17,245 Hits in 4.4 sec

Complete characterization of a class of privacy-preserving tracking problems [article]

Yulin Zhang, Dylan A. Shell
2018 arXiv   pre-print
We examine the problem of target tracking whilst simultaneously preserving the target's privacy as epitomized by the robotic panda tracking scenario, which O'Kane introduced at the 2008 Workshop on the  ...  We analyze the entire space of possible tracking problems, characterizing every instance as either achievable, constructively by giving a policy where one exists (some of which depend on the initial information  ...  The pirate image in Figure 1 is adapted from the work of J.J. and Gustavb under a Creative Commons license.  ... 
arXiv:1806.00114v1 fatcat:lttjovgq3zgkrllocvwzglhzim

On the Anonymity of Periodic Location Samples [chapter]

Marco Gruteser, Baik Hoh
2005 Lecture Notes in Computer Science  
We then propose to use such tracking algorithms to characterize the level of privacy and to derive disclosure control algorithms.  ...  Unfortunately, anonymous location samples do not fully solve the privacy problem.  ...  The remainder of this paper is structured as follows. Section 2 defines the class of applications and the privacy problem that this paper addresses.  ... 
doi:10.1007/978-3-540-32004-3_19 fatcat:lxg3qoleurdhpd5wsd75dscaoe

A Privacy Agent in Context-Aware Ubiquitous Computing Environments [chapter]

Ni Zhang, Chris Todd
2006 Lecture Notes in Computer Science  
The development of privacy agent is an integrated part of our ongoing effort towards developing a privacy-respecting context-aware infrastructure.  ...  It proposes a privacy agent technology to help notify people of relevant information disclosure, and to empower them to manage privacy with relative ease.  ...  Section 2 presents a use scenario showing how people could use the envisioned privacy agent to preserve their privacy.  ... 
doi:10.1007/11909033_18 fatcat:pikim2iopfbgzh67qqlurj737q

Constructing Distributed Hippocratic Video Databases for Privacy-Preserving Online Patient Training and Counseling

Jinye Peng, Noboru Babaguchi, Hangzai Luo, Yuli Gao, Jianping Fan
2010 IEEE Transactions on Information Technology in Biomedicine  
First, a new database modeling approach is developed to support concept-oriented video database organization and assign a degree of privacy of the video content for each database level automatically.  ...  In order to integrate the patient training videos from multiple competitive organizations for constructing a centralized video database indexing structure, a privacy-preserving video sharing scheme is  ...  Thus there is an urgent need to support privacy-preserving sharing of the support vectors for learning the complete SVM classifier collaboratively.  ... 
doi:10.1109/titb.2009.2029695 pmid:19726265 pmcid:PMC7176470 fatcat:f36mnjxwjvbkdoafvoyrjorsve

Foreword to special issue for ISAIM 2018

Dimitrios I. Diochnos, Jürgen Dix, Guillermo R. Simari
2020 Annals of Mathematics and Artificial Intelligence  
tracks of the symposium.  ...  This special issue of the journal of Annals of Mathematics and Artificial Intelligence is devoted to ISAIM 2018 and selected papers that appeared either in the main track, or in one of the specialized  ...  constrained reasoning setting in favor of preserving privacy. This protection is obtained by adopting a utilitarian definition of privacy in the context of distributed constrained reasoning.  ... 
doi:10.1007/s10472-020-09699-y fatcat:n6sqoz3tbngqxooe6mc5ofr3mu

Dynamic Average Consensus under Limited Control Authority and Privacy Requirements [article]

Solmaz S. Kia, Jorge Cortes, Sonia Martinez
2014 arXiv   pre-print
We show that our algorithm naturally preserves the privacy of the local input of each agent.  ...  This steady-state error vanishes for special classes of input signals.  ...  Dynamic average consensus with privacy preservation Here, we study the dynamic average consensus problem with privacy preservation.  ... 
arXiv:1401.6463v1 fatcat:d65eev2szvhrjo36ceou3r2jqi

Ensuring Privacy in Location-Based Services: A Model-based Approach [article]

Alireza Partovi, Wei Zheng, Taeho Jung, Hai Lin
2020 arXiv   pre-print
The overall privacy-preserving framework, including the construction of the user mobility model as a MDP, and design of the proposed LPPM, are demonstrated and validated with real-world experimental data  ...  The disclosure of user's location, however, can raise serious concerns about user privacy in general, and location privacy in particular which led to the development of various location privacy-preserving  ...  OPTIMAL PRIVACY-PRESERVING POLICY SYN-THESIS In this section, we study the design of privacy-preserving optimal policy for Problem 1.  ... 
arXiv:2002.10055v1 fatcat:2bdqhkju75a47nhagkrb5n6sni

Information Security in Big Data: Privacy and Data Mining

Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan, Yong Ren
2014 IEEE Access  
Besides exploring the privacy-preserving approaches for each type of user, we also review the game theoretical approaches, which are proposed for analyzing the interactions among different users in a data  ...  In this paper, we view the privacy issues related to data mining from a wider perspective and investigate various approaches that can help to protect sensitive information.  ...  [105] formalize the SMC problem as a static game with complete information.  ... 
doi:10.1109/access.2014.2362522 fatcat:oxnmv2kjy5bllhotbkqvxd5rfu

Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning [article]

Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Balachander Krishnamurthy, Anirban Mahanti
2016 arXiv   pre-print
As a consequence, many privacy preserving tools (PP-Tools) that have been developed to limit online tracking, often executed via JS, may suffer from poor performance and limited uptake.  ...  A mechanism that can isolate JS necessary for proper functioning of the website from tracking JS would thus be useful.  ...  to do in a privacy-preserving manner.  ... 
arXiv:1603.06289v1 fatcat:mfecoy55y5hedddzgtuw7bwwqi

Preserving privacy in gps traces via uncertainty-aware path cloaking

Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintaining high data accuracy.  ...  We find through analysis of a set of GPS traces from 233 vehicles that known privacy algorithms cannot meet accuracy requirements or fail to provide privacy guarantees for drivers in low-density areas.  ...  The complete analysis remains an open problem for future work.  ... 
doi:10.1145/1315245.1315266 dblp:conf/ccs/HohGXA07 fatcat:gf2flall4fgt3ms3t4kgsa6kzi

Privacy for targeted advertising

Avradip Mandal, John Mitchell, Hart Montgomery, Arnab Roy
2017 2017 IEEE Conference on Communications and Network Security (CNS)  
In fact we offer real world evidence that adherence to our notion of privacy almost completely destroys utility.  ...  However, although we can construct artificial databases which satisfy our notion of privacy together with reasonable utility, we do not have evidence that real world databases can be sanitized to preserve  ...  , hard problem instances, or problem instances somewhere in between in terms of difficulty), it will be hard to tell whether or not a database is privacy preserving.  ... 
doi:10.1109/cns.2017.8228673 dblp:conf/cns/MandalMM017 fatcat:4hdlnddh5jgfjlda5axz2od7sm

From Self-data to Self-preferences: Towards Preference Elicitation in Personal Information Management Systems [chapter]

Tristan Allard, Tassadit Bouadi, Joris Duguépéroux, Virginie Sans
2017 Lecture Notes in Computer Science  
Overall, we hope that this paper uncovers an exciting and fruitful research track.  ...  In this vision paper, we consider personal preferences as first-class citizens data structures.  ...  ), automatic completion of online profiles (e.g., privacy preferences on a social network) 1 .  ... 
doi:10.1007/978-3-319-71970-2_2 fatcat:ox32luiwnbhyxncddd42wrgp6m

Formal Methods for Privacy [chapter]

Michael Carl Tschantz, Jeannette M. Wing
2009 Lecture Notes in Computer Science  
help preserve privacy.  ...  Against a vast and rich canvas of diverse types of privacy rights and violations, we argue technology's dual role in privacy: new technologies raise new threats to privacy rights and new technologies can  ...  Acknowledgments Our understanding of privacy has benefited from conversations with Anupam Datta, Dilsun Kaynar, and Jennifer Tam.  ... 
doi:10.1007/978-3-642-05089-3_1 fatcat:pmy4y3ahtfanvldg7azrkzqtca

Enhancing location privacy in wireless LAN through disposable interface identifiers

Marco Gruteser, Dirk Grunwald
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client's interface identifier.  ...  An analysis of a public WLAN usage trace shows that disposing addresses before reassociation already yields significant privacy improvements.  ...  The complete solution remains an open problem. Related work Location privacy risks have been discussed in a variety of technologies.  ... 
doi:10.1145/941332.941334 fatcat:jjh3buxwerhjpioiowarokh3ta

Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis

Marco Gruteser, Dirk Grunwald
2005 Journal on spesial topics in mobile networks and applications  
In addition, interface identifiers uniquely identify each client, allowing tracking of location over time. We enhance location privacy through frequent disposal of a client's interface identifier.  ...  An analysis of a public WLAN usage trace shows that disposing addresses before reassociation already yields significant privacy improvements.  ...  The complete solution remains an open problem. Related work Location privacy risks have been discussed in a variety of technologies.  ... 
doi:10.1007/s11036-005-6425-1 fatcat:vw7i6j7qfrd2nl3hqne6ypet4a
« Previous Showing results 1 — 15 out of 17,245 results