Results 41 to 50 of about 2,873,813 (294)
Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the ...
Zhe SUN+3 more
doaj +3 more sources
Position Paper on Simulating Privacy Dynamics in Recommender Systems [PDF]
In this position paper, we discuss the merits of simulating privacy dynamics in recommender systems. We study this issue at hand from two perspectives: Firstly, we present a conceptual approach to integrate privacy into recommender system simulations, whose key elements are privacy agents. These agents can enhance users' profiles with different privacy
arxiv
An Overview of AI and Blockchain Integration for Privacy-Preserving [PDF]
With the widespread attention and application of artificial intelligence (AI) and blockchain technologies, privacy protection techniques arising from their integration are of notable significance. In addition to protecting privacy of individuals, these techniques also guarantee security and dependability of data.
arxiv
Enabling Probabilistic Differential Privacy Protection for Location Recommendations
The sequential pattern in the human movement is one of the most important aspects for location recommendations in geosocial networks. Existing location recommenders have to access users’ raw check-in data to mine their sequential patterns that raises ...
Jiadong Zhang, Chi-Yin Chow
semanticscholar +1 more source
A Blockchain Privacy Protection Scheme Based on Ring Signature
Blockchain is a point-to-point distributed ledger technology based on cryptographic algorithms. However, the open and transparent blockchain ledger supplemented by statistical methods such as sociological mining and data mining has caused users’ privacy ...
Xiaofang Li+4 more
semanticscholar +1 more source
Privacy computing:concept, connotation and its research trend
s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever
Feng-hua LI+4 more
doaj +2 more sources
Location privacy protection is an essential but challenging topic in the field of network security. Although the existing research methods, such as ${k}$ -anonymity, mix zone, and differential privacy, show significant success, they usually neglect the ...
Cenxi Tian+4 more
doaj +1 more source
Trajectory Privacy Protection Mechanism based on Social Attributes [PDF]
The current trajectory privacy protection technology only considers the temporal and spatial attributes of trajectory data, but ignores the social attributes. However, there is an intrinsic relationship between social attributes and human activity trajectories, which brings new challenges to trajectory privacy protection, making existing trajectory ...
arxiv
Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient and correct smart contracts (SCs) for these smart application is a quite challenging task because of the complexity ...
Rajesh Gupta+5 more
semanticscholar +1 more source
Interrogating the relationship between copyright enforcement and privacy raises deeper questions about the nature of privacy and what counts, or ought to count, as privacy invasion in the age of networked digital technologies.
Cohen, Julie E.
core +2 more sources