Results 81 to 90 of about 2,873,813 (294)

Privacy Protectability: An Information-theoretical Approach [PDF]

open access: yesarXiv, 2023
Recently, inference privacy has attracted increasing attention. The inference privacy concern arises most notably in the widely deployed edge-cloud video analytics systems, where the cloud needs the videos captured from the edge. The video data can contain sensitive information and subject to attack when they are transmitted to the cloud for inference.
arxiv  

Personal data breach notification system in the European Union: Interpretation of “without undue delay” [PDF]

open access: yes, 2011
This is the post-print version of the Article - Copyright @ 2011 Kluwer Law InternationalThe fast-moving technologies continually challenge present rules on data-privacy protection.
Wang, F
core  

Evaluating Voice Conversion-Based Privacy Protection against Informed Attackers [PDF]

open access: yesIEEE International Conference on Acoustics, Speech, and Signal Processing, 2019
Speech data conveys sensitive speaker attributes like identity or accent. With a small amount of found data, such attributes can be inferred and exploited for malicious purposes: voice cloning, spoofing, etc.
B. M. L. Srivastava   +5 more
semanticscholar   +1 more source

Privacy Architectures: Reasoning About Data Minimisation and Integrity [PDF]

open access: yes, 2014
Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task.
C. Diaz   +20 more
core   +4 more sources

Differential privacy protection technology and its application in big data environment

open access: yesTongxin xuebao, 2019
The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide ...
Yu FU, Yihan YU, Xiaoping WU
doaj   +2 more sources

LBS privacy protection technology based on searchable encryption mechanism

open access: yesMATEC Web of Conferences, 2018
Location based Service (the Location - -based Service, LBS) is a System is to transform the existing mobile communication network, wireless sensor networks, and Global Positioning System (Global Positioning System, GPS) with the combination of ...
Feng Tao, Wang Xudong, Li Xinghua
doaj   +1 more source

Privacy Protection of Social Network Data: Traceability, Technology, Policy and Perspectives [PDF]

open access: yesNongye tushu qingbao xuebao
[Purpose/Significance] The advent of the Internet and the subsequent evolution of new technologies and applications, such as big data and artificial intelligence, have spurred the exponential growth of a new generation of technologies.
YANG Ruixian, LI Hangyi, SUN Zhuo
doaj   +1 more source

User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study

open access: yesInternational Journal of Telerehabilitation, 2020
Background: Mobile health (mHealth) apps have the potential to facilitate convenient health care delivery and self-management of health. However, many users have concerns about their privacy when they use mHealth apps.
Leming Zhou, Bambang Parmanto
doaj   +1 more source

Cardea: Context-Aware Visual Privacy Protection from Pervasive Cameras [PDF]

open access: yesarXiv, 2016
The growing popularity of mobile and wearable devices with built-in cameras, the bright prospect of camera related applications such as augmented reality and life-logging system, the increased ease of taking and sharing photos, and advances in computer vision techniques have greatly facilitated people's lives in many aspects, but have also inevitably ...
arxiv  

Differentially Private Regression for Discrete-Time Survival Analysis

open access: yes, 2017
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability.
Hui, Siu Cheung, Nguyên, Thông T.
core   +1 more source

Home - About - Disclaimer - Privacy