Results 31 to 40 of about 200,943 (331)

Crowdsourced federated learning architecture with personalized privacy preservation

open access: yesIntelligent and Converged Networks
In crowdsourced federated learning, differential privacy is commonly used to prevent the aggregation server from recovering training data from the models uploaded by clients to achieve privacy preservation.
Yunfan Xu   +3 more
doaj   +1 more source

Repairing mappings under policy views [PDF]

open access: yes, 2019
The problem of data exchange involves a source schema, a target schema and a set of mappings from transforming the data between the two schemas. We study the problem of data exchange in the presence of privacy restrictions on the source.
Bonifati, Angela   +2 more
core   +1 more source

Preserving Privacy in Production [PDF]

open access: yes, 2014
In modern manufacturing environments, new technologies are introduced that bring machines, analytics and people closer together. As a consequence, a rise in productivity, flexibility and efficiency is expected. However, these technologies raise new privacy concerns as well.
openaire   +1 more source

Privacy Threats and Privacy Preservation in Multiple Data Releases of High-Dimensional Datasets

open access: yesComputers
Determining how to balance data utilities and data privacy when datasets are released to be utilized outside the scope of data-collecting organizations constitutes a major challenge.
Surapon Riyana
doaj   +1 more source

Privacy-Preserving Electric Vehicle Charging Recommendation by Incorporating Full Homomorphic Encryption and Secure Multi-Party Computing

open access: yesWorld Electric Vehicle Journal
Electric vehicle (EV) charging recommendation can significantly improve global planning performance, corresponding to an increasing risk of privacy leakage.
Yiqi Liu, Jiaxin Ju, Zhiyi Li
doaj   +1 more source

Privacy-preserving Prediction

open access: yesCoRR, 2018
Ensuring differential privacy of models learned from sensitive user data is an important goal that has been studied extensively in recent years. It is now known that for some basic learning problems, especially those involving high-dimensional data, producing an accurate private model requires much more data than learning without privacy.
Cynthia Dwork, Vitaly Feldman
openaire   +3 more sources

Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture

open access: yesIEEE Open Journal of the Computer Society, 2021
Technological evolution has brought great changes to traditional industries. Nowadays farmers obtain great benefits such as intelligent production and convenient management from intelligent agriculture.
Li Ding   +4 more
doaj   +1 more source

ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges

open access: yes, 2017
Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces ...
Chen, Guihai   +4 more
core   +1 more source

Privacy Preserving Clustering [PDF]

open access: yes, 2005
The freedom and transparency of information flow on the Internet has heightened concerns of privacy. Given a set of data items, clustering algorithms group similar items together. Clustering has many applications, such as customerbehavior analysis, targeted marketing, forensics, and bioinformatics. In this paper, we present the design and analysis of a
Somesh Jha   +2 more
openaire   +1 more source

Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions

open access: yesJournal of King Saud University: Computer and Information Sciences
Between the changing Industry 4.0 landscape and the rise of Industry 5.0, where human intelligence and intelligent machines work together, vast amounts of privacy-sensitive data are generated, processed, and exchanged, making them attractive targets of ...
Adib Habbal   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy