Lightweight Privacy Protection via Adversarial Sample
Adversarial sample-based privacy protection has its own advantages compared to traditional privacy protections. Previous adversarial sample privacy protections have mostly been centralized or have not considered the issue of hardware device limitations ...
Guangxu Xie+3 more
semanticscholar +1 more source
Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)
The Internet of Things (IoT) is an emerging field consisting of Internet-based globally connected network architecture. A subset of IoT is the Internet of Healthcare Things (IoHT) that consists of smart healthcare devices having significant importance in
Jahanzeb Shahid+5 more
semanticscholar +1 more source
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy.
Shiwen Zhang+4 more
doaj +1 more source
Reversing Deep Face Embeddings with Probable Privacy Protection [PDF]
Generally, privacy-enhancing face recognition systems are designed to offer permanent protection of face embeddings. Recently, so-called soft-biometric privacy-enhancement approaches have been introduced with the aim of canceling soft-biometric attributes.
arxiv
Using location semantics to realize personalized road network location privacy protection
With the rapid development of location-based services in the field of mobile network applications, users enjoy the convenience of location-based services on one side, and they are exposed to the risk of privacy disclosure on the other side. Attackers may
Li Kuang+4 more
semanticscholar +1 more source
Obligations of trust for privacy and confidentiality in distributed transactions [PDF]
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions.
Anne Anderson+4 more
core +1 more source
Comparative Study on the Personal Privacy Protection Policies of Open Government Data Websites
[Purpose/significance] The open government data website is the carrier of the open data, and the personal privacy protection policy of the open government data website is directly related to personal privacy protection in the process of opening ...
Zhang Jianbin+4 more
doaj +1 more source
Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges [PDF]
The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging.
arxiv +1 more source
Examined Lives: Informational Privacy and the Subject as Object [PDF]
In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests.
Cohen, Julie E.
core +2 more sources
Deniable Authentication Encryption for Privacy Protection using Blockchain
Cloud applications that work on medical data using blockchain is used by managers and doctors in order to get the image data that is shared between various healthcare institutions.
C. Joe, J. S. Raj
semanticscholar +1 more source