Results 1 to 10 of about 1,487,080 (215)

Privacy-Preserving Prompt Tuning for Large Language Model Services [PDF]

open access: yesarXiv.org, 2023
Prompt tuning provides an efficient way for users to customize Large Language Models (LLMs) with their private data in the emerging LLM service scenario.
Yansong Li, Zhixing Tan, Yang Liu
semanticscholar   +1 more source

Privacy-Preserving Data Mining and Analytics in Big Data [PDF]

open access: yesE3S Web of Conferences, 2023
Privacy concerns have gotten more attention as Big Data has spread. The difficulties of striking a balance between the value of data and individual privacy have led to the emergence of privacy-preserving data mining and analytics approaches as a crucial ...
Basha M. John   +6 more
doaj   +1 more source

Privacy Preserving Data Mining Using Random Decision Tree Over Partition Data: Survey [PDF]

open access: yesITM Web of Conferences, 2022
The development of data mining with data protection and data utility can manage distributed data efficiently. This paper revisits the concepts and techniques of privacy-preserving Random Decision Tree (RDT).
Othman Nashwan Adnan   +1 more
doaj   +1 more source

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2021
We introduce CryptGPU, a system for privacy-preserving machine learning that implements all operations on the GPU (graphics processing unit). Just as GPUs played a pivotal role in the success of modern deep learning, they are also essential for realizing
Sijun Tan   +3 more
semanticscholar   +1 more source

Review of Privacy-preserving Mechanisms in Crowdsensing [PDF]

open access: yesJisuanji kexue, 2022
In recent years,the rapid popularity of intelligent terminals has greatly promoted the development of crowdsensing service paradigm,which integrates data collection,analysis and processing.As a necessary base to ensure the safe operation of services and ...
LI Li, HE Xin, HAN Zhi-jie
doaj   +1 more source

A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment

open access: yesIEEE Access, 2023
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid ...
Mete Akgun   +2 more
doaj   +1 more source

Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber

open access: yesCryptography, 2023
In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance.
Iason Papadopoulos, Jiabo Wang
doaj   +1 more source

Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation

open access: yesEntropy, 2022
Privacy-preserving machine learning has become an important study at present due to privacy policies. However, the efficiency gap between the plain-text algorithm and its privacy-preserving version still exists.
Weiming Wei, Chunming Tang, Yucheng Chen
doaj   +1 more source

THE-X: Privacy-Preserving Transformer Inference with Homomorphic Encryption [PDF]

open access: yesFindings, 2022
As more and more pre-trained language models adopt on-cloud deployment, the privacy issues grow quickly, mainly for the exposure of plain-text user data (e.g., search history, medical record, bank account).
Tianyu Chen   +8 more
semanticscholar   +1 more source

A Comprehensive Survey of Privacy-preserving Federated Learning

open access: yesACM Computing Surveys, 2021
The past four years have witnessed the rapid development of federated learning (FL). However, new privacy concerns have also emerged during the aggregation of the distributed intermediate results.
Xuefei Yin, Yanming Zhu, Jiankun Hu
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy