Results 41 to 50 of about 278,242 (279)
Privacy-Preserving Loyalty Programs [PDF]
Presented at the 9th DPM International Workshop on Data Privacy Management (DPM 2014, held on Sep. 10, 2014).
Blanco-Justicia, Alberto +1 more
openaire +2 more sources
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia +3 more
core +1 more source
Privacy-Preserving Restricted Boltzmann Machine [PDF]
With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy.
Yu Li, Yuan Zhang, Yue Ji
openaire +2 more sources
Privacy Computing: Concept, Computing Framework, and Future Development Trends
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
doaj +1 more source
A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, in which sensor nodes are apt to encounter some serious leakage of sensitive data.
Changlun Zhang, Chao Li, Yi Zhao
doaj +1 more source
Deconvoluting kernel density estimation and regression for locally differentially private data
Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner.
Farhad Farokhi
doaj +1 more source
Secure Federated Evolutionary Optimization—A Survey
With the development of edge devices and cloud computing, the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past decade.
Qiqi Liu +6 more
doaj +1 more source
Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption
Considering the openness and cross-domains of cloud computing, the traditional privacy-preserving technology cannot be applied in cloud computing efficiently.
Hongbing Cheng +3 more
doaj +1 more source
Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann +4 more
core
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source

