Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
---|---|---|---|---|
where on the internet where you can find celebrities phone numbers or address? | There are several different web sites that sell this info...\nhttp://www.reversephonedirectory.com/books/0966796179.html\nhttp://www.celebritydirect.org/book/\nhttp://www.amazon.com/Ultimate-Celebrity-Address-Phone-Book/dp/1411617533\nhttp://www.infospace.com/info/celeb/celebrity.htm | Public figures do deserve the same degree of privacy as we do. However, the exception is, whenever they are in public...it is public. They can never share our level of privacy when shopping at the mall or eating at a fast food restaurant. If George Bush decides to throw his milkshake at a waitress, then it needs to hit the national news. If you do the same thing, it doesn't even have to ever be mentioned. I don't think we have the right to know what a public figure is doing 24/7 or within the confines of their homes, unless they make it public. If Angelina Jolie wants to walk around her house naked with the windows open and shades drawn, then by all means she's inviting the public in. I don't believe the paparazzi should go to the limits they go to when getting pictures and such, but photo ops are photo ops. | eng_Latn | 18,000 |
Regulating the New Information Intermediaries as Gatekeepers of Information Diversity | Exposure to ideologically diverse news and opinion on Facebook | On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage | eng_Latn | 18,001 |
PIITracker: Automatic Tracking of Personally Identifiable Information in Windows | LLVM: a compilation framework for lifelong program analysis & transformation | Surveillance of Vaccination Coverage among Adult Populations — United States, 2015 | eng_Latn | 18,002 |
if hilary duff,brad pit,hulk hogan,and emma wattson ran for prez which one would you vote for? | why not Wolverine and his X-MEN ? | Public figures do deserve the same degree of privacy as we do. However, the exception is, whenever they are in public...it is public. They can never share our level of privacy when shopping at the mall or eating at a fast food restaurant. If George Bush decides to throw his milkshake at a waitress, then it needs to hit the national news. If you do the same thing, it doesn't even have to ever be mentioned. I don't think we have the right to know what a public figure is doing 24/7 or within the confines of their homes, unless they make it public. If Angelina Jolie wants to walk around her house naked with the windows open and shades drawn, then by all means she's inviting the public in. I don't believe the paparazzi should go to the limits they go to when getting pictures and such, but photo ops are photo ops. | eng_Latn | 18,003 |
first athlete-\nsecond celebrity\nthird girl athlete\nfourth girl celebrity | 1. Martina Hingis\n2. Jessica Alba\n3. Jenny Finch\n4. Scarlett Johansson | Public figures do deserve the same degree of privacy as we do. However, the exception is, whenever they are in public...it is public. They can never share our level of privacy when shopping at the mall or eating at a fast food restaurant. If George Bush decides to throw his milkshake at a waitress, then it needs to hit the national news. If you do the same thing, it doesn't even have to ever be mentioned. I don't think we have the right to know what a public figure is doing 24/7 or within the confines of their homes, unless they make it public. If Angelina Jolie wants to walk around her house naked with the windows open and shades drawn, then by all means she's inviting the public in. I don't believe the paparazzi should go to the limits they go to when getting pictures and such, but photo ops are photo ops. | eng_Latn | 18,004 |
Internet Traffic Measurement | Internet Web Servers: Workload Characterization and Performance Implications | A Survey of Privacy Preserving Data Publishing using Generalization and Suppression | eng_Latn | 18,005 |
User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone Data | ONLINE INFORMATION PRIVACY : MEASURING THE COST-BENEFIT TRADE-OFF | Consumer privacy concerns about Internet marketing | eng_Latn | 18,006 |
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data | Practical techniques for searches on encrypted data | Dressed for Success? The Effect of School Uniforms on Student Achievement and Behavior | eng_Latn | 18,007 |
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING | Ensuring Data Storage Security in Cloud Computing | A Cochlear Cell Line as an in vitro System for Drug Ototoxicity Screening | yue_Hant | 18,008 |
Evaluation of Location Obfuscation techniques for privacy in location based information systems | Inference Attacks on Location Tracks | peyronies ’ s disease : a review malattia di la peyronie : revisione della letteratura . | eng_Latn | 18,009 |
A new approach to interdomain routing based on secure multi-party computation | Secure multiparty computation for privacy preserving data mining | Conservative treatment for transient osteoporosis of the hip in middle- aged women | eng_Latn | 18,010 |
Big data set privacy preserving through sensitive attribute-based grouping | Calibrating Noise to Sensitivity in Private Data Analysis | Design and Reliability in Wafer Level Packaging | eng_Latn | 18,011 |
Fine-grained access control of personal data | A lattice model of secure information flow | Protecting browser state from web privacy attacks | eng_Latn | 18,012 |
fairplay - secure two - party computation system . | New Directions in Cryptography | How to interpret the helpfulness of online product reviews: bridging the needs between customers and designers | eng_Latn | 18,013 |
Merging knowledge bases in different languages | Topic-sensitive PageRank | Fundamental limits of location privacy using anonymization | eng_Latn | 18,014 |
$\textsf{LoPub}$ : High-Dimensional Crowdsourced Data Publication With Local Differential Privacy | An Adaptive Approach to Real-Time Aggregate Monitoring With Differential Privacy | Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants | yue_Hant | 18,015 |
Goal-oriented requirements enginering: a roundtrip from research to practice [enginering read engineering] | Analyzing Website privacy requirements using a privacy goal taxonomy | Structuring Use cases with goals | eng_Latn | 18,016 |
An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical | Differential privacy in new settings | understanding database schema evolution : a case study . | eng_Latn | 18,017 |
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services | Privacy Preserving Data Mining | Hebbian plasticity requires compensatory processes on multiple timescales | eng_Latn | 18,018 |
Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services | @spam: the underground on 140 characters or less | Performance analysis for an enhanced architecture of IoV via Content-Centric Networking | eng_Latn | 18,019 |
Differential Privacy in Telco Big Data Platform | Differential Privacy | Non-inverting buck-boost converter for fuel cell applications | eng_Latn | 18,020 |
An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps | Privacy and rationality in individual decision making | Top-down and bottom-up cues for scene text recognition | eng_Latn | 18,021 |
Analyzing content-based publish/subscribe systems | Event-based applications and enabling technologies | SecureML: A System for Scalable Privacy-Preserving Machine Learning | eng_Latn | 18,022 |
Applying NOX to the Datacenter | PortLand: a scalable fault-tolerant layer 2 data center network fabric | Towards privacy preserving social recommendation under personalized privacy settings | eng_Latn | 18,023 |
Data Security and Privacy in Fog Computing | Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing | Ovarian Cancer Survivors: Qualitative Analysis of the Symptom of Sexuality | kor_Hang | 18,024 |
Differential privacy: A survey of results | The tracker: a threat to statistical database security | An experiential account of phantom vibration syndrome | eng_Latn | 18,025 |
iReduct: differential privacy with reduced relative errors | Mechanism Design via Differential Privacy | Revealing information while preserving privacy | eng_Latn | 18,026 |
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks | Privacy Preserving Data Mining | A novel algorithm for activity state recognition using smartwatch data | kor_Hang | 18,027 |
Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing | CarTel: a distributed mobile sensor computing system | Fleischner Society: Glossary of Terms for Thoracic Imaging | eng_Latn | 18,028 |
Assured Deletion in the Cloud: Requirements, Challenges and Future Directions | Provable data possession at untrusted stores | Coronary artery bypass graft surgery versus percutaneous coronary intervention in patients with three-vessel disease and left main coronary disease: 5-year follow-up of the randomised, clinical SYNTAX trial | eng_Latn | 18,029 |
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy | Differentially Private Histogram Publication for Dynamic Datasets: an Adaptive Sampling Approach | Learning Structured Text Representations | eng_Latn | 18,030 |
Privacy-Preserving Crowdsourced Spectrum Sensing | Mechanism Design via Differential Privacy | mobihide : a mobilea peer - to - peer system for anonymous location - based queries . | eng_Latn | 18,031 |
A digital watermarking approach to secure and precise range query processing in sensor networks | A Privacy-Preserving Index for Range Queries | Evidence-based dentistry. | eng_Latn | 18,032 |
Examining individuals' adoption of healthcare wearable devices: An empirical study from privacy calculus perspective | The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization | Reading Together: A Successful Reading Fluency Intervention. | eng_Latn | 18,033 |
Privacy by Design in Federated Identity Management | Engineering. Privacy by design. | An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation | eng_Latn | 18,034 |
$\textsf{LoPub}$ : High-Dimensional Crowdsourced Data Publication With Local Differential Privacy | RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy | let ' s go all the way : from requirements via colored workflow nets to a bpel implementation of a new bank system . | yue_Hant | 18,035 |
human - computer interaction july 2008 privacy , trust and self - disclosure online . | Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce | Ubiquitous Smart Home System Using Android Application | eng_Latn | 18,036 |
A Survey on Privacy Preserving Data Mining Techniques | A Survey: Privacy Preservation Techniques in Data Mining | UAV-Enabled Wireless Power Transfer: Trajectory Design and Energy Optimization | kor_Hang | 18,037 |
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets | Privacy preserving analysis of vertically partitioned data using secure matrix products | Improved Line Maze Solving Algorithm for Curved and Zig-zag Track | eng_Latn | 18,038 |
the new casper : query processing for location services without compromising privacy . | Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms | TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE | eng_Latn | 18,039 |
Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems | Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm | To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles | eng_Latn | 18,040 |
Surveillance, Persuasion, and Panopticon | A Framework for Evaluating Privacy Preserving Data Mining Algorithms* | Nonverbal expression of psychological states in psychiatric patients | kor_Hang | 18,041 |
Differentially private multi-party high-dimensional data publishing | Privacy-preserving data publishing: A survey of recent developments | On the Anonymization of Sparse High-Dimensional Data | eng_Latn | 18,042 |
Extending Differential Privacy for Treating Dependent Records via Information Theory. | Bayesian Differential Privacy on Correlated Data | Problem set up and motivation | eng_Latn | 18,043 |
Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis | how public is my private life ? : privacy in online dating . | Salient object detection via local saliency estimation and global homogeneity refinement | eng_Latn | 18,044 |
Privacy-preserving datamining on vertically partitioned databases | on the design and quantification of privacy preserving data mining algorithms . | Exploring the patterns of social behavior in GitHub | eng_Latn | 18,045 |
Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System | white paper : personal health records : definitions , benefits , and strategies for overcoming barriers to adoption . | Increased Rates of Convergence Through Learning Rate Adaptation | eng_Latn | 18,046 |
DATA LEAKAGE DETECTION AND DATA PREVENTION USING ALGORITHM | Achieving k-Anonymity Privacy Protection Using Generalization and Suppression | Chargrid: Towards Understanding 2D Documents | yue_Hant | 18,047 |
Bayesian Differential Privacy on Correlated Data | Limiting privacy breaches in privacy preserving data mining | Bioleaching of spent hydrotreating catalyst by acidophilic thermophile Acidianus brierleyi: Leaching mechanism and effect of decoking | eng_Latn | 18,048 |
The pursuit of citizens' privacy: a privacy-aware smart city is possible | Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms | Visualizing Class Diagram using Orientdb NOSQL Data – Store | eng_Latn | 18,049 |
Rethinking Privacy Decisions: Pre-Existing Attitudes, Pre-Existing Emotional States, and a Situational Privacy Calculus | An Extended Privacy Calculus Model for E-Commerce Transactions | Beyond Bitcoin: A Critical Look at Blockchain-Based Systems | eng_Latn | 18,050 |
Location Diversity: Enhanced Privacy Protection in Location Based Services | Preventing Location-Based Identity Inference in Anonymous Spatial Queries | A novel approach to data mining using simplified swarm optimization | eng_Latn | 18,051 |
Efficient k-anonymization using clustering techniques | Achieving k-Anonymity Privacy Protection Using Generalization and Suppression | Eight-Degrees-of-Freedom Remote Actuation of Small Magnetic Mechanisms | eng_Latn | 18,052 |
Security issues and challenges of Vehicular Ad Hoc Networks (VANET) | ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications | On a Need to Know Basis : A Conceptual and Methodological Framework for Modelling and Analysis of Information Demand in an Enterprise Context | eng_Latn | 18,053 |
‘She believed in me’. What patients with depression value in their relationship with practitioners. A secondary analysis of multiple qualitative data sets | Self-Compassion: Conceptualizations, Correlates, & Interventions | A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing | eng_Latn | 18,054 |
Generalizing a Person Retrieval Model Hetero- and Homogeneously | Return of Frustratingly Easy Domain Adaptation | Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS | eng_Latn | 18,055 |
Searchable symmetric encryption: improved definitions and efficient constructions | Privacy Preserving Keyword Searches on Remote Encrypted Data | The Proteasome Inhibitor PS-341 in Cancer Therapy | eng_Latn | 18,056 |
Information Privacy Awareness (IPA): A Review of the Use, Definition and Measurement of IPA | Privacy in the digital age: a review of information privacy research in information systems | Implantable micromechanical parylene-based pressure sensors for unpowered intraocular pressure sensing | eng_Latn | 18,057 |
Ranking scientific publications: the effect of nonlinearity | DivRank: the interplay of prestige and diversity in information networks | 5G Privacy: Scenarios and Solutions | eng_Latn | 18,058 |
privacy aware access control for big data : a research roadmap . | A Survey of Context Modelling and Reasoning Techniques | Electromagnetic brain mapping - IEEE Signal Processing Magazine | eng_Latn | 18,059 |
Privacy awareness about information leakage: who knows what about me? | Privacy leakage vs. protection measures: the growing disconnect | Privacy Leakage in Mobile Online Social Networks | eng_Latn | 18,060 |
Staple : Complementary Learners for Real-Time Tracking Supplementary material | In defense of color-based model-free tracking | Attributed Social Graphs with Formal Privacy Guarantees | eng_Latn | 18,061 |
Decentralized Semantic Identity | Decentralizing Privacy: Using Blockchain to Protect Personal Data | The p47phox- and NADPH oxidase organiser 1 (NOXO1)-dependent activation of NADPH oxidase 1 (NOX1) mediates endothelial nitric oxide synthase (eNOS) uncoupling and endothelial dysfunction in a streptozotocin-induced murine model of diabetes | eng_Latn | 18,062 |
the new casper : query processing for location services without compromising privacy . | Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms | on normality in soft topological spaces . | eng_Latn | 18,063 |
Hiding stars with fireworks: location privacy through camouflage | Location Privacy in Pervasive Computing | Characteristics of chronic ischemic pain in patients with peripheral arterial disease | eng_Latn | 18,064 |
highly - scalable searchable symmetric encryption with support for boolean queries . | Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation | The social cognitive model of job satisfaction among teachers: Testing and validation | eng_Latn | 18,065 |
Location disclosure to social relations: why, when, & what people want to share | Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns | The active badge location system | eng_Latn | 18,066 |
A methodology for estimating the value of privacy in information disclosure systems | Privacy in electronic commerce and the economics of immediate gratification | Deep Sets | eng_Latn | 18,067 |
(α, k)-anonymous data publishing | Incognito: efficient full-domain K-anonymity | Fast rate analysis of some stochastic optimization algorithms | eng_Latn | 18,068 |
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense | Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking | Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope | eng_Latn | 18,069 |
Geometric Range Search on Encrypted Spatial Data | Secure query processing with data interoperability in a cloud database environment | Slope One Predictors for Online Rating-Based Collaborative Filtering | eng_Latn | 18,070 |
Data security and privacy in E-health Cloud: Comparative study | Data Security and Privacy Protection Issues in Cloud Computing | X3DOM volume rendering component for web content developers | kor_Hang | 18,071 |
Program Synthesis Without Full Specifications for Novel Applications | pex - white box test generation for . net . | Ensuring Privacy When Integrating Patient-Based Datasets: New Methods and Developments in Record Linkage | eng_Latn | 18,072 |
Evaluation of Location Obfuscation techniques for privacy in location based information systems | An Obfuscation-Based Approach for Protecting Location Privacy | Computational thinking (CT): on weaving it in | eng_Latn | 18,073 |
Overview of Privacy in Social Networking Sites (SNS) | Characterizing privacy in online social networks | Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression | eng_Latn | 18,074 |
A campus-level view of Netflix and Twitch: Characterization and performance implications | Characterizing Netflix bandwidth consumption | Distributed Data Mining with Differential Privacy | eng_Latn | 18,075 |
Privacy Invasions in Ubiquitous Computing | Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems | Treat penile Mondor's disease with corticosteroid cream | kor_Hang | 18,076 |
Anonymized Data: Generation, models, usage | M-invariance: towards privacy preserving re-publication of dynamic datasets | Security-control methods for statistical databases: a comparative study | eng_Latn | 18,077 |
Social Engineering in Social Networking Sites: The Art of Impersonation | Privacy and security for online social networks: challenges and opportunities | What makes Web sites credible?: a report on a large quantitative study | eng_Latn | 18,078 |
Shining the Floodlights on Mobile Web Tracking — A Privacy Survey | Detecting and Defending Against Third-Party Tracking on the Web | Aligning Qualitative, Real-Time, and Probabilistic Property Specification Patterns Using a Structured English Grammar | eng_Latn | 18,079 |
A Possible Solution for Privacy Preserving Cloud Data Storage | Privacy Preserving Data Mining | Distributed Cardinality Estimation of Set Operations with Differential Privacy | kor_Hang | 18,080 |
side channels in cloud services , the case of deduplication in cloud storage . | Differential privacy: A survey of results | using augmented and virtual reality for the development of acrophobic scenarios . comparison of the levels of presence and anxiety . | eng_Latn | 18,081 |
Community-Enhanced De-anonymization of Online Social Networks | Predicting Social Security numbers from public data | Evolution of Low Drop Out Voltage Regulator in CMOS Technologies | eng_Latn | 18,082 |
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services | An Extended Privacy Calculus Model for E-Commerce Transactions | Low-Dose Danazol in the Treatment of Livedoid Vasculitis | eng_Latn | 18,083 |
Personalized Privacy Protection in Social Networks | Preserving Privacy in Social Networks Against Neighborhood Attacks | LRR-DPUF: learning resilient and reliable digital physical unclonable function | eng_Latn | 18,084 |
Distributed Cardinality Estimation of Set Operations with Differential Privacy | Calibrating Noise to Sensitivity in Private Data Analysis | Acetylcholinesterase inhibitors from plants and fungi. | eng_Latn | 18,085 |
Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services | @spam: the underground on 140 characters or less | The battle against phishing: Dynamic Security Skins | eng_Latn | 18,086 |
The application of differential privacy to health data | Privacy, accuracy, and consistency too: a holistic solution to contingency table release | Anxiety sensitivity and panic disorder | eng_Latn | 18,087 |
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing | Location Privacy Preservation in Collaborative Spectrum Sensing | transfer learning for text mining . | eng_Latn | 18,088 |
Minimax Optimal Procedures for Locally Private Estimation | Differential privacy and robust statistics | Relations between Executive Function and Academic Achievement from Ages 5 to 17 in a Large, Representative National Sample. | eng_Latn | 18,089 |
Differential privacy under continual observation | Pan-private streaming algorithms | Fetal Pulmonary Venous Flow and Restrictive Foramen Ovale in Hypoplastic Left Heart | eng_Latn | 18,090 |
Examining individuals' adoption of healthcare wearable devices: An empirical study from privacy calculus perspective | The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization | Synaptic Dynamics in Analog VLSI | eng_Latn | 18,091 |
Location Privacy Protection for Smartphone Users | privacy protection for users of location - based services . | Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms | eng_Latn | 18,092 |
A new paradigm for collision-free hashing: incrementality at reduced cost | A digital signature scheme secure against adaptive chosen-message attacks | Disclosing too much? Situational factors affecting information disclosure in social commerce environment | eng_Latn | 18,093 |
A short review on data security and privacy issues in cloud computing | Cloud Computing Features, Issues, and Challenges: A Big Picture | Migraine pathophysiology: anatomy of the trigeminovascular pathway and associated neurological symptoms, cortical spreading depression, sensitization, and modulation of pain. | eng_Latn | 18,094 |
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense | Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking | A volumetric method for building complex models from range images | eng_Latn | 18,095 |
On the Robustness of Information-Theoretic Privacy Measures and Mechanisms | k-Anonymity: A Model for Protecting Privacy | Robust observer-based fault diagnosis for an unmanned aerial vehicle | eng_Latn | 18,096 |
Zero-knowledge proofs of retrievability | Provable data possession at untrusted stores | The Toronto Charter for Physical Activity: A Global Call for Action. | eng_Latn | 18,097 |
Privacy in Recommender Systems | Privacy enhanced recommender system | SOUL: An Edge-Cloud System for Mobile Applications in a Sensor-Rich World | eng_Latn | 18,098 |
ObliviStore: High Performance Oblivious Cloud Storage | Building castles out of mud: practical access pattern privacy and correctness on untrusted storage | biomedical text mining : a survey of recent progress . | eng_Latn | 18,099 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.