Results 51 to 60 of about 1,939,766 (365)
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
The k-anonymity privacy requirement for publishing microdata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other with respect to certain "identifying" attributes) contains at least k records.
Ninghui Li+2 more
semanticscholar +1 more source
Privacy Preserving Data Mining
Recent interest in data collection and monitoring using data mining for security and business-related applications has raised privacy. Privacy Preserving Data Mining (PPDM) techniques require data modification to disinfect them from sensitive information
J. Vaidya, Yu Zhu, C. Clifton
semanticscholar +1 more source
Certified Robustness to Adversarial Examples with Differential Privacy [PDF]
Adversarial examples that fool machine learning models, particularly deep neural networks, have been a topic of intense research interest, with attacks and defenses being developed in a tight back-and-forth.
Mathias Lécuyer+4 more
semanticscholar +1 more source
End-to-end privacy preserving deep learning on multi-institutional medical imaging
Using large, multi-national datasets for high-performance medical imaging AI systems requires innovation in privacy-preserving machine learning so models can train on sensitive data without requiring data transfer.
Georgios Kaissis+13 more
semanticscholar +1 more source
Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging
Hardware obfuscation is widely used in practice to counteract reverse engineering. In recent years, low-level obfuscation via camouflaged gates has been increasingly discussed in the scientific community and industry.
Max Hoffmann, Christof Paar
doaj +3 more sources
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth+4 more
doaj +1 more source
Privacy is a Janus-faced value. It enables us to shut the world out, but the forms it takes and the extent to which it is protected are fundamentally public matters. Not surprisingly, then, privacy and its protection are the object of some of our most intractable conflicts over the proper role of the state and the rights and duties of individuals. This
openaire +4 more sources
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds [PDF]
"Concentrated differential privacy" was recently introduced by Dwork and Rothblum as a relaxation of differential privacy, which permits sharper analyses of many privacy-preserving computations.
A Beimel+7 more
core +2 more sources
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response [PDF]
Randomized Aggregatable Privacy-Preserving Ordinal Response, or RAPPOR, is a technology for crowdsourcing statistics from end-user client software, anonymously, with strong privacy guarantees.
Ú. Erlingsson, A. Korolova, Vasyl Pihur
semanticscholar +1 more source
The Economics of Privacy [PDF]
This article summarizes and draws connections among diverse streams of theoretical and empirical research on the economics of privacy. We focus on the economic value and consequences of protecting and disclosing personal information, and on consumers' understanding and decisions regarding the trade-offs associated with the privacy and the sharing of ...
Alessandro Acquisti (3880474)+2 more
openaire +4 more sources