Results 21 to 30 of about 64,505 (309)

The Novel Location Privacy-Preserving CKD for Mobile Crowdsourcing Systems

open access: yesIEEE Access, 2018
With the development of mobile devices, mobile crowdsourcing has become the research hotspot in mobile crowd sensing networks (MCSS). How to protect the location privacy of mobile user in location-based services is a key problem in MCSS.
Zhongyang Chi   +3 more
doaj   +1 more source

Privacy-preserving Linear Programming [PDF]

open access: yes, 2018
A Book ...
Hong, Yuan   +3 more
openaire   +3 more sources

Privacy-Preserving Monotonicity of Differential Privacy Mechanisms

open access: yesApplied Sciences, 2018
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and ...
Hai Liu   +5 more
doaj   +1 more source

Privacy preservation by disassociation [PDF]

open access: yesProceedings of the VLDB Endowment, 2012
In this work, we focus on protection against identity disclosure in the publication of sparse multidimensional data. Existing multidimensional anonymization techniques (a) protect the privacy of users either by altering the set of quasi-identifiers of the original data (e.g., by generalization or suppression) or by ...
Terrovitis, M   +3 more
openaire   +3 more sources

Privacy-preserving machine learning based on secure three-party computations

open access: yesБезопасность информационных технологий, 2022
The paper is devoted to the analysis of privacy-preserving machine learning systems based on the concept of secure three-party computations. After general information about the purposes of secure multi-party computations and privacy-preserving machine ...
Sergey V. Zapechnikov
doaj   +1 more source

PEIGEN – a Platform for Evaluation, Implementation, and Generation of S-boxes

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In this paper, a platform named PEIGEN is presented to evaluate security, find efficient software/hardware implementations, and generate cryptographic S-boxes.
Zhenzhen Bao   +3 more
doaj   +1 more source

Privacy-Preserving Loyalty Programs [PDF]

open access: yes, 2015
Presented at the 9th DPM International Workshop on Data Privacy Management (DPM 2014, held on Sep. 10, 2014).
Blanco-Justicia, Alberto   +1 more
openaire   +2 more sources

Privacy-Preserving Restricted Boltzmann Machine [PDF]

open access: yesComputational and Mathematical Methods in Medicine, 2014
With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy.
Yu Li, Yuan Zhang, Yue Ji
openaire   +2 more sources

Privacy Computing: Concept, Computing Framework, and Future Development Trends

open access: yesEngineering, 2019
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
doaj   +1 more source

Secure Federated Evolutionary Optimization—A Survey

open access: yesEngineering
With the development of edge devices and cloud computing, the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past decade.
Qiqi Liu   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy