Results 321 to 330 of about 1,840,684 (372)
Some of the next articles are maybe not open access.
IEEE Internet of Things Journal, 2022
In smart grids, a major challenge is how to effectively utilize consumers’ energy consumption data while preserving security and privacy. In this article, we tackle this challenging issue and focus on energy theft detection, which is very important for ...
M. Wen +4 more
semanticscholar +1 more source
In smart grids, a major challenge is how to effectively utilize consumers’ energy consumption data while preserving security and privacy. In this article, we tackle this challenging issue and focus on energy theft detection, which is very important for ...
M. Wen +4 more
semanticscholar +1 more source
Privacy-Preserving Outsourced Profiling
2010 IEEE 12th Conference on Commerce and Enterprise Computing, 2010Personalized services attract high-value customers. Knowing the preferences and habits of an individual customer, it is possible to offer to that customer well customized and adapted services, matching his needs and desires. This is advantageous for the entity offering the service (e.g., a retailer) as well, as it helps in creating additional sales or ...
Biswas D., Haller S., Kerschbaum F.
openaire +1 more source
Privacy-Preserving Brain–Computer Interfaces: A Systematic Review
IEEE Transactions on Computational Social Systems, 2023A brain–computer interface (BCI) establishes a direct communication pathway between the human brain and a computer. It has been widely used in medical diagnosis, rehabilitation, education, entertainment, and so on.
Kun Xia +10 more
semanticscholar +1 more source
A Robust Privacy-Preserving Federated Learning Model Against Model Poisoning Attacks
IEEE Transactions on Information Forensics and SecurityAlthough federated learning offers a level of privacy by aggregating user data without direct access, it remains inherently vulnerable to various attacks, including poisoning attacks where malicious actors submit gradients that reduce model accuracy.
Abbas Yazdinejad +4 more
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security, 2022
As cities become smarter, the importance of vehicular ad hoc networks (VANETs) will be increasingly pronounced. To support latency- and time-sensitive applications, there have been attempts to utilize fog-cloud computing in VANETs.
Yafang Yang +4 more
semanticscholar +1 more source
As cities become smarter, the importance of vehicular ad hoc networks (VANETs) will be increasingly pronounced. To support latency- and time-sensitive applications, there have been attempts to utilize fog-cloud computing in VANETs.
Yafang Yang +4 more
semanticscholar +1 more source
Improving LoRA in Privacy-preserving Federated Learning
International Conference on Learning RepresentationsLow-rank adaptation (LoRA) is one of the most popular task-specific parameter-efficient fine-tuning (PEFT) methods on pre-trained language models for its good performance and computational efficiency.
Youbang Sun +3 more
semanticscholar +1 more source
IEEE Transactions on Industrial Informatics, 2022
In medical field, previous patients’ cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of precious cases while not leaking out patients’ privacy is a leading and promising work ...
Yi Sun +4 more
semanticscholar +1 more source
In medical field, previous patients’ cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of precious cases while not leaking out patients’ privacy is a leading and promising work ...
Yi Sun +4 more
semanticscholar +1 more source
IEEE Internet of Things Journal
Federated learning (FL) offers distributed machine learning on edge devices. However, the FL model raises privacy concerns. Various techniques, such as homomorphic encryption (HE), differential privacy, and multiparty cooperation, are used to address the
Qipeng Xie +8 more
semanticscholar +1 more source
Federated learning (FL) offers distributed machine learning on edge devices. However, the FL model raises privacy concerns. Various techniques, such as homomorphic encryption (HE), differential privacy, and multiparty cooperation, are used to address the
Qipeng Xie +8 more
semanticscholar +1 more source
Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs
IEEE Transactions on Vehicular Technology, 2022Vehicular Ad-hoc Network (VANET) is vital for supporting intelligent transport systems, such as traffic data sharing and cooperative processing in the modern city.
Xiaotong Zhou +4 more
semanticscholar +1 more source
Privacy-preserving fingercode authentication
Proceedings of the 12th ACM workshop on Multimedia and security, 2010We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized entities managed by a server.
Mauro Barni +10 more
openaire +2 more sources

