Results 41 to 50 of about 2,873,813 (294)

Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range

open access: yes网络与信息安全学报, 2023
Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the ...
Zhe SUN   +3 more
doaj   +3 more sources

Position Paper on Simulating Privacy Dynamics in Recommender Systems [PDF]

open access: yesarXiv, 2021
In this position paper, we discuss the merits of simulating privacy dynamics in recommender systems. We study this issue at hand from two perspectives: Firstly, we present a conceptual approach to integrate privacy into recommender system simulations, whose key elements are privacy agents. These agents can enhance users' profiles with different privacy
arxiv  

An Overview of AI and Blockchain Integration for Privacy-Preserving [PDF]

open access: yesarXiv, 2023
With the widespread attention and application of artificial intelligence (AI) and blockchain technologies, privacy protection techniques arising from their integration are of notable significance. In addition to protecting privacy of individuals, these techniques also guarantee security and dependability of data.
arxiv  

Enabling Probabilistic Differential Privacy Protection for Location Recommendations

open access: yesIEEE Transactions on Services Computing, 2021
The sequential pattern in the human movement is one of the most important aspects for location recommendations in geosocial networks. Existing location recommenders have to access users’ raw check-in data to mine their sequential patterns that raises ...
Jiadong Zhang, Chi-Yin Chow
semanticscholar   +1 more source

A Blockchain Privacy Protection Scheme Based on Ring Signature

open access: yesIEEE Access, 2020
Blockchain is a point-to-point distributed ledger technology based on cryptographic algorithms. However, the open and transparent blockchain ledger supplemented by statistical methods such as sociological mining and data mining has caused users’ privacy ...
Xiaofang Li   +4 more
semanticscholar   +1 more source

Privacy computing:concept, connotation and its research trend

open access: yesTongxin xuebao, 2016
s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever
Feng-hua LI   +4 more
doaj   +2 more sources

Semantic and Trade-Off Aware Location Privacy Protection in Road Networks Via Improved Multi-Objective Particle Swarm Optimization

open access: yesIEEE Access, 2021
Location privacy protection is an essential but challenging topic in the field of network security. Although the existing research methods, such as ${k}$ -anonymity, mix zone, and differential privacy, show significant success, they usually neglect the ...
Cenxi Tian   +4 more
doaj   +1 more source

Trajectory Privacy Protection Mechanism based on Social Attributes [PDF]

open access: yesarXiv, 2022
The current trajectory privacy protection technology only considers the temporal and spatial attributes of trajectory data, but ignores the social attributes. However, there is an intrinsic relationship between social attributes and human activity trajectories, which brings new challenges to trajectory privacy protection, making existing trajectory ...
arxiv  

Smart Contract Privacy Protection Using AI in Cyber-Physical Systems: Tools, Techniques and Challenges

open access: yesIEEE Access, 2020
Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient and correct smart contracts (SCs) for these smart application is a quite challenging task because of the complexity ...
Rajesh Gupta   +5 more
semanticscholar   +1 more source

DRM and Privacy [PDF]

open access: yes, 2003
Interrogating the relationship between copyright enforcement and privacy raises deeper questions about the nature of privacy and what counts, or ought to count, as privacy invasion in the age of networked digital technologies.
Cohen, Julie E.
core   +2 more sources

Home - About - Disclaimer - Privacy