Results 21 to 30 of about 605 (220)
A Comparative Study of Large Language Models and Traditional Privacy Measures to Evaluate Query Obfuscation Approaches [PDF]
Francesco Luigi De Faveri +2 more
openalex +2 more sources
A Novel Query Obfuscation Scheme with User Controlled Privacy and Personalization
Saraswathi Punagin, Arti Arya
openalex +2 more sources
Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search
The Web Search Engine (WSE) is a software system used to retrieve data from the web successfully. WSE uses the user’s search queries to build the user’s profile and provide personalized results.
Mohib Ullah +6 more
doaj +1 more source
A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles
During the procedure, a location-based service (LBS) query, the real location provided by the vehicle user may results in the disclosure of vehicle location privacy.
Xianyun Xu, Huifang Chen, Lei Xie
doaj +1 more source
A Double Obfuscation Approach for Protecting the Privacy of IoT Location Based Applications
Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the
Sami Saad Albouq +5 more
doaj +1 more source
BackgroundOver the past decade, the emergence of several large federated clinical data networks has enabled researchers to access data on millions of patients at dozens of health care organizations.
Yu, Yun William, Weber, Griffin M
doaj +1 more source
Trajectory privacy protection scheme based on differential privacy
To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient ...
Si CHEN +3 more
doaj +2 more sources
A Privacy Preserving Scheme for Nearest Neighbor Query
In recent years, location privacy concerns that arise when using the nearest neighbor query services have gained increasing attention, as such services have become pervasive in mobile social networks devices and the IoT environments.
Yuhang Wang +4 more
doaj +1 more source
Trajectory privacy protection method based on location obfuscation
In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query ...
Shaobo ZHANG, Qin LIU, Guojun WANG
doaj +2 more sources
Abstract Early childhood has increasingly been acknowledged as a vital time for all children. Inclusive and quality education is part of the United Nations Sustainable Development Goals, with the further specification that all children have access to quality pre‐primary education.
Laura H. V. Wright +8 more
wiley +1 more source

