Results 11 to 20 of about 126,150 (308)
Privacy preserving data visualizations [PDF]
Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the structure, properties and relationships between variables, which may otherwise be ...
Demetris Avraam +7 more
doaj +5 more sources
PP-GWAS: Privacy Preserving Multi-Site Genome-wide Association Studies [PDF]
Genome-wide association studies help uncover genetic influences on complex traits and diseases. Importantly, multi-site data collaborations enhance the statistical power of these studies but pose challenges due to the sensitivity of genomic data ...
Arjhun Swaminathan +4 more
doaj +2 more sources
Privacy-Preserving Data Mining and Analytics in Big Data [PDF]
Privacy concerns have gotten more attention as Big Data has spread. The difficulties of striking a balance between the value of data and individual privacy have led to the emergence of privacy-preserving data mining and analytics approaches as a crucial ...
Basha M. John +6 more
doaj +1 more source
Privacy Preserving Data Mining Using Random Decision Tree Over Partition Data: Survey [PDF]
The development of data mining with data protection and data utility can manage distributed data efficiently. This paper revisits the concepts and techniques of privacy-preserving Random Decision Tree (RDT).
Othman Nashwan Adnan +1 more
doaj +1 more source
A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid ...
Mete Akgun +2 more
doaj +1 more source
Review of Privacy-preserving Mechanisms in Crowdsensing [PDF]
In recent years,the rapid popularity of intelligent terminals has greatly promoted the development of crowdsensing service paradigm,which integrates data collection,analysis and processing.As a necessary base to ensure the safe operation of services and ...
LI Li, HE Xin, HAN Zhi-jie
doaj +1 more source
Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber
In modern society, the Internet is one of the most used means of communication. Thus, secure information transfer is inevitably of major importance.
Iason Papadopoulos, Jiabo Wang
doaj +1 more source
Privacy Preserving Image Registration
v4 Accepted at Medical Image Computing and Computer Assisted Intervention (2022) 130 ...
Riccardo Taiello +4 more
openaire +5 more sources
Personalized privacy preservation [PDF]
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for all persons, with-out catering for their concrete needs. The consequence is that we may be offering insufficient protection to a subset of people, while applying excessive ...
Yufei Tao, Xiaokui Xiao
openaire +1 more source
Privacy-preserving machine learning has become an important study at present due to privacy policies. However, the efficiency gap between the plain-text algorithm and its privacy-preserving version still exists.
Weiming Wei, Chunming Tang, Yucheng Chen
doaj +1 more source

