We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 10,000 results
  1. Explainable machine learning models with privacy

    The importance of explainable machine learning models is increasing because users want to understand the reasons behind decisions in data-driven...

    Aso Bozorgpanah, Vicenç Torra in Progress in Artificial Intelligence
    Article Open access 28 March 2024
  2. User Personalized Location k Anonymity Privacy Protection Scheme with Controllable Service Quality

    The existing location privacy protection methods only provide the privacy protection parameter k for users to choose to achieve their personalized...
    Ting Liu, Guanghui Yan, ... Mingjie Yang in Machine Learning for Cyber Security
    Conference paper 2020
  3. THC-DFECC-based privacy preserved smart contract creation for cloud data security

    Currently, cloud services have become a novel business model for information services owing to the rapid development of Cloud Computing (CC)...

    Chandra Sekhar Tiwari, Vijay Kumar Jha in International Journal of Information Technology
    Article 27 June 2024
  4. Dimension-aware under spatiotemporal constraints: an efficient privacy-preserving framework with peak density clustering

    Location-based service (LBS) is one of the most popular applications in 5G environment. Users can enjoy plenty of intelligent services, but serious...

    **g Zhang, Qihan Huang, ... **u-Cai Ye in The Journal of Supercomputing
    Article 22 September 2022
  5. On the Vulnerability and Generality of K–Anonymity Location Privacy Under Continuous LBS Requests

    With the development of personal communication devices, location-based services have been widely used. However, the risk of location information...
    Hanbo Dai, Hui Li, ... Yingxue Wang in Web and Big Data
    Conference paper 2020
  6. DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services

    Since smartphones embedded with positioning systems and digital maps are widely used, location-based services (LBSs) are rapidly growing in...

    Long Li, Jianbo Huang, ... **g**g Li in Frontiers of Computer Science
    Article 15 February 2023
  7. An efficient federated learning based intrusion detection system using LS2DNN with PBKA based lightweight privacy preservation in cloud server

    To execute seamless computing along with information sharing, Cloud Computing (CC) plays an important role in measurable resource sharing. But, owing...

    Ruchi Gupta, Tanweer Alam in Multimedia Tools and Applications
    Article 19 October 2023
  8. Efficient approximation and privacy preservation algorithms for real time online evolving data streams

    Because of the processing of continuous unstructured large streams of data, mining real-time streaming data is a more challenging research issue than...

    Rahul A. Patil, Pramod D. Patil in World Wide Web
    Article 20 January 2024
  9. HAkAu: hybrid algorithm for effective k-automorphism anonymization of social networks

    Online social network datasets contain a large amount of various information about their users. Preserving users’ privacy while publishing or sharing...

    Jana Medková, Josef Hynek in Social Network Analysis and Mining
    Article Open access 04 April 2023
  10. Anonymous location sharing in urban area mobility

    This work studies the location-privacy preserving location update in the context of data-centric people mobility applications. The mobility model...

    Osman Abul, Ozan Berk Bitirgen in Knowledge and Information Systems
    Article 15 May 2021
  11. Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining

    The confidential data is mainly managed by creating passwords, tokens, and unique identifiers in an authorized manner. These records must be kept in...

    D. Dhinakaran, P. M. Joe Prathap in The Journal of Supercomputing
    Article 20 May 2022
  12. Mirrored Commitment: Fixing “Randomized Partial Checking” and Applications

    Randomized Partial Checking (RPC) [16] was proposed by Jakobsson, Juels, and Rivest and attracted attention as an efficient method of verifying the...
    Paweł Lorek, Moti Yung, Filip Zagórski in Applied Cryptography and Network Security
    Conference paper 2024
  13. Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation

    By breaking sensitive associations between attributes, database fragmentation can protect the privacy of outsourced data storage. Database...

    Yong-Feng Ge, **li Cao, ... Yanchun Zhang in Data Science and Engineering
    Article Open access 21 August 2021
  14. Improving Time Complexity and Utility of k-anonymous Microaggregation

    For research in medicine, economics and social sciences specific data of individuals is needed. Thus it should be publicly available, but this should...
    Florian Thaeter, Rüdiger Reischuk in E-Business and Telecommunications
    Conference paper 2023
  15. Anonymous Public Key Encryption Under Corruptions

    Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertexts do not leak information about which public keys...
    Zhengan Huang, Junzuo Lai, ... Jian Weng in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  16. Towards Quantifying the Privacy of Redacted Text

    In this paper we propose use of a k-anonymity-like approach for evaluating the privacy of redacted text. Given a piece of redacted text we use a...
    Vaibhav Gusain, Douglas Leith in Advances in Information Retrieval
    Conference paper 2023
  17. Face De-identification: Safeguarding Identities in the Digital Era

    This book provides state-of-the-art Face De-Identification techniques and privacy protection methods, while highlighting the challenges faced in...

    Yunqian Wen, Bo Liu, ... Rong **e
    Book 2024
  18. Variants of Euclidean k-Center Clusterings

    Fix two constant integers k and r. Given a set P of n points on a plane, the Euclidean k-center r-gather clustering problem is the problem to compute...
    Shin-ichi Nakano in Computing and Combinatorics
    Conference paper 2024
  19. Election in Fully Anonymous Shared Memory Systems: Tight Space Bounds and Algorithms

    This article addresses election in fully anonymous systems made up of n asynchronous processes that communicate through atomic read-write registers...
    Damien Imbs, Michel Raynal, Gadi Taubenfeld in Structural Information and Communication Complexity
    Conference paper 2022
  20. Algorithmic Protection Study Based on a Virtual Location

    With the development of big data technology and wireless communication technology, Internet-of-Vehicles (IOV) has been widely used. In order to...
    Zehui Wen, Yiqun Zhu in 6GN for Future Wireless Networks
    Conference paper 2024
Did you find what you were looking for? Share feedback.