Results 51 to 60 of about 1,840,684 (372)
Privacy-Preserving Restricted Boltzmann Machine [PDF]
With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy.
Yu Li, Yuan Zhang, Yue Ji
openaire +2 more sources
Privacy Computing: Concept, Computing Framework, and Future Development Trends
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
doaj +1 more source
A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, in which sensor nodes are apt to encounter some serious leakage of sensitive data.
Changlun Zhang, Chao Li, Yi Zhao
doaj +1 more source
Deconvoluting kernel density estimation and regression for locally differentially private data
Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner.
Farhad Farokhi
doaj +1 more source
POSTER: Privacy-preserving Indoor Localization
Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user's device forces the localization provider to disclose ...
Henze, Martin +3 more
core +1 more source
Secure Federated Evolutionary Optimization—A Survey
With the development of edge devices and cloud computing, the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past decade.
Qiqi Liu +6 more
doaj +1 more source
Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption
Considering the openness and cross-domains of cloud computing, the traditional privacy-preserving technology cannot be applied in cloud computing efficiently.
Hongbing Cheng +3 more
doaj +1 more source
Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann +4 more
core
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia +3 more
core +1 more source
Privacy-Preserving Federated Learning Using Homomorphic Encryption
Federated learning (FL) is a machine learning technique that enables distributed devices to train a learning model collaboratively without sharing their local data.
Jaehyoung Park, Hyuk-Kyu Lim
semanticscholar +1 more source

