580000638961792},{"id":"https://openalex.org/C202269582","wikidata":"https://www.wikidata.org/wiki/Q2644277","display_name":"Complementarity (molecular biology)","level":2,"score":0.19580000638961792},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.19480000436306},{"id":"https://openalex.org/C158600405","wikidata":"https://www.wikidata.org/wiki/Q5054566","display_name":"Causal inference","level":2,"score":0.19249999523162842},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.19120000302791595},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.19009999930858612},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.18690000474452972},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.18619999289512634},{"id":"https://openalex.org/C2780876879","wikidata":"https://www.wikidata.org/wiki/Q3054749","display_name":"Meaning (existential)","level":2,"score":0.18549999594688416},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.18529999256134033},{"id":"https://openalex.org/C50817715","wikidata":"https://www.wikidata.org/wiki/Q79895177","display_name":"Regret","level":2,"score":0.18379999697208405},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.1834000051021576}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:tudelft.nl:uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","pdf_url":"https://repository.tudelft.nl/file/File_240edb20-27e3-4cf2-af85-8a5647476437","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doctoral thesis"},{"id":"doi:10.4233/uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","is_oa":true,"landing_page_url":"https://doi.org/10.4233/uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"pmh:oai:tudelft.nl:uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","is_oa":true,"landing_page_url":"http://resolver.tudelft.nl/uuid:4db4a67e-3e4f-4c94-b3e0-1eb8cd1765cb","pdf_url":"https://repository.tudelft.nl/file/File_240edb20-27e3-4cf2-af85-8a5647476437","source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doctoral thesis"},"sustainable_development_goals":[{"score":0.7432520389556885,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W6947984083.pdf","grobid_xml":"https://content.openalex.org/works/W6947984083.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,7,25,112,156,195,228,238,256,277,289,304,309,333,352,369,377,403,413,418,434,443,467,551,567,584,595,619,641,685,719,737,758,765,780,802],"field":[2],"of":[3,29,158,258,303,311,379,412,420,436,446,455,546,621,630,660,672,691,700,739,761,779,804],"machine":[4,201,499,529],"learning":[5,202,500,530],"(ML),":[6],"goal":[8,663],"is":[9,36,206,296,306,415,554,664,742],"to":[10,14,38,58,71,93,115,132,168,176,181,207,250,282,307,322,327,348,395,401,416,432,521,565,594,644,657,665,687,702,756,767],"leverage":[11],"algorithmic":[12],"models":[13,540],"generate":[15],"predictions,":[16],"transforming":[17],"raw":[18],"input":[19,30,219,246],"data":[20,131,138,166,220,223,345,371,427,475,480,570,573,577,590,807],"into":[21,230,668,718],"valuable":[22],"insights.":[23],"However,":[24,736],"ML":[26,196,239,259,809],"pipeline,":[27],"consisting":[28],"data,":[31,35,247,489,612],"models,":[32,260],"and":[33,41,51,90,119,172,200,221,280,399,461,502,532,541,711,747,751,764,800],"output":[34,222,488,534],"susceptible":[37],"various":[39,84,538],"vulnerabilities":[40,216],"attacks.":[42,96],"These":[43,121],"attacks":[44,244,486,494,625],"include":[45],"re-identification,":[46],"attribute":[47,65],"inference,":[48,50],"membership":[49],"model":[52,492,531,553,586,597,623],"inversion":[53,493,624],"attacks,":[54,67,214],"all":[55],"posing":[56],"threats":[57],"individual":[59,421,439],"privacy.":[60],"This":[61,162,753],"thesis":[62,150,229,781],"specifically":[63,261],"targets":[64],"inference":[66],"wherein":[68],"adversaries":[69],"seek":[70],"infer":[72,283,308,417,522,645],"sensitive":[73,252,524,547,647],"information":[74,253,457,525,548,648,678,717,763],"about":[75],"target":[76,312,552,585,596,631],"individuals.":[77,313,632],"&lt;br/&gt;&lt;br/&gt;The":[78,776],"literature":[79],"on":[80,190,245,298,343,351,368,487,491,556,588,599,609],"privacy-preserving":[81,579,607,806],"techniques":[82,106,123,608],"explores":[83],"perturbative":[85],"approaches,":[86],"including":[87],"obfuscation,":[88],"randomization,":[89],"differential":[91],"privacy,":[92],"mitigate":[94,560],"privacy":[95,134,153,184,213,330,505],"While":[97],"these":[98,209],"methods":[99,249],"have":[100],"shown":[101],"effectiveness,":[102],"conventional":[103,122],"perturbation":[104],"based":[105,367],"often":[107],"offer":[108],"generic":[109],"protection,":[110],"lacking":[111],"nuance":[113],"needed":[114],"preserve":[116],"specific":[117,170],"utility":[118],"accuracy.":[120,735],"are":[124,771,795],"typically":[125],"purpose":[126],"unaware,":[127],"meaning":[128],"they":[129],"modify":[130],"protect":[133,182,208,251,328],"while":[135,254,331,441],"maintaining":[136,255,332,442],"general":[137],"usefulness.":[139],"Recently,":[140],"there":[141,770],"has":[142,291,393,471],"been":[143],"a":[144,159,292,319,396,426,515,528,543,615,628,654,658,692,698,731],"growing":[145],"interest":[146],"in":[147,155,217,237,262,271,389,479,618,639,679,727,734],"purpose-aware":[148,152,805],"techniques.&lt;br/&gt;The":[149],"introduces":[151],"preservation":[154],"form":[157],"conceptual":[160],"framework.":[161],"approach":[163,321,358,429],"involves":[164],"tailoring":[165],"modifications":[167],"serve":[169],"purposes":[171],"implementing":[173],"changes":[174],"orthogonal":[175],"relevant":[177],"features.":[178],"We":[179,188,286,314,336,423,449,536,581,602,683,705],"aim":[180],"user":[183,329,404,674,693,716,725],"without":[185],"compromising":[186],"utility.":[187],"focus":[189],"two":[191,231],"key":[192],"applications":[193,210],"within":[194],"spectrum:":[197],"recommender":[198,263,339,509,655,681],"systems":[199],"classifiers.":[203],"The":[204,301,410],"objective":[205,302,411],"against":[211],"potential":[212,473,504,544],"addressing":[215,234],"both":[218,708],"(i.e.,":[224],"predictions).":[225],"&lt;br/&gt;&lt;br/&gt;We":[226],"structure":[227],"parts,":[232],"each":[233],"distinct":[235],"challenges":[236],"pipeline.":[240],"&lt;br/&gt;Part":[241],"1":[242],"tackles":[243],"exploring":[248,799],"accuracy":[257],"systems.":[264,682],"Firstly,":[265,512],"we":[266,384,513,563,613,634,793],"explore":[267,514,635],"an":[268,273,386,391,518,636],"attack":[269,387,539,637],"scenario":[270,388,516,638],"which":[272,390,640,688,792],"adversary":[274,290,305,392,414,519,642],"can":[275,463,694],"acquire":[276],"user-item":[278,354,397,468],"matrix":[279,398],"aims":[281,326,400,431],"privacy-sensitive":[284],"information.":[285],"assume":[287],"that":[288,295,325,338,407,430,451,583,604,703,707,723,769],"gender":[293,310,323,366],"classifier":[294],"pre-trained":[297],"unprotected":[299],"data.":[300,558,601],"propose":[315,424,564],"personalized":[316],"blurring":[317],"(PerBlur),":[318],"personalization-based":[320],"obfuscation":[324],"recommendation":[334,378,447,720],"quality.":[335],"demonstrate":[337,450,603,722],"system":[340,510,656],"algorithms":[341],"trained":[342,350,555,587,598],"obfuscated":[344,370],"perform":[346],"comparably":[347],"those":[349],"original":[353,557,568,600],"matrix.":[355,469],"&lt;br/&gt;Furthermore,":[356],"our":[357,783],"not":[359],"only":[360],"prevents":[361],"classifiers":[362,501],"from":[363,466,498,697],"predicting":[364],"users'":[365,646],"but":[372],"also":[373],"achieves":[374,591],"diversity":[375],"through":[376],"(non-stereotypical)":[380],"diverse":[381],"items.":[382],"Secondly,":[383,633],"investigate":[385,537],"access":[394],"exploit":[402],"preference":[405],"values":[406],"it":[408,748],"contains.":[409],"preferences":[419,435],"users.":[422,661],"Shuffle-NNN,":[425],"masking-based":[428],"hide":[433],"users":[437,746],"for":[438,474,788,797,808],"items":[440],"relative":[444],"performance":[445,592],"algorithms.":[448],"Shuffle-NNN":[452,470],"provides":[453,786],"evidence":[454],"what":[456,462],"should":[458],"be":[459,464,695],"retained":[460],"removed":[465],"great":[472],"release,":[476],"such":[477],"as":[478,676],"science":[481],"challenges.":[482],"&lt;br/&gt;&lt;br/&gt;Part":[483],"2":[484],"investigates":[485],"focusing":[490],"aimed":[495],"at":[496],"predictions":[497],"examining":[503],"risks":[506],"associated":[507],"with":[508,571],"outputs.":[511],"where":[517],"attempts":[520],"individuals'":[523],"by":[526,605,649,653],"querying":[527],"receiving":[533],"predictions.":[535,810],"identify":[542],"risk":[545],"leakage":[549],"when":[550],"To":[559],"this":[561,740],"risk,":[562],"replace":[566],"training":[569,576,611],"protected":[572,589],"using":[574,606,673,724],"synthetic":[575,610],"+":[578],"techniques.":[580],"show":[582],"comparable":[593],"observe":[614],"small":[616,732],"reduction":[617],"success":[620],"certain":[622],"measured":[626],"over":[627],"group":[629],"seeks":[643],"intercepting":[650],"recommendations":[651,701,729,787],"provided":[652],"set":[659],"Our":[662],"gain":[666,733,741],"insight":[667],"possible":[669],"unintended":[670],"consequences":[671],"attributes":[675,690,726],"side":[677,762],"context-aware":[680,712,728],"study":[684],"extent":[686],"personal":[689,715],"inferred":[696],"list":[699],"user.":[704],"find":[706],"standard":[709],"recommenders":[710,713],"leak":[714],"lists.&lt;br/&gt;We":[721],"yields":[730],"benefit":[738],"distributed":[743],"unevenly":[744],"among":[745],"sacrifices":[749],"coverage":[750],"diversity.":[752],"leads":[754],"us":[755],"question":[757],"actual":[759],"value":[760],"need":[766],"ensure":[768],"no":[772],"hidden":[773],"`side":[774],"effects'.":[775],"final":[777],"chapter":[778],"summarizes":[782],"findings.":[784],"It":[785],"future":[789],"research":[790],"directions":[791],"think":[794],"promising":[796],"further":[798],"promoting":[801],"use":[803]},"counts_by_year":[],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
