Results 251 to 260 of about 33,844 (282)
Some of the next articles are maybe not open access.
Communications of the ACM, 2020
Can you answer a poll without revealing your true preferences and have the results of the poll still be accurate?
openaire +1 more source
Can you answer a poll without revealing your true preferences and have the results of the poll still be accurate?
openaire +1 more source
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019
The goals of learning from user data and preserving user privacy are often considered to be in conflict. This presentation will demonstrate that there are contexts when provable privacy guarantees can be an enabler for better web search and data mining (WSDM), and can empower researchers hoping to change the world by mining sensitive user data.
openaire +1 more source
The goals of learning from user data and preserving user privacy are often considered to be in conflict. This presentation will demonstrate that there are contexts when provable privacy guarantees can be an enabler for better web search and data mining (WSDM), and can empower researchers hoping to change the world by mining sensitive user data.
openaire +1 more source
Privacy Preserving Tâtonnement
2014Leon Walras’ theory of general equilibrium put forth the notion of tâtonnement as a process by which equilibrium prices are determined. Recently, Cole and Fleischer provided tâtonnement algorithms for both the classic One-Time and Ongoing Markets with guaranteed bounds for convergence to equilibrium prices. However, in order to reach equilibrium, trade
John Ross Wallrabenstein, Chris Clifton
openaire +1 more source
2018
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
In this chapter, we illustrate main results on privacy-preserving embeddings. Here, security properties of embeddings are analyzed by considering two possible scenarios for their use. In the first case, a client submits a query containing sensitive information to a server, which should respond to the query without gaining access to the private ...
Matteo Testa +3 more
openaire +1 more source
Privacy preservation in federated learning: An insightful survey from the GDPR perspective
Computers and Security, 2021Nguyen Binh Truong, Kai Sun, Siyao Wang
exaly
Federated Learning for Privacy Preservation in Smart Healthcare Systems: A Comprehensive Survey
IEEE Journal of Biomedical and Health Informatics, 2023Mansoor Ali +2 more
exaly
1998
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
One of the exciting mathematical developments of the past decade was the discovery of so-called uncrackable public key codes. These are codes with the characteristic that everyone knows the method of encryption, but the amount of calculation required for an outsider to break the code is considered beyond present computational capabilities.
openaire +1 more source
Differential Privacy Techniques for Cyber Physical Systems: A Survey
IEEE Communications Surveys and Tutorials, 2020Muneeb Ul Hassan +2 more
exaly

