Results 1 to 10 of about 124,354 (308)
PP-GWAS: Privacy Preserving Multi-Site Genome-wide Association Studies [PDF]
Genome-wide association studies help uncover genetic influences on complex traits and diseases. Importantly, multi-site data collaborations enhance the statistical power of these studies but pose challenges due to the sensitivity of genomic data ...
Arjhun Swaminathan +4 more
doaj +2 more sources
Privacy preserving data visualizations [PDF]
Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the structure, properties and relationships between variables, which may otherwise be ...
Demetris Avraam +7 more
doaj +5 more sources
Privacy-Preserving Data Mining and Analytics in Big Data [PDF]
Privacy concerns have gotten more attention as Big Data has spread. The difficulties of striking a balance between the value of data and individual privacy have led to the emergence of privacy-preserving data mining and analytics approaches as a crucial ...
Basha M. John +6 more
doaj +1 more source
Privacy Preserving Data Mining Using Random Decision Tree Over Partition Data: Survey [PDF]
The development of data mining with data protection and data utility can manage distributed data efficiently. This paper revisits the concepts and techniques of privacy-preserving Random Decision Tree (RDT).
Othman Nashwan Adnan +1 more
doaj +1 more source
Review of Privacy-preserving Mechanisms in Crowdsensing [PDF]
In recent years,the rapid popularity of intelligent terminals has greatly promoted the development of crowdsensing service paradigm,which integrates data collection,analysis and processing.As a necessary base to ensure the safe operation of services and ...
LI Li, HE Xin, HAN Zhi-jie
doaj +1 more source
A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid ...
Mete Akgun +2 more
doaj +1 more source
Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber
In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance.
Iason Papadopoulos, Jiabo Wang
doaj +1 more source
Privacy-preserving machine learning has become an important study at present due to privacy policies. However, the efficiency gap between the plain-text algorithm and its privacy-preserving version still exists.
Weiming Wei, Chunming Tang, Yucheng Chen
doaj +1 more source
Privacy-Preserving Bin-Packing With Differential Privacy
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service.
Tianyu Li +2 more
doaj +1 more source
Privacy-preserving association rule mining via multi-key fully homomorphic encryption
Association rule mining is an efficient method to mine the association relationships between different items from large transaction databases, but is vulnerable to privacy leakage as operates over users’ sensitive data directly.
Peiheng Jia +4 more
doaj +1 more source

