Results 41 to 50 of about 166,795 (258)

Local Differential Privacy for Belief Functions

open access: yesProceedings of the AAAI Conference on Artificial Intelligence, 2022
In this paper, we propose two new definitions of local differential privacy for belief functions. One is based on Shafer’s semantics of randomly coded messages and the other from the perspective of imprecise probabilities. We show that such basic properties as composition and post-processing also hold for our new definitions.
Li, Qiyu   +3 more
openaire   +2 more sources

Survey on differential privacy and its progress

open access: yesTongxin xuebao, 2017
With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple ...
Zhi-qiang GAO, Yu-tao WANG
doaj   +2 more sources

IFed: A novel federated learning framework for local differential privacy in Power Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Nowadays, wireless sensor network technology is being increasingly popular which is applied to a wide range of Internet of Things. Especially, Power Internet of Things is an important and rapidly growing section in Internet of Thing systems, which ...
Hui Cao   +3 more
doaj   +1 more source

On the Lift, Related Privacy Measures, and Applications to Privacy–Utility Trade-Offs

open access: yesEntropy, 2023
This paper investigates lift, the likelihood ratio between the posterior and prior belief about sensitive features in a dataset. Maximum and minimum lifts over sensitive features quantify the adversary’s knowledge gain and should be bounded to protect ...
Mohammad Amin Zarrabian   +2 more
doaj   +1 more source

Convex Optimization for Linear Query Processing under Approximate Differential Privacy

open access: yes, 2016
Differential privacy enables organizations to collect accurate aggregates over sensitive data with strong, rigorous guarantees on individuals' privacy. Previous work has found that under differential privacy, computing multiple correlated aggregates as a
Hao, Zhifeng   +3 more
core   +1 more source

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +3 more sources

Evaluating the Utility of Paired Tumor and Germline Targeted DNA Sequencing for Pediatric Oncology Patients: A Single Institution Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski   +9 more
wiley   +1 more source

Privacy-Preserving Distributed Learning via Newton Algorithm

open access: yesMathematics, 2023
Federated learning (FL) is a prominent distributed learning framework. The main barriers of FL include communication cost and privacy breaches. In this work, we propose a novel privacy-preserving second-order-based FL method, called GDP-LocalNewton.
Zilong Cao, Xiao Guo, Hai Zhang
doaj   +1 more source

‘They Need to Hear You Say It’: Healthcare Professionals’ Perspectives on Barriers and Enablers to End‐of‐Life Discussions With Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee   +9 more
wiley   +1 more source

A trajectory data publishing algorithm satisfying local suppression

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Suppressing the trajectory data to be released can effectively reduce the risk of user privacy leakage. However, the global suppression of the data set to meet the traditional privacy model method reduces the availability of trajectory data.
Xiaohui Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy