Results 41 to 50 of about 1,487,229 (359)

Privacy-Preserving Monotonicity of Differential Privacy Mechanisms

open access: yesApplied Sciences, 2018
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and ...
Hai Liu   +5 more
doaj   +1 more source

Privacy-preserving machine learning based on secure three-party computations

open access: yesБезопасность информационных технологий, 2022
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machine ...
Sergey V. Zapechnikov
doaj   +1 more source

Class-Imbalance Privacy-Preserving Federated Learning for Decentralized Fault Diagnosis With Biometric Authentication

open access: yesIEEE Transactions on Industrial Informatics, 2022
Privacy protection as a major concern of the industrial big data enabling entities makes the massive safety-critical operation data of a wind turbine unable to exert its great value because of the threat of privacy leakage.
Shixiang Lu   +5 more
semanticscholar   +1 more source

Privacy Preserving Average Consensus [PDF]

open access: yesIEEE Transactions on Automatic Control, 2014
Average consensus is a widely used algorithm for distributed computing and control, where all the agents in the network constantly communicate and update their states in order to achieve an agreement. This approach could result in an undesirable disclosure of information on the initial state of agent i to the other agents.
Mo, Yilin, Murray, Richard M.
openaire   +4 more sources

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

open access: yesIACR Transactions on Symmetric Cryptology, 2019
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj   +1 more source

VirtualIdentity : privacy preserving user profiling [PDF]

open access: yes, 2016
User profiling from user generated content (UGC) is a common practice that supports the business models of many social media companies. Existing systems require that the UGC is fully exposed to the module that constructs the user profiles.
De Cock, Martine   +7 more
core   +2 more sources

Review of Privacy-Preserving Research in Recommendation Systems [PDF]

open access: yesJisuanji kexue yu tansuo, 2023
The recommendation system needs to extract the historical data information of the relevant users on a large scale as the training set of the prediction model.
FENG Han, YI Huawei, LI Xiaohui, LI Rui
doaj   +1 more source

Privacy-preserving Computing

open access: yes, 2023
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and ...
Kai Chen, Qiang Yang
semanticscholar   +1 more source

Privacy-preserving Linear Programming [PDF]

open access: yes, 2018
A Book ...
Hong, Yuan   +3 more
openaire   +3 more sources

Privacy-preserving distributed clustering [PDF]

open access: yesEURASIP Journal on Information Security, 2013
Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is pooled
Erkin, Z. (author)   +3 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy