Results 21 to 30 of about 1,840,684 (372)

A federated graph neural network framework for privacy-preserving personalization [PDF]

open access: yesNature Communications, 2021
Graph neural network (GNN) is effective in modeling high-order interactions and has been widely used in various personalized applications such as recommendation.
Chuhan Wu   +4 more
semanticscholar   +1 more source

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2021
We introduce CryptGPU, a system for privacy-preserving machine learning that implements all operations on the GPU (graphics processing unit). Just as GPUs played a pivotal role in the success of modern deep learning, they are also essential for realizing
Sijun Tan   +3 more
semanticscholar   +1 more source

Personalized privacy preservation [PDF]

open access: yesProceedings of the 2006 ACM SIGMOD international conference on Management of data, 2006
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for all persons, with-out catering for their concrete needs. The consequence is that we may be offering insufficient protection to a subset of people, while applying excessive ...
Yufei Tao, Xiaokui Xiao
openaire   +1 more source

Privacy-Preserving Pandemic Monitoring [PDF]

open access: yes, 2021
The recent COVID-19 pandemic has presented a significant challenge for health organisations around the world in providing treatment and ensuring public health safety. While this has highlighted the importance of data sharing amongst them, it has also highlighted the importance of ensuring patient data privacy in doing so.
Win, Thu Yein, Tianfield, Hugo
openaire   +2 more sources

Privacy Preserving Data Mining [PDF]

open access: yesJournal of Cryptology, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lindell, Yehuda, Pinkas, Benny
openaire   +2 more sources

Privacy-Preserving Data Mashup [PDF]

open access: yes2011 IEEE International Conference on Advanced Information Networking and Applications, 2011
Data Mashup is a special class of mashup application that combines information on the fly from multiple data sources to respond to transient business needs. Mashing up data requires an important programming skill on the side of mashups' creators, and involves handling many challenging privacy and security concerns raised by data providers.
Barhamgi, Mahmoud   +3 more
openaire   +1 more source

SoK: Privacy-Preserving Data Synthesis [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2023
As the prevalence of data analysis grows, safeguarding data privacy has become a paramount concern. Consequently, there has been an upsurge in the development of mechanisms aimed at privacy-preserving data analyses.
Yuzheng Hu   +9 more
semanticscholar   +1 more source

Privacy-preserving association rule mining via multi-key fully homomorphic encryption

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Association rule mining is an efficient method to mine the association relationships between different items from large transaction databases, but is vulnerable to privacy leakage as operates over users’ sensitive data directly.
Peiheng Jia   +4 more
doaj   +1 more source

VirtualIdentity : privacy preserving user profiling [PDF]

open access: yes, 2016
User profiling from user generated content (UGC) is a common practice that supports the business models of many social media companies. Existing systems require that the UGC is fully exposed to the module that constructs the user profiles.
De Cock, Martine   +7 more
core   +2 more sources

Privacy Preserving Data Mining

open access: yesAdvances in Information Security, 2015
Recent interest in data collection and monitoring using data mining for security and business-related applications has raised privacy. Privacy Preserving Data Mining (PPDM) techniques require data modification to disinfect them from sensitive information
J. Vaidya, Yu Zhu, C. Clifton
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy