Results 51 to 60 of about 33,105 (188)

Rate-Privacy in Wireless Sensor Networks

open access: yes, 2013
This paper introduces the concept of rate privacy in the context of wireless sensor networks. Our discussion reveals that the concept indeed is of a great importance for the privacy preservation of such networks.
Derakhshi, H.   +3 more
core   +1 more source

Advanced Cloud Privacy Threat Modeling

open access: yes, 2016
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core   +1 more source

Imageless Contraband Detection Using a Millimeter-Wave Dynamic Antenna Array via Spatial Fourier Domain Sampling

open access: yesIEEE Access
We demonstrate an imageless method of concealed contraband detection using a real-time 75 GHz rotationally dynamic antenna array. The array measures information in the two-dimensional Fourier domain and captures a set of samples that is sufficient for ...
Daniel Chen   +2 more
doaj   +1 more source

GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION [PDF]

open access: yesICTACT Journal on Soft Computing, 2011
Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-
R. Praveena Priyadarsini   +2 more
doaj  

Decentralized Privacy-Preserving Data Aggregation Scheme for Smart Grid Based on Blockchain

open access: yesSensors, 2020
As a next-generation power system, the smart grid can implement fine-grained smart metering data collection to optimize energy utilization. Smart meters face serious security challenges, such as a trusted third party or a trusted authority being attacked,
Hongbin Fan, Yining Liu, Zhixin Zeng
doaj   +1 more source

AdaptiveMutate: a technique for privacy preservation

open access: yesDigital Communications and Networks, 2019
Mobile apps are known to be rich sources for gathering privacy-sensitive information about smartphone users. Despite the presence of encryption, passive network adversaries who have access to the network infrastructure can eavesdrop on the traffic and ...
Louma Chaddad   +3 more
doaj   +1 more source

User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy

open access: yes, 2018
Recommender systems have become an integral part of many social networks and extract knowledge from a user's personal and sensitive data both explicitly, with the user's knowledge, and implicitly.
Aghasian, Erfan   +2 more
core   +1 more source

Traffic characteristic based privacy leakage assessment scheme for Android device

open access: yesTongxin xuebao, 2020
Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering ...
Zhu WANG   +4 more
doaj   +2 more sources

DP Patch: ROI-Based Approach of Privacy-Preserving Image Processing With Robust Classification

open access: yesIEEE Access
As machine and deep learning spread across diverse aspects of our society, the concerns about the privacy of the data are getting stronger, particularly in scenarios where sensitive information could be exposed as a result of various privacy attacks ...
Assem Utaliyeva   +2 more
doaj   +1 more source

Privacy Preserving Multidimensional Profiling

open access: yes, 2018
Recently, big data had become central in the analysis of human behavior and the development of innovative services. In particular, a new class of services is emerging, taking advantage of different sources of data, in order to consider the multiple aspects of human beings.
PRATESI, FRANCESCA   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy