Results 61 to 70 of about 33,105 (188)

Enhancing Blockchain Security Against Data Tampering: Leveraging Hybrid Model in Multimedia Forensics and Multi-Party Computation for Supply Chain Data Protection

open access: yesIEEE Access
Over the past few years, there has been a notable surge in the integration of Blockchain technology into supply chain management systems. This integration holds the promise of enhanced transparency, security, and efficiency in monitoring the movement of ...
Umar Islam   +7 more
doaj   +1 more source

Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners [PDF]

open access: yes, 2015
The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing.
Li, Frank, Paxson, Vern, Shin, Richard
core  

Privacy Computing: Concept, Computing Framework, and Future Development Trends

open access: yesEngineering, 2019
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
doaj   +1 more source

Location and Intent Privacy Preservation for Spatial Range Queries in a Mobile Network

open access: yesIEEE Access
Location-based services (LBSs) in a mobile network environment that provide personalized and timely information to users entail privacy concerns due to the leakage of user locations to adversaries.
Shadaab Siddiqie   +2 more
doaj   +1 more source

When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance

open access: yes, 2017
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the ...
Grissa, Mohamed   +2 more
core   +1 more source

Towards Automatic Generation of Shareable Synthetic Clinical Notes Using Neural Language Models

open access: yes, 2019
Large-scale clinical data is invaluable to driving many computational scientific advances today. However, understandable concerns regarding patient privacy hinder the open dissemination of such data and give rise to suboptimal siloed research.
Melamud, Oren, Shivade, Chaitanya
core   +1 more source

Preserving Co-Location Privacy in Geo-Social Networks [PDF]

open access: yes, 2012
The number of people on social networks has grown exponentially. Users share very large volumes of personal informations and content every days. This content could be tagged with geo-spatial and temporal coordinates that may be considered sensitive for ...
Camilli, Matteo
core  

Privacy Preserving Event Detection

open access: yesIEEE Transactions on Information Theory
This paper presents a privacy-preserving event detection scheme based on measurements made by a network of sensors. A diameter-like decision statistic made up of the marginal types of the measurements observed by the sensors is employed. The proposed detection scheme can achieve the best type-I error exponent as the type-II error rate is required to be
Xiaoshan Wang, Tan F. Wong
openaire   +2 more sources

MediaEval 2019: concealed FGSM perturbations for privacy preservation [PDF]

open access: yes, 2019
This work tackles the Pixel Privacy task put forth by MediaEval 2019. Our goal is to decrease the accuracy of a classification algorithm while preserving the original image quality.
Linardos, Panagiotis   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy