Results 41 to 50 of about 1,487,229 (359)
Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and ...
Hai Liu+5 more
doaj +1 more source
Privacy-preserving machine learning based on secure three-party computations
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machine ...
Sergey V. Zapechnikov
doaj +1 more source
Privacy protection as a major concern of the industrial big data enabling entities makes the massive safety-critical operation data of a wind turbine unable to exert its great value because of the threat of privacy leakage.
Shixiang Lu+5 more
semanticscholar +1 more source
Privacy Preserving Average Consensus [PDF]
Average consensus is a widely used algorithm for distributed computing and control, where all the agents in the network constantly communicate and update their states in order to achieve an agreement. This approach could result in an undesirable disclosure of information on the initial state of agent i to the other agents.
Mo, Yilin, Murray, Richard M.
openaire +4 more sources
Boomerang Connectivity Table Revisited. Application to SKINNY and AES
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher E as the composition of two sub-ciphers, i.e., E = E1 o E0, and which constructs distinguishers for E with probability p2q2 by combining differential trails for ...
Ling Song, Xianrui Qin, Lei Hu
doaj +1 more source
VirtualIdentity : privacy preserving user profiling [PDF]
User profiling from user generated content (UGC) is a common practice that supports the business models of many social media companies. Existing systems require that the UGC is fully exposed to the module that constructs the user profiles.
De Cock, Martine+7 more
core +2 more sources
Review of Privacy-Preserving Research in Recommendation Systems [PDF]
The recommendation system needs to extract the historical data information of the relevant users on a large scale as the training set of the prediction model.
FENG Han, YI Huawei, LI Xiaohui, LI Rui
doaj +1 more source
Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and ...
Kai Chen, Qiang Yang
semanticscholar +1 more source
Privacy-preserving Linear Programming [PDF]
A Book ...
Hong, Yuan+3 more
openaire +3 more sources
Privacy-preserving distributed clustering [PDF]
Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is pooled
Erkin, Z. (author)+3 more
openaire +5 more sources