Filters








15,345 Hits in 4.2 sec

No free lunch in data privacy

Daniel Kifer, Ashwin Machanavajjhala
2011 Proceedings of the 2011 international conference on Management of data - SIGMOD '11  
First, we use a no-free-lunch theorem, which defines nonprivacy as a game, to argue that it is not possible to provide privacy and utility without making assumptions about how the data are generated.  ...  In this paper we critically analyze the privacy protections offered by differential privacy.  ...  No-Free-Lunch and Differential Privacy We now explain how the no-free-lunch theorem relates to differential privacy and evidence of participation and how an assumption that P generates records independently  ... 
doi:10.1145/1989323.1989345 dblp:conf/sigmod/KiferM11 fatcat:fmaigs6zqbam5erf3dq2osntqe

Page 700 of Journal of Child and Family Studies Vol. 15, Issue 6 [page]

2006 Journal of Child and Family Studies  
Creating binary responses for violence (no violence/violence) and life satisfaction (satisfied, midrange and unsatisfied) and SES (free lunch/no free lunch and I don’t know) variables enabled computation  ...  Trained data collectors adminis- tered the survey insuring anonymity, privacy, and confidentially.  ... 

No Free Lunch Theorem for Security and Utility in Federated Learning [article]

Xiaojin Zhang, Hanlin Gu, Lixin Fan, Kai Chen, Qiang Yang
2022 arXiv   pre-print
It was shown that in general there is no free lunch for the privacy-utility trade-off and one had to trade the protection of privacy with a certain degree of degraded utility.  ...  data.  ...  Theorem A.5 (No free lunch theorem (NFL) for security and utility).  ... 
arXiv:2203.05816v2 fatcat:qvvjvcw4xbddhabw4r7vyml2sy

A privacy framework

Jinfei Liu, Li Xiong, Jun Luo
2013 Proceedings of the Joint EDBT/ICDT 2013 Workshops on - EDBT '13  
We introduce three variants of the representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and  ...  Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation.  ...  Definition 3 . 3 (ϵ-free-lunch privacy).  ... 
doi:10.1145/2457317.2457340 dblp:conf/edbt/LiuXL13 fatcat:ah33u74vz5f2xa7nwk2f7rwvsq

Competition for the Effectiveness of Big Data Benefits

Vicente Bagnoli
2015 IIC - International Review of Intellectual Property and Competition Law  
But there is, in fact, no ''free lunch'', and the individual pays a huge price for these services -and often loses in this trade-off.  ...  From the citizen's perspective, as consumers, data is to be protected in order to ensure its privacy.  ... 
doi:10.1007/s40319-015-0382-4 fatcat:vy6ac36sz5clbbus5t53446yxy

Lifestyle Changes and Body Mass Index during COVID-19 Pandemic Lockdown: An Italian Online-Survey

Silvia Maffoni, Silvia Brazzo, Rachele De Giuseppe, Ginevra Biino, Ilaria Vietti, Cristina Pallavicini, Hellas Cena
2021 Nutrients  
According to changes in lifestyle/eating behaviours, the sample was divided into three classes of changes: "negative change", "no change", "positive change".  ...  A multiple-choice web-form survey was used to collect retrospective data regarding lifestyle/eating behaviours during "Phase 1" in the Italian adult population.  ...  All participants were fully informed about the study objectives and requirements and were asked to provide informed consent accepting the data sharing and privacy policy, before accessing the survey.  ... 
doi:10.3390/nu13041117 pmid:33805291 fatcat:qktp24rmd5htpjeqexzdiwdrka

Big Data in Medical Research

2016 ARC Journal of Cardiology  
This is the age of big data we are living in. Everything we are doing these are recorded somewhere and eventually that became a data for most of the organizations in today's world.  ...  The big question to ask what is "Big data"? There are countless digital sensors in every device, equipment in anything.  ...  But there is no free lunch in this world. Appropriate analysis of such data can be very challenging. However, one of the biggest challenges is still lies in with the technology.  ... 
doi:10.20431/2455-5991.0201001 fatcat:dhvnysesgnayvc5pojprnghzpm

Work rhythms

James "Bo" Begole, John C. Tang, Randall B. Smith, Nicole Yankelovich
2002 Proceedings of the 2002 ACM conference on Computer supported cooperative work - CSCW '02  
We present a number of visualizations of the data that exhibit meaningful patterns in users' activities.  ...  In light of the popularity of instant messaging, this research identifies some of the benefits and privacy risks associated with the uses of online presence and awareness information.  ...  We also thank Brian Raymor for helping us confront the privacy issues raised by this work.  ... 
doi:10.1145/587123.587125 fatcat:dm5ombpawjcsjamzszwl4qiudm

Work rhythms

James "Bo" Begole, John C. Tang, Randall B. Smith, Nicole Yankelovich
2002 Proceedings of the 2002 ACM conference on Computer supported cooperative work - CSCW '02  
We present a number of visualizations of the data that exhibit meaningful patterns in users' activities.  ...  In light of the popularity of instant messaging, this research identifies some of the benefits and privacy risks associated with the uses of online presence and awareness information.  ...  We also thank Brian Raymor for helping us confront the privacy issues raised by this work.  ... 
doi:10.1145/587078.587125 dblp:conf/cscw/BegoleTSY02 fatcat:qzvytmxusrgtnmhmoumaorld54

PAD

Ruoxi Jia, Fisayo Caleb Sangogboye, Tianzhen Hong, Costas Spanos, Mikkel Baun Kjærgaard
2017 Proceedings of the 4th ACM International Conference on Systems for Energy-Efficient Built Environments - BuildSys '17  
privacy breaches from occurring in the rst place.  ...  Data in the original form, however, contains sensitive information about occupants' behavioral pa erns, and publishing such data will violate individuals' privacy. e current practice on publishing building-related  ...  Building E ciency and Sustainability in the Tropics (Sin-BerBEST) Program.  ... 
doi:10.1145/3137133.3137140 dblp:conf/sensys/JiaSHSK17 fatcat:euxb4wuxq5hhtlv6wz74qhbfju

Page 419 of Pharmacotherapy Vol. 28, Issue 3 [page]

2008 Pharmacotherapy  
No more free lunches [editorial]. BMJ 2003;326:1155-6. . Brett AS, Burr W, Moloo J. Are gifts from pharmaceutical companies ethically problematic? A survey of physicians.  ...  The hidden costs of free lunches: fraud and abuse in physician-pharmaceutical arrangements. J Med Pract Manage 2005;20:253-8 . Marco CA, Moskop JC, Solomon RC, Geiderman JM, Larkin GL.  ... 

Capturing experiences anytime, anywhere

D. Ashbrook, K. Lyons, J. Clawson
2006 IEEE pervasive computing  
The blog mentions your lunch stop but has no pictures, and you'd like to show your dessert to your friends.  ...  The ability to capture experiences automatically using a hands-free system would let users enjoy the event, no longer worrying about recording it for posterity. Suddenly, the user could have fun too.  ... 
doi:10.1109/mprv.2006.26 fatcat:uxianpqrd5b23ns4zpt34yczra

Generating power footprints without appliance interaction: An enabler for privacy intrusion

A. Sintoni, A. Schoofs, A. Doherty, A. F. Smeaton, G. M. P. O'Hare, A. G. Ruzzelli
2011 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)  
Fig. 9 . 9 Data retrieved in the kitchen area during working hours exhibiting the random use of the kettle and the use of the microwave at lunch time.  ...  Fig. 7 . 7 Data retrieved in CLARITY's kitchen area over a period of one hour. Fig. 8 . 8 Power footprints generated by RECAP-free from the kitchen area data capture.  ... 
doi:10.1109/dcoss.2011.5982180 dblp:conf/dcoss/SintoniSDSOR11 fatcat:tc5qa4z3pnh2fa3oleptkii32e

Taking a Lesson from Quantum Particles for Statistical Data Privacy [article]

Farhad Farokhi
2019 arXiv   pre-print
Privacy is under threat from artificial intelligence revolution fueled by unprecedented abundance of data.  ...  An alternative is information-theoretic privacy using entropy with the drawback of requiring prior distribution of the private data.  ...  Conclusions In this paper, we used the Fisher information as a measure of privacy to avoid unnecessary assumptions on the private data.  ... 
arXiv:1908.04954v1 fatcat:grdmmsmbdzcbhftkqyi4ivqlwu

Employee Surveillance: The Road to Surveillance is Paved with Good Intentions

Lilian Edwards, Laura Martin, Tristan Henderson
2018 Social Science Research Network  
He works on the intersection of fundamental rights protection (data privacy, freedom of expression, non-discrimination) and the governance of platforms and internet-based services.  ...  His research interests are in the field of archival sciences.Ine van Zeeland is a researcher at Studies in Media, Innovation and Technology, Free Univerity of Brussels.  ...  Pettit: To be free is not to live under the discretionary power of others. Privacy is an essential safeguard against discretionary power.  ... 
doi:10.2139/ssrn.3234382 fatcat:xpnn2pn44nbhng6irq22bmnti4
« Previous Showing results 1 — 15 out of 15,345 results