Results 81 to 90 of about 79,561 (230)

PPTIF: Privacy-Preserving Transformer Inference Framework for Language Translation

open access: yesIEEE Access
The Transformer model has emerged as a prominent machine learning tool within the field of natural language processing. Nevertheless, running the Transformer model on resource-constrained devices presents a notable challenge that needs to be addressed ...
Yanxin Liu, Qianqian Su
doaj   +1 more source

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing

open access: yesJournal of Electrical and Computer Engineering, 2016
Cloud storage has been recognized as the popular solution to solve the problems of the rising storage costs of IT enterprises for users. However, outsourcing data to the cloud service providers (CSPs) may leak some sensitive privacy information, as the ...
Xinyue Cao, Zhangjie Fu, Xingming Sun
doaj   +1 more source

Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation. [PDF]

open access: yesCell Syst, 2021
Kim M   +20 more
europepmc   +1 more source

Privacy-Preserving Secret Shared Computations using MapReduce

open access: yes, 2019
Data outsourcing allows data owners to keep their data at \emph{untrusted} clouds that do not ensure the privacy of data and/or computations. One useful framework for fault-tolerant data processing in a distributed fashion is MapReduce, which was ...
Dolev, Shlomi   +4 more
core   +1 more source

AI-driven anonymization for secure and privacy-preserving business intelligence cloud migration

open access: yesDiscover Computing
Sensitive data protection is a key issue in the context of Business Intelligence (BI), especially considering the increasing emergence of outsourcing computing over cloud.
Najia Khouibiri   +2 more
doaj   +1 more source

Secure Outsourcing of Large-scale Linear Programming

open access: yes, 2018
Linear programming (LP) is often used in reality production and life, such as the use of resources, human resource management, production arrangement.
Zhikun Wang, Yang Liu
semanticscholar   +1 more source

The business of security and the transformation of the state [PDF]

open access: yes
The field of security policy seems to have undergone dramatic changes in the last decades. Under the broad umbrella of a turn to security governance, one can observe trends of an internationalization and privatization of security.
Deitelhoff, Nicole
core  

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective

open access: yes, 2018
Rapid advances in human genomics are enabling researchers to gain a better understanding of the role of the genome in our health and well-being, stimulating hope for more effective and cost efficient healthcare.
De Cristofaro, Emiliano   +2 more
core  

Selective Homomorphic Encryption With LLE Enhances Privacy and Scalability in Doorbell Face Recognition

open access: yesIEEE Access
The rapid adoption of smart-home and Internet-of-Things (IoT) devices has intensified the need for privacy-preserving biometric authentication that is both secure and computationally efficient.
Raniyah Wazirali   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy