Privacy Protectability: An Information-theoretical Approach [PDF]
Recently, inference privacy has attracted increasing attention. The inference privacy concern arises most notably in the widely deployed edge-cloud video analytics systems, where the cloud needs the videos captured from the edge. The video data can contain sensitive information and subject to attack when they are transmitted to the cloud for inference.
arxiv
Personal data breach notification system in the European Union: Interpretation of “without undue delay” [PDF]
This is the post-print version of the Article - Copyright @ 2011 Kluwer Law InternationalThe fast-moving technologies continually challenge present rules on data-privacy protection.
Wang, F
core
Evaluating Voice Conversion-Based Privacy Protection against Informed Attackers [PDF]
Speech data conveys sensitive speaker attributes like identity or accent. With a small amount of found data, such attributes can be inferred and exploited for malicious purposes: voice cloning, spoofing, etc.
B. M. L. Srivastava+5 more
semanticscholar +1 more source
Privacy Architectures: Reasoning About Data Minimisation and Integrity [PDF]
Privacy by design will become a legal obligation in the European Community if the Data Protection Regulation eventually gets adopted. However, taking into account privacy requirements in the design of a system is a challenging task.
C. Diaz+20 more
core +4 more sources
Differential privacy protection technology and its application in big data environment
The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide ...
Yu FU, Yihan YU, Xiaoping WU
doaj +2 more sources
LBS privacy protection technology based on searchable encryption mechanism
Location based Service (the Location - -based Service, LBS) is a System is to transform the existing mobile communication network, wireless sensor networks, and Global Positioning System (Global Positioning System, GPS) with the combination of ...
Feng Tao, Wang Xudong, Li Xinghua
doaj +1 more source
Privacy Protection of Social Network Data: Traceability, Technology, Policy and Perspectives [PDF]
[Purpose/Significance] The advent of the Internet and the subsequent evolution of new technologies and applications, such as big data and artificial intelligence, have spurred the exponential growth of a new generation of technologies.
YANG Ruixian, LI Hangyi, SUN Zhuo
doaj +1 more source
User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study
Background: Mobile health (mHealth) apps have the potential to facilitate convenient health care delivery and self-management of health. However, many users have concerns about their privacy when they use mHealth apps.
Leming Zhou, Bambang Parmanto
doaj +1 more source
Cardea: Context-Aware Visual Privacy Protection from Pervasive Cameras [PDF]
The growing popularity of mobile and wearable devices with built-in cameras, the bright prospect of camera related applications such as augmented reality and life-logging system, the increased ease of taking and sharing photos, and advances in computer vision techniques have greatly facilitated people's lives in many aspects, but have also inevitably ...
arxiv
Differentially Private Regression for Discrete-Time Survival Analysis
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability.
Hui, Siu Cheung, Nguyên, Thông T.
core +1 more source