Results 321 to 330 of about 1,840,684 (372)
Some of the next articles are maybe not open access.

FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid

IEEE Internet of Things Journal, 2022
In smart grids, a major challenge is how to effectively utilize consumers’ energy consumption data while preserving security and privacy. In this article, we tackle this challenging issue and focus on energy theft detection, which is very important for ...
M. Wen   +4 more
semanticscholar   +1 more source

Privacy-Preserving Outsourced Profiling

2010 IEEE 12th Conference on Commerce and Enterprise Computing, 2010
Personalized services attract high-value customers. Knowing the preferences and habits of an individual customer, it is possible to offer to that customer well customized and adapted services, matching his needs and desires. This is advantageous for the entity offering the service (e.g., a retailer) as well, as it helps in creating additional sales or ...
Biswas D., Haller S., Kerschbaum F.
openaire   +1 more source

Privacy-Preserving Brain–Computer Interfaces: A Systematic Review

IEEE Transactions on Computational Social Systems, 2023
A brain–computer interface (BCI) establishes a direct communication pathway between the human brain and a computer. It has been widely used in medical diagnosis, rehabilitation, education, entertainment, and so on.
Kun Xia   +10 more
semanticscholar   +1 more source

A Robust Privacy-Preserving Federated Learning Model Against Model Poisoning Attacks

IEEE Transactions on Information Forensics and Security
Although federated learning offers a level of privacy by aggregating user data without direct access, it remains inherently vulnerable to various attacks, including poisoning attacks where malicious actors submit gradients that reduce model accuracy.
Abbas Yazdinejad   +4 more
semanticscholar   +1 more source

Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET

IEEE Transactions on Information Forensics and Security, 2022
As cities become smarter, the importance of vehicular ad hoc networks (VANETs) will be increasingly pronounced. To support latency- and time-sensitive applications, there have been attempts to utilize fog-cloud computing in VANETs.
Yafang Yang   +4 more
semanticscholar   +1 more source

Improving LoRA in Privacy-preserving Federated Learning

International Conference on Learning Representations
Low-rank adaptation (LoRA) is one of the most popular task-specific parameter-efficient fine-tuning (PEFT) methods on pre-trained language models for its good performance and computational efficiency.
Youbang Sun   +3 more
semanticscholar   +1 more source

PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare

IEEE Transactions on Industrial Informatics, 2022
In medical field, previous patients’ cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of precious cases while not leaking out patients’ privacy is a leading and promising work ...
Yi Sun   +4 more
semanticscholar   +1 more source

Efficiency Optimization Techniques in Privacy-Preserving Federated Learning With Homomorphic Encryption: A Brief Survey

IEEE Internet of Things Journal
Federated learning (FL) offers distributed machine learning on edge devices. However, the FL model raises privacy concerns. Various techniques, such as homomorphic encryption (HE), differential privacy, and multiparty cooperation, are used to address the
Qipeng Xie   +8 more
semanticscholar   +1 more source

Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs

IEEE Transactions on Vehicular Technology, 2022
Vehicular Ad-hoc Network (VANET) is vital for supporting intelligent transport systems, such as traffic data sharing and cooperative processing in the modern city.
Xiaotong Zhou   +4 more
semanticscholar   +1 more source

Privacy-preserving fingercode authentication

Proceedings of the 12th ACM workshop on Multimedia and security, 2010
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized entities managed by a server.
Mauro Barni   +10 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy