Results 21 to 30 of about 11,103,942 (339)

Privacy constrained information processing [PDF]

open access: yes2015 54th IEEE Conference on Decision and Control (CDC), 2015
will appear in CDC ...
Tamer Basar   +2 more
openaire   +2 more sources

Notes on information-theoretic privacy [PDF]

open access: yes2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014
We investigate the tradeoff between privacy and utility in a situation where both privacy and utility are measured in terms of mutual information. For the binary case, we fully characterize this tradeoff in case of perfect privacy and also give an upper-bound for the case where some privacy leakage is allowed.
Fady Alajaji   +2 more
openaire   +3 more sources

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

Trust and privacy in distributed work groups [PDF]

open access: yes, 2009
Proceedings of the 2nd International Workshop on Social Computing, Behavioral Modeling and PredictionTrust plays an important role in both group cooperation and economic exchange.
C Shapiro   +15 more
core   +1 more source

Privacy and artificial intelligence: challenges for protecting health information in a new era

open access: yesBMC Medical Ethics, 2021
Advances in healthcare artificial intelligence (AI) are occurring rapidly and there is a growing discussion about managing its development. Many AI technologies end up owned and controlled by private entities. The nature of the implementation of AI could
Blake Murdoch
semanticscholar   +1 more source

Differential Privacy: on the trade-off between Utility and Information Leakage [PDF]

open access: yes, 2011
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent ...
Alvim, Mário S.   +4 more
core   +6 more sources

Context-aware Data Aggregation with Localized Information Privacy [PDF]

open access: yesIEEE Conference on Communications and Network Security, 2018
In this paper, localized information privacy (LIP) is proposed, as a new privacy definition, which allows statistical aggregation while protecting users’ privacy without relying on a trusted third party. The notion of context-awareness is incorporated in
Bo Jiang, Ming Li, R. Tandon
semanticscholar   +1 more source

Decentralized Detection With Robust Information Privacy Protection [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2018
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest. However, the raw sensor observations also allow the fusion center to infer private hypotheses that we wish to protect.
Meng Sun, Wee Peng Tay
semanticscholar   +1 more source

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +1 more source

Protecting Privacy of Genomic Information

open access: yes, 2017
The ISO/IEC committee in charge of standardizing the well-known MPEG audiovisual standards has launched, in cooperation with the ISO committee on Biotechnology, a new activity for efficient compressed storage and transmission of genomic information. The paper presents proposals for adding privacy and security to such in-progress standards.
Delgado Mercè, Jaime   +2 more
openaire   +6 more sources

Home - About - Disclaimer - Privacy