Results 1 to 10 of about 2,873,813 (294)

Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things. [PDF]

open access: yesPLoS ONE
With the widespread application of monitoring technology and network storage technology, there are some privacy issues in the process of public service advertising visual design and the process of pushing public service advertising visual design works ...
Xujun Tang
doaj   +2 more sources

An Economic Analysis of Privacy Protection and Statistical Accuracy as Social Choices [PDF]

open access: yes, 2018
Statistical agencies face a dual mandate to publish accurate statistics while protecting respondent privacy. Increasing privacy protection requires decreased accuracy. Recognizing this as a resource allocation problem, we propose an economic solution: operate where the marginal cost of increasing privacy equals the marginal benefit.
Abowd, John M, Schmutte, Ian M
arxiv   +4 more sources

The underpinnings of privacy protection [PDF]

open access: bronzeCommunications of the ACM, 1993
Frank M. Tuerkheimer
openalex   +2 more sources

The Practice and Enlightenment on Privacy Protection Service of Cornell University Library [PDF]

open access: yesNongye tushu qingbao xuebao, 2021
[Purpose/Significance] User privacy protection is an important core value issue. This paper analyzes the privacy protection services of Cornell University Library in order to provide reference for domestic libraries. [Method/Process] This paper clarifies
YU Defeng
doaj   +1 more source

Visual Content Privacy Protection: A Survey [PDF]

open access: yesACM Computing Surveys, 2023
Vision is the most important sense for people, and it is also one of the main ways of cognition. As a result, people tend to utilize visual content to capture and share their life experiences, which greatly facilitates the transfer of information ...
Ruoyu Zhao   +5 more
semanticscholar   +1 more source

Quantization Enabled Privacy Protection in Decentralized Stochastic Optimization [PDF]

open access: yesIEEE Transactions on Automatic Control, 2022
By enabling multiple agents to cooperatively solve a global optimization problem in the absence of a central coordinator, decentralized stochastic optimization is gaining increasing attention in areas as diverse as machine learning, control, and sensor ...
Yongqiang Wang, T. Başar
semanticscholar   +1 more source

Decentralized Stochastic Optimization With Inherent Privacy Protection [PDF]

open access: yesIEEE Transactions on Automatic Control, 2022
Decentralized stochastic optimization is the basic building block of modern collaborative machine learning, distributed estimation and control, and large-scale sensing.
Yongqiang Wang, H. Poor
semanticscholar   +1 more source

Privacy concerns and protection behavior during the Covid-19 pandemic [PDF]

open access: yesProblems and Perspectives in Management, 2022
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software.
Ranjany Sundaram, Snehal Shetty
doaj   +1 more source

PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs [PDF]

open access: yes2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2021
Source location privacy, occupying an unshakable status in wireless sensor networks, has a profound influence on the widespread application of wireless sensor networks (WSNs). Most privacy policies that introduce phantom nodes to the source location have
Jing Sun   +4 more
semanticscholar   +1 more source

Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing

open access: yesMathematics, 2022
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners.
Tinghuai Ma   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy