Results 51 to 60 of about 1,840,684 (372)

Privacy-Preserving Restricted Boltzmann Machine [PDF]

open access: yesComputational and Mathematical Methods in Medicine, 2014
With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy.
Yu Li, Yuan Zhang, Yue Ji
openaire   +2 more sources

Privacy Computing: Concept, Computing Framework, and Future Development Trends

open access: yesEngineering, 2019
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
doaj   +1 more source

A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, in which sensor nodes are apt to encounter some serious leakage of sensitive data.
Changlun Zhang, Chao Li, Yi Zhao
doaj   +1 more source

Deconvoluting kernel density estimation and regression for locally differentially private data

open access: yesScientific Reports, 2020
Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner.
Farhad Farokhi
doaj   +1 more source

POSTER: Privacy-preserving Indoor Localization

open access: yes, 2014
Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user's device forces the localization provider to disclose ...
Henze, Martin   +3 more
core   +1 more source

Secure Federated Evolutionary Optimization—A Survey

open access: yesEngineering
With the development of edge devices and cloud computing, the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past decade.
Qiqi Liu   +6 more
doaj   +1 more source

Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption

open access: yesIEEE Access, 2018
Considering the openness and cross-domains of cloud computing, the traditional privacy-preserving technology cannot be applied in cloud computing efficiently.
Hongbing Cheng   +3 more
doaj   +1 more source

Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]

open access: yes, 2007
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann   +4 more
core  

A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation

open access: yes, 2015
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia   +3 more
core   +1 more source

Privacy-Preserving Federated Learning Using Homomorphic Encryption

open access: yesApplied Sciences, 2022
Federated learning (FL) is a machine learning technique that enables distributed devices to train a learning model collaboratively without sharing their local data.
Jaehyoung Park, Hyuk-Kyu Lim
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy