Search is not available for this dataset
query
stringlengths
1
13.4k
pos
stringlengths
1
61k
neg
stringlengths
1
63.9k
query_lang
stringclasses
147 values
__index_level_0__
int64
0
3.11M
where on the internet where you can find celebrities phone numbers or address?
There are several different web sites that sell this info...\nhttp://www.reversephonedirectory.com/books/0966796179.html\nhttp://www.celebritydirect.org/book/\nhttp://www.amazon.com/Ultimate-Celebrity-Address-Phone-Book/dp/1411617533\nhttp://www.infospace.com/info/celeb/celebrity.htm
Public figures do deserve the same degree of privacy as we do. However, the exception is, whenever they are in public...it is public. They can never share our level of privacy when shopping at the mall or eating at a fast food restaurant. If George Bush decides to throw his milkshake at a waitress, then it needs to hit the national news. If you do the same thing, it doesn't even have to ever be mentioned. I don't think we have the right to know what a public figure is doing 24/7 or within the confines of their homes, unless they make it public. If Angelina Jolie wants to walk around her house naked with the windows open and shades drawn, then by all means she's inviting the public in. I don't believe the paparazzi should go to the limits they go to when getting pictures and such, but photo ops are photo ops.
eng_Latn
18,000
Regulating the New Information Intermediaries as Gatekeepers of Information Diversity
Exposure to ideologically diverse news and opinion on Facebook
On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage
eng_Latn
18,001
PIITracker: Automatic Tracking of Personally Identifiable Information in Windows
LLVM: a compilation framework for lifelong program analysis & transformation
Surveillance of Vaccination Coverage among Adult Populations — United States, 2015
eng_Latn
18,002
if hilary duff,brad pit,hulk hogan,and emma wattson ran for prez which one would you vote for?
why not Wolverine and his X-MEN ?
Public figures do deserve the same degree of privacy as we do. However, the exception is, whenever they are in public...it is public. They can never share our level of privacy when shopping at the mall or eating at a fast food restaurant. If George Bush decides to throw his milkshake at a waitress, then it needs to hit the national news. If you do the same thing, it doesn't even have to ever be mentioned. I don't think we have the right to know what a public figure is doing 24/7 or within the confines of their homes, unless they make it public. If Angelina Jolie wants to walk around her house naked with the windows open and shades drawn, then by all means she's inviting the public in. I don't believe the paparazzi should go to the limits they go to when getting pictures and such, but photo ops are photo ops.
eng_Latn
18,003
first athlete-\nsecond celebrity\nthird girl athlete\nfourth girl celebrity
1. Martina Hingis\n2. Jessica Alba\n3. Jenny Finch\n4. Scarlett Johansson
Public figures do deserve the same degree of privacy as we do. However, the exception is, whenever they are in public...it is public. They can never share our level of privacy when shopping at the mall or eating at a fast food restaurant. If George Bush decides to throw his milkshake at a waitress, then it needs to hit the national news. If you do the same thing, it doesn't even have to ever be mentioned. I don't think we have the right to know what a public figure is doing 24/7 or within the confines of their homes, unless they make it public. If Angelina Jolie wants to walk around her house naked with the windows open and shades drawn, then by all means she's inviting the public in. I don't believe the paparazzi should go to the limits they go to when getting pictures and such, but photo ops are photo ops.
eng_Latn
18,004
Internet Traffic Measurement
Internet Web Servers: Workload Characterization and Performance Implications
A Survey of Privacy Preserving Data Publishing using Generalization and Suppression
eng_Latn
18,005
User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone Data
ONLINE INFORMATION PRIVACY : MEASURING THE COST-BENEFIT TRADE-OFF
Consumer privacy concerns about Internet marketing
eng_Latn
18,006
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
Practical techniques for searches on encrypted data
Dressed for Success? The Effect of School Uniforms on Student Achievement and Behavior
eng_Latn
18,007
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Ensuring Data Storage Security in Cloud Computing
A Cochlear Cell Line as an in vitro System for Drug Ototoxicity Screening
yue_Hant
18,008
Evaluation of Location Obfuscation techniques for privacy in location based information systems
Inference Attacks on Location Tracks
peyronies ’ s disease : a review malattia di la peyronie : revisione della letteratura .
eng_Latn
18,009
A new approach to interdomain routing based on secure multi-party computation
Secure multiparty computation for privacy preserving data mining
Conservative treatment for transient osteoporosis of the hip in middle- aged women
eng_Latn
18,010
Big data set privacy preserving through sensitive attribute-based grouping
Calibrating Noise to Sensitivity in Private Data Analysis
Design and Reliability in Wafer Level Packaging
eng_Latn
18,011
Fine-grained access control of personal data
A lattice model of secure information flow
Protecting browser state from web privacy attacks
eng_Latn
18,012
fairplay - secure two - party computation system .
New Directions in Cryptography
How to interpret the helpfulness of online product reviews: bridging the needs between customers and designers
eng_Latn
18,013
Merging knowledge bases in different languages
Topic-sensitive PageRank
Fundamental limits of location privacy using anonymization
eng_Latn
18,014
$\textsf{LoPub}$ : High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
An Adaptive Approach to Real-Time Aggregate Monitoring With Differential Privacy
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants
yue_Hant
18,015
Goal-oriented requirements enginering: a roundtrip from research to practice [enginering read engineering]
Analyzing Website privacy requirements using a privacy goal taxonomy
Structuring Use cases with goals
eng_Latn
18,016
An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical
Differential privacy in new settings
understanding database schema evolution : a case study .
eng_Latn
18,017
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Privacy Preserving Data Mining
Hebbian plasticity requires compensatory processes on multiple timescales
eng_Latn
18,018
Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services
@spam: the underground on 140 characters or less
Performance analysis for an enhanced architecture of IoV via Content-Centric Networking
eng_Latn
18,019
Differential Privacy in Telco Big Data Platform
Differential Privacy
Non-inverting buck-boost converter for fuel cell applications
eng_Latn
18,020
An Empirical Investigation of the Antecedents and Consequences of Privacy Uncertainty in the Context of Mobile Apps
Privacy and rationality in individual decision making
Top-down and bottom-up cues for scene text recognition
eng_Latn
18,021
Analyzing content-based publish/subscribe systems
Event-based applications and enabling technologies
SecureML: A System for Scalable Privacy-Preserving Machine Learning
eng_Latn
18,022
Applying NOX to the Datacenter
PortLand: a scalable fault-tolerant layer 2 data center network fabric
Towards privacy preserving social recommendation under personalized privacy settings
eng_Latn
18,023
Data Security and Privacy in Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Ovarian Cancer Survivors: Qualitative Analysis of the Symptom of Sexuality
kor_Hang
18,024
Differential privacy: A survey of results
The tracker: a threat to statistical database security
An experiential account of phantom vibration syndrome
eng_Latn
18,025
iReduct: differential privacy with reduced relative errors
Mechanism Design via Differential Privacy
Revealing information while preserving privacy
eng_Latn
18,026
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks
Privacy Preserving Data Mining
A novel algorithm for activity state recognition using smartwatch data
kor_Hang
18,027
Enabling Reputation and Trust in Privacy-Preserving Mobile Sensing
CarTel: a distributed mobile sensor computing system
Fleischner Society: Glossary of Terms for Thoracic Imaging
eng_Latn
18,028
Assured Deletion in the Cloud: Requirements, Challenges and Future Directions
Provable data possession at untrusted stores
Coronary artery bypass graft surgery versus percutaneous coronary intervention in patients with three-vessel disease and left main coronary disease: 5-year follow-up of the randomised, clinical SYNTAX trial
eng_Latn
18,029
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy
Differentially Private Histogram Publication for Dynamic Datasets: an Adaptive Sampling Approach
Learning Structured Text Representations
eng_Latn
18,030
Privacy-Preserving Crowdsourced Spectrum Sensing
Mechanism Design via Differential Privacy
mobihide : a mobilea peer - to - peer system for anonymous location - based queries .
eng_Latn
18,031
A digital watermarking approach to secure and precise range query processing in sensor networks
A Privacy-Preserving Index for Range Queries
Evidence-based dentistry.
eng_Latn
18,032
Examining individuals' adoption of healthcare wearable devices: An empirical study from privacy calculus perspective
The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization
Reading Together: A Successful Reading Fluency Intervention.
eng_Latn
18,033
Privacy by Design in Federated Identity Management
Engineering. Privacy by design.
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
eng_Latn
18,034
$\textsf{LoPub}$ : High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy
let ' s go all the way : from requirements via colored workflow nets to a bpel implementation of a new bank system .
yue_Hant
18,035
human - computer interaction july 2008 privacy , trust and self - disclosure online .
Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce
Ubiquitous Smart Home System Using Android Application
eng_Latn
18,036
A Survey on Privacy Preserving Data Mining Techniques
A Survey: Privacy Preservation Techniques in Data Mining
UAV-Enabled Wireless Power Transfer: Trajectory Design and Energy Optimization
kor_Hang
18,037
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets
Privacy preserving analysis of vertically partitioned data using secure matrix products
Improved Line Maze Solving Algorithm for Curved and Zig-zag Track
eng_Latn
18,038
the new casper : query processing for location services without compromising privacy .
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
TMACS: A ROBUST AND VERIFIABLE THRESHOLD MULTI-AUTHORITY ACCESS CONTROL SYSTEM IN PUBLIC CLOUD STORAGE
eng_Latn
18,039
Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud Systems
Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
eng_Latn
18,040
Surveillance, Persuasion, and Panopticon
A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
Nonverbal expression of psychological states in psychiatric patients
kor_Hang
18,041
Differentially private multi-party high-dimensional data publishing
Privacy-preserving data publishing: A survey of recent developments
On the Anonymization of Sparse High-Dimensional Data
eng_Latn
18,042
Extending Differential Privacy for Treating Dependent Records via Information Theory.
Bayesian Differential Privacy on Correlated Data
Problem set up and motivation
eng_Latn
18,043
Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis
how public is my private life ? : privacy in online dating .
Salient object detection via local saliency estimation and global homogeneity refinement
eng_Latn
18,044
Privacy-preserving datamining on vertically partitioned databases
on the design and quantification of privacy preserving data mining algorithms .
Exploring the patterns of social behavior in GitHub
eng_Latn
18,045
Privacy-Preserving Attribute-Based Access Control Model for XML-Based Electronic Health Record System
white paper : personal health records : definitions , benefits , and strategies for overcoming barriers to adoption .
Increased Rates of Convergence Through Learning Rate Adaptation
eng_Latn
18,046
DATA LEAKAGE DETECTION AND DATA PREVENTION USING ALGORITHM
Achieving k-Anonymity Privacy Protection Using Generalization and Suppression
Chargrid: Towards Understanding 2D Documents
yue_Hant
18,047
Bayesian Differential Privacy on Correlated Data
Limiting privacy breaches in privacy preserving data mining
Bioleaching of spent hydrotreating catalyst by acidophilic thermophile Acidianus brierleyi: Leaching mechanism and effect of decoking
eng_Latn
18,048
The pursuit of citizens' privacy: a privacy-aware smart city is possible
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Visualizing Class Diagram using Orientdb NOSQL Data – Store
eng_Latn
18,049
Rethinking Privacy Decisions: Pre-Existing Attitudes, Pre-Existing Emotional States, and a Situational Privacy Calculus
An Extended Privacy Calculus Model for E-Commerce Transactions
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems
eng_Latn
18,050
Location Diversity: Enhanced Privacy Protection in Location Based Services
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
A novel approach to data mining using simplified swarm optimization
eng_Latn
18,051
Efficient k-anonymization using clustering techniques
Achieving k-Anonymity Privacy Protection Using Generalization and Suppression
Eight-Degrees-of-Freedom Remote Actuation of Small Magnetic Mechanisms
eng_Latn
18,052
Security issues and challenges of Vehicular Ad Hoc Networks (VANET)
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications
On a Need to Know Basis : A Conceptual and Methodological Framework for Modelling and Analysis of Information Demand in an Enterprise Context
eng_Latn
18,053
‘She believed in me’. What patients with depression value in their relationship with practitioners. A secondary analysis of multiple qualitative data sets
Self-Compassion: Conceptualizations, Correlates, & Interventions
A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing
eng_Latn
18,054
Generalizing a Person Retrieval Model Hetero- and Homogeneously
Return of Frustratingly Easy Domain Adaptation
Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS
eng_Latn
18,055
Searchable symmetric encryption: improved definitions and efficient constructions
Privacy Preserving Keyword Searches on Remote Encrypted Data
The Proteasome Inhibitor PS-341 in Cancer Therapy
eng_Latn
18,056
Information Privacy Awareness (IPA): A Review of the Use, Definition and Measurement of IPA
Privacy in the digital age: a review of information privacy research in information systems
Implantable micromechanical parylene-based pressure sensors for unpowered intraocular pressure sensing
eng_Latn
18,057
Ranking scientific publications: the effect of nonlinearity
DivRank: the interplay of prestige and diversity in information networks
5G Privacy: Scenarios and Solutions
eng_Latn
18,058
privacy aware access control for big data : a research roadmap .
A Survey of Context Modelling and Reasoning Techniques
Electromagnetic brain mapping - IEEE Signal Processing Magazine
eng_Latn
18,059
Privacy awareness about information leakage: who knows what about me?
Privacy leakage vs. protection measures: the growing disconnect
Privacy Leakage in Mobile Online Social Networks
eng_Latn
18,060
Staple : Complementary Learners for Real-Time Tracking Supplementary material
In defense of color-based model-free tracking
Attributed Social Graphs with Formal Privacy Guarantees
eng_Latn
18,061
Decentralized Semantic Identity
Decentralizing Privacy: Using Blockchain to Protect Personal Data
The p47phox- and NADPH oxidase organiser 1 (NOXO1)-dependent activation of NADPH oxidase 1 (NOX1) mediates endothelial nitric oxide synthase (eNOS) uncoupling and endothelial dysfunction in a streptozotocin-induced murine model of diabetes
eng_Latn
18,062
the new casper : query processing for location services without compromising privacy .
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
on normality in soft topological spaces .
eng_Latn
18,063
Hiding stars with fireworks: location privacy through camouflage
Location Privacy in Pervasive Computing
Characteristics of chronic ischemic pain in patients with peripheral arterial disease
eng_Latn
18,064
highly - scalable searchable symmetric encryption with support for boolean queries .
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
The social cognitive model of job satisfaction among teachers: Testing and validation
eng_Latn
18,065
Location disclosure to social relations: why, when, & what people want to share
Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns
The active badge location system
eng_Latn
18,066
A methodology for estimating the value of privacy in information disclosure systems
Privacy in electronic commerce and the economics of immediate gratification
Deep Sets
eng_Latn
18,067
(α, k)-anonymous data publishing
Incognito: efficient full-domain K-anonymity
Fast rate analysis of some stochastic optimization algorithms
eng_Latn
18,068
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Modeling the Shape of the Scene: A Holistic Representation of the Spatial Envelope
eng_Latn
18,069
Geometric Range Search on Encrypted Spatial Data
Secure query processing with data interoperability in a cloud database environment
Slope One Predictors for Online Rating-Based Collaborative Filtering
eng_Latn
18,070
Data security and privacy in E-health Cloud: Comparative study
Data Security and Privacy Protection Issues in Cloud Computing
X3DOM volume rendering component for web content developers
kor_Hang
18,071
Program Synthesis Without Full Specifications for Novel Applications
pex - white box test generation for . net .
Ensuring Privacy When Integrating Patient-Based Datasets: New Methods and Developments in Record Linkage
eng_Latn
18,072
Evaluation of Location Obfuscation techniques for privacy in location based information systems
An Obfuscation-Based Approach for Protecting Location Privacy
Computational thinking (CT): on weaving it in
eng_Latn
18,073
Overview of Privacy in Social Networking Sites (SNS)
Characterizing privacy in online social networks
Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression
eng_Latn
18,074
A campus-level view of Netflix and Twitch: Characterization and performance implications
Characterizing Netflix bandwidth consumption
Distributed Data Mining with Differential Privacy
eng_Latn
18,075
Privacy Invasions in Ubiquitous Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
Treat penile Mondor's disease with corticosteroid cream
kor_Hang
18,076
Anonymized Data: Generation, models, usage
M-invariance: towards privacy preserving re-publication of dynamic datasets
Security-control methods for statistical databases: a comparative study
eng_Latn
18,077
Social Engineering in Social Networking Sites: The Art of Impersonation
Privacy and security for online social networks: challenges and opportunities
What makes Web sites credible?: a report on a large quantitative study
eng_Latn
18,078
Shining the Floodlights on Mobile Web Tracking — A Privacy Survey
Detecting and Defending Against Third-Party Tracking on the Web
Aligning Qualitative, Real-Time, and Probabilistic Property Specification Patterns Using a Structured English Grammar
eng_Latn
18,079
A Possible Solution for Privacy Preserving Cloud Data Storage
Privacy Preserving Data Mining
Distributed Cardinality Estimation of Set Operations with Differential Privacy
kor_Hang
18,080
side channels in cloud services , the case of deduplication in cloud storage .
Differential privacy: A survey of results
using augmented and virtual reality for the development of acrophobic scenarios . comparison of the levels of presence and anxiety .
eng_Latn
18,081
Community-Enhanced De-anonymization of Online Social Networks
Predicting Social Security numbers from public data
Evolution of Low Drop Out Voltage Regulator in CMOS Technologies
eng_Latn
18,082
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services
An Extended Privacy Calculus Model for E-Commerce Transactions
Low-Dose Danazol in the Treatment of Livedoid Vasculitis
eng_Latn
18,083
Personalized Privacy Protection in Social Networks
Preserving Privacy in Social Networks Against Neighborhood Attacks
LRR-DPUF: learning resilient and reliable digital physical unclonable function
eng_Latn
18,084
Distributed Cardinality Estimation of Set Operations with Differential Privacy
Calibrating Noise to Sensitivity in Private Data Analysis
Acetylcholinesterase inhibitors from plants and fungi.
eng_Latn
18,085
Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services
@spam: the underground on 140 characters or less
The battle against phishing: Dynamic Security Skins
eng_Latn
18,086
The application of differential privacy to health data
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
Anxiety sensitivity and panic disorder
eng_Latn
18,087
You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing
Location Privacy Preservation in Collaborative Spectrum Sensing
transfer learning for text mining .
eng_Latn
18,088
Minimax Optimal Procedures for Locally Private Estimation
Differential privacy and robust statistics
Relations between Executive Function and Academic Achievement from Ages 5 to 17 in a Large, Representative National Sample.
eng_Latn
18,089
Differential privacy under continual observation
Pan-private streaming algorithms
Fetal Pulmonary Venous Flow and Restrictive Foramen Ovale in Hypoplastic Left Heart
eng_Latn
18,090
Examining individuals' adoption of healthcare wearable devices: An empirical study from privacy calculus perspective
The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization
Synaptic Dynamics in Analog VLSI
eng_Latn
18,091
Location Privacy Protection for Smartphone Users
privacy protection for users of location - based services .
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
eng_Latn
18,092
A new paradigm for collision-free hashing: incrementality at reduced cost
A digital signature scheme secure against adaptive chosen-message attacks
Disclosing too much? Situational factors affecting information disclosure in social commerce environment
eng_Latn
18,093
A short review on data security and privacy issues in cloud computing
Cloud Computing Features, Issues, and Challenges: A Big Picture
Migraine pathophysiology: anatomy of the trigeminovascular pathway and associated neurological symptoms, cortical spreading depression, sensitization, and modulation of pain.
eng_Latn
18,094
Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
A volumetric method for building complex models from range images
eng_Latn
18,095
On the Robustness of Information-Theoretic Privacy Measures and Mechanisms
k-Anonymity: A Model for Protecting Privacy
Robust observer-based fault diagnosis for an unmanned aerial vehicle
eng_Latn
18,096
Zero-knowledge proofs of retrievability
Provable data possession at untrusted stores
The Toronto Charter for Physical Activity: A Global Call for Action.
eng_Latn
18,097
Privacy in Recommender Systems
Privacy enhanced recommender system
SOUL: An Edge-Cloud System for Mobile Applications in a Sensor-Rich World
eng_Latn
18,098
ObliviStore: High Performance Oblivious Cloud Storage
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
biomedical text mining : a survey of recent progress .
eng_Latn
18,099