Results 61 to 70 of about 33,105 (188)
Over the past few years, there has been a notable surge in the integration of Blockchain technology into supply chain management systems. This integration holds the promise of enhanced transparency, security, and efficiency in monitoring the movement of ...
Umar Islam +7 more
doaj +1 more source
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners [PDF]
The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing.
Li, Frank, Paxson, Vern, Shin, Richard
core
Privacy Computing: Concept, Computing Framework, and Future Development Trends
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
doaj +1 more source
Location and Intent Privacy Preservation for Spatial Range Queries in a Mobile Network
Location-based services (LBSs) in a mobile network environment that provide personalized and timely information to users entail privacy concerns due to the leakage of user locations to adversaries.
Shadaab Siddiqie +2 more
doaj +1 more source
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed +2 more
core +1 more source
Information Producers, Information Consumers : Location Data Privacy in Institutional Settings [PDF]
Peer ...
Cottrill, Caitlin Doyle
core
Towards Automatic Generation of Shareable Synthetic Clinical Notes Using Neural Language Models
Large-scale clinical data is invaluable to driving many computational scientific advances today. However, understandable concerns regarding patient privacy hinder the open dissemination of such data and give rise to suboptimal siloed research.
Melamud, Oren, Shivade, Chaitanya
core +1 more source
Preserving Co-Location Privacy in Geo-Social Networks [PDF]
The number of people on social networks has grown exponentially. Users share very large volumes of personal informations and content every days. This content could be tagged with geo-spatial and temporal coordinates that may be considered sensitive for ...
Camilli, Matteo
core
Privacy Preserving Event Detection
This paper presents a privacy-preserving event detection scheme based on measurements made by a network of sensors. A diameter-like decision statistic made up of the marginal types of the measurements observed by the sensors is employed. The proposed detection scheme can achieve the best type-I error exponent as the type-II error rate is required to be
Xiaoshan Wang, Tan F. Wong
openaire +2 more sources
MediaEval 2019: concealed FGSM perturbations for privacy preservation [PDF]
This work tackles the Pixel Privacy task put forth by MediaEval 2019. Our goal is to decrease the accuracy of a classification algorithm while preserving the original image quality.
Linardos, Panagiotis +2 more
core +1 more source

