Results 21 to 30 of about 605 (220)

A Comparative Study of Large Language Models and Traditional Privacy Measures to Evaluate Query Obfuscation Approaches [PDF]

open access: goldProceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval
Francesco Luigi De Faveri   +2 more
openalex   +2 more sources

A Novel Query Obfuscation Scheme with User Controlled Privacy and Personalization

open access: bronzeInternational Journal of Computer Applications, 2017
Saraswathi Punagin, Arti Arya
openalex   +2 more sources

Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search

open access: yesIEEE Access, 2021
The Web Search Engine (WSE) is a software system used to retrieve data from the web successfully. WSE uses the user’s search queries to build the user’s profile and provide personalized results.
Mohib Ullah   +6 more
doaj   +1 more source

A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles

open access: yesApplied Sciences, 2021
During the procedure, a location-based service (LBS) query, the real location provided by the vehicle user may results in the disclosure of vehicle location privacy.
Xianyun Xu, Huifang Chen, Lei Xie
doaj   +1 more source

A Double Obfuscation Approach for Protecting the Privacy of IoT Location Based Applications

open access: yesIEEE Access, 2020
Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the
Sami Saad Albouq   +5 more
doaj   +1 more source

Balancing Accuracy and Privacy in Federated Queries of Clinical Data Repositories: Algorithm Development and Validation

open access: yesJournal of Medical Internet Research, 2020
BackgroundOver the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations.
Yu, Yun William, Weber, Griffin M
doaj   +1 more source

Trajectory privacy protection scheme based on differential privacy

open access: yesTongxin xuebao, 2021
To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient ...
Si CHEN   +3 more
doaj   +2 more sources

A Privacy Preserving Scheme for Nearest Neighbor Query

open access: yesSensors, 2018
In recent years, location privacy concerns that arise when using the nearest neighbor query services have gained increasing attention, as such services have become pervasive in mobile social networks devices and the IoT environments.
Yuhang Wang   +4 more
doaj   +1 more source

Trajectory privacy protection method based on location obfuscation

open access: yesTongxin xuebao, 2018
In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query ...
Shaobo ZHANG, Qin LIU, Guojun WANG
doaj   +2 more sources

Conceptualising quality early childhood education: Learning from young children in Brazil and South Africa through creative and play‐based methods

open access: yesBritish Educational Research Journal, EarlyView., 2023
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy