Results 31 to 40 of about 126,150 (308)
PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes.
Zhenzhen Bao +3 more
doaj +1 more source
Privacy-Preserving Adversarial Networks
We propose a data-driven framework for optimizing privacy-preserving data release mechanisms to attain the information-theoretically optimal tradeoff between minimizing distortion of useful data and concealing specific sensitive information. Our approach
Ishwar, Prakash +2 more
core +1 more source
Privacy-Preserving Restricted Boltzmann Machine [PDF]
With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy.
Yu Li, Yuan Zhang, Yue Ji
openaire +2 more sources
Privacy-preserving scoring of tree ensembles : a novel framework for AI in healthcare [PDF]
Machine Learning (ML) techniques now impact a wide variety of domains. Highly regulated industries such as healthcare and finance have stringent compliance and data governance policies around data sharing.
De Cock, Martine +6 more
core +1 more source
A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, in which sensor nodes are apt to encounter some serious leakage of sensitive data.
Changlun Zhang, Chao Li, Yi Zhao
doaj +1 more source
Privacy Computing: Concept, Computing Framework, and Future Development Trends
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
doaj +1 more source
POSTER: Privacy-preserving Indoor Localization
Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user's device forces the localization provider to disclose ...
Henze, Martin +3 more
core +1 more source
User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy
Recommender systems have become an integral part of many social networks and extract knowledge from a user's personal and sensitive data both explicitly, with the user's knowledge, and implicitly.
Aghasian, Erfan +2 more
core +1 more source
Secure Federated Evolutionary Optimization—A Survey
With the development of edge devices and cloud computing, the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past decade.
Qiqi Liu +6 more
doaj +1 more source
Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption
Considering the openness and cross-domains of cloud computing, the traditional privacy-preserving technology cannot be applied in cloud computing efficiently.
Hongbing Cheng +3 more
doaj +1 more source

