Filters








35,930 Hits in 6.0 sec

Experimental Analysis of Privacy-Preserving Statistics Computation [chapter]

Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang
2004 Lecture Notes in Computer Science  
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy of individuals when  ...  Building on the study of selective private function evaluation and the efforts towards practical algorithms for privacy-preserving data mining solutions, we analyze and implement solutions to an important  ...  on Science and Technology, and the NJ Center for Wireless Networking and Internet Security.  ... 
doi:10.1007/978-3-540-30073-1_5 fatcat:dzr3fwixsnasri7ygamhwlxsli

PRIVATE-IYE: A Framework for Privacy Preserving Data Integration

S.S. Bhowmick, L. Gruenwald, M. Iwaihara, S. Chatvichienchai
2006 22nd International Conference on Data Engineering Workshops (ICDEW'06)  
Data integration has been a long standing challenge to the database and data mining communities.  ...  This need has become critical in numerous contexts, including building e-commerce market places, sharing data from scientific research, and improving homeland security. However,  ...  Acknowledgement: This material is based upon work supported by (while serving at) the National Science Foundation (NSF).  ... 
doi:10.1109/icdew.2006.117 dblp:conf/icde/BhowmickGIC06 fatcat:vjssm4cotnfzvotc3oni3pzgue

Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment

Wenwen Gong, Lianyong Qi, Yanwei Xu
2018 Wireless Communications and Mobile Computing  
In general, the service usage data used to make service recommendation are produced by various mobile devices and collected by distributed edge platforms, which leads to potential leakage of user privacy  ...  In view of this drawback, we improve the traditional LSH and put forward a novel LSH-based service recommendation approach named SerRecmulti-qos, to protect users' privacy over multiple quality dimensions  ...  Acknowledgments This paper is partially supported by Open Project of State Key Laboratory for Novel Software Technology (no. KFKT2016B22).  ... 
doi:10.1155/2018/3075849 fatcat:acps67usojdapdauu3gf7aiegq

Privacy-Preserving Restricted Boltzmann Machine

Yu Li, Yuan Zhang, Yue Ji
2014 Computational and Mathematical Methods in Medicine  
The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms.  ...  In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM).  ...  Therefore, we propose a privacy-preserving machine learning method to ensure that individuals' privacy is protected.  ... 
doi:10.1155/2014/138498 pmid:25101139 pmcid:PMC4094866 fatcat:poezzmqlnjbdzmak4zphn4ncry

Privacy-preserving Generative Framework Against Membership Inference Attacks [article]

Ruikang Yang, Jianfeng Ma, Yinbin Miao, Xindi Ma
2022 arXiv   pre-print
In this paper, we design a privacy-preserving generative framework against membership inference attacks, through the information extraction and data generation capabilities of the generative model variational  ...  Artificial intelligence and machine learning have been integrated into all aspects of our lives and the privacy of personal data has attracted more and more attention.  ...  Privacy Preserving Generative Framework This section details the implementation of our privacy preserving generative framework (PPGF) to enforce both privacy and validity.  ... 
arXiv:2202.05469v1 fatcat:yfq43fxf25d5fhknx4flqlbe6a

Data obfuscation: anonymity and desensitization of usable data sets

D.E. Bakken, R. Rarameswaran, D.M. Blough, A.A. Franz, T.J. Palmer
2004 IEEE Security and Privacy  
Acknowledgments The US Air Force Research Laboratory's Software Protection Initiative funds this research through contract F33615-02-C-1292.  ...  We thank Deb Frincke for suggesting intrusion data sharing as a data obfuscation application and Marty Stytz for suggesting simulation data sharing and for making numerous other suggestions on our research  ...  Data obfuscation addresses this dilemma by extending several existing technologies and defining obfuscation properties that quantify the technologies' usefulness and privacy preservation.  ... 
doi:10.1109/msp.2004.97 fatcat:xzrnogshvvf3lcqc4x6v47uzzy

MyHealthMyData (MHMD): Deliverable 4.5 - Data Management Plan

Omiros Metaxas
2017 Zenodo  
This deliverable provides the MHMD data management plan version 1, outlining what kind of clinical and personal data will be collected or generated and how it will be handled, processed and shared.  ...  This deliverable is based on the template and the guidelines provided by the European Commission and it will be updated during the project (live document).  ...  Data security, however, is not defined by the legal authority. • Pseudonymised (partially de-identified) data: they constitute the basic privacy-preserving level allowing for some data sharing, and represent  ... 
doi:10.5281/zenodo.1042561 fatcat:dx34mob64zfo3ncwcpnpkdz57q

State-of-the-art in Privacy Preserved K-anonymity Revisited

Yousra Abdul Alsahib S. Aldeen, Mazleena Salleh
2016 Research Journal of Applied Sciences Engineering and Technology  
This study presents the basic notions and deep-insight of the existing privacy preserved K-anonymity model and its possible enhancement.  ...  Furthermore, the present challenges, excitements and future progression of privacy preservation in K-anonymity are emphasized.  ...  ACKNOWLEDGMENT This research is supported by University Technology Malaysia, Johor, Malaysia /UTM library and Baghdad University.  ... 
doi:10.19026/rjaset.12.2753 fatcat:okglfolrtzcg7gk6zont3qeaau

Privacy-Preserving One-Class Support Vector Machine with Vertically Partitioned Data

Qiang Lin, Huimin Pei, Kuaini Wang, Ping Zhong
2016 International Journal of Multimedia and Ubiquitous Engineering  
By sharing these partial kernel matrices, we construct a global kernel matrix and establish linear and nonlinear privacy-preserving models.  ...  We establish a new model of privacy-preserving one-class support vector machine (SVM) based on vertically partitioned data. Every participant holds all the data with a part of attributes.  ...  Acknowledgments The work is supported by National Natural Science Foundation of China Grant No.11171346.  ... 
doi:10.14257/ijmue.2016.11.5.18 fatcat:h6jr3ty5i5ezzblmxra33rqgnu

Privacy-Preserving Reasoning on the SemanticWeb

Jie Bao, Giora Slutzki, Vasant Honavar
2007 IEEE/WIC/ACM International Conference on Web Intelligence (WI'07)  
Many semantic web applications require selective sharing of ontologies between autonomous entities due to copyright, privacy or security concerns.  ...  We provide a framework for privacypreserving reasoning in which an agent can safely answer queries against its knowledge base using inferences based on both the hidden and visible part of the knowledge  ...  Acknowledgement: This research was supported in part by the US NSF award 0639230  ... 
doi:10.1109/wi.2007.4427191 fatcat:zife24fhazbg7lmtiha3y7w2h4

Privacy-Preserving Reasoning on the SemanticWeb

Jie Bao, Giora Slutzki, Vasant Honavar
2007 IEEE/WIC/ACM International Conference on Web Intelligence (WI'07)  
Many semantic web applications require selective sharing of ontologies between autonomous entities due to copyright, privacy or security concerns.  ...  We provide a framework for privacypreserving reasoning in which an agent can safely answer queries against its knowledge base using inferences based on both the hidden and visible part of the knowledge  ...  Acknowledgement: This research was supported in part by the US NSF award 0639230  ... 
doi:10.1109/wi.2007.83 dblp:conf/webi/BaoSH07 fatcat:cwuxviilkffm5duyky4g5bkyrq

Voice-Indistinguishability: Protecting Voiceprint in Privacy-Preserving Speech Data Release [article]

Yaowei Han, Sheng Li, Yang Cao, Qiang Ma, Masatoshi Yoshikawa
2020 arXiv   pre-print
In this study, we design a novel and rigorous privacy metric for voiceprint privacy, which is referred to as voice-indistinguishability, by extending differential privacy.  ...  Current studies on voiceprint privacy protection do not provide either a meaningful privacy-utility trade-off or a formal and rigorous definition of privacy.  ...  Privacy-preserving speech data release (the red and blue indicate the sensitive and protected data, respectively).  ... 
arXiv:2004.07442v1 fatcat:cwrgu7w4hvgxjj66dac7olweta

Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles

Shahzad Saleem, Oliver Popov, Ibrahim Bagilli
2014 Procedia Computer Science  
The results indicated that published abstract models lack preserving the integrity of digital evidence and protecting the basic human rights as explicit overarching umbrella principles.  ...  In this research, a literature review was conducted where twenty (n=20) frameworks and models highlighting preservation of the integrity of digital evidence and protection of basic human rights during  ...  The results indicated that the models lack preserving the integrity of DE and protecting the basic human rights as explicit overarching umbrella principles.  ... 
doi:10.1016/j.procs.2014.08.246 fatcat:fbwttpx4grg43a6iu3j657ob5e

A comprehensive review on privacy preserving data mining

Yousra Abdul Alsahib S. Aldeen, Mazleena Salleh, Mohammad Abdur Razzaque
2015 SpringerPlus  
Further significant enhancements for more robust privacy protection and preservation are affirmed to be mandatory.  ...  Amongst several existing algorithm, the Privacy Preserving Data Mining (PPDM) renders excellent results related to inner perception of privacy preservation and data mining.  ...  matrix Enhanced privacy protection and the accuracy Privacy and accuracy Vaidya et al. 2008) Data mining algorithms developed an approach for vertically partitioned mining dataModified and extended to  ... 
doi:10.1186/s40064-015-1481-x pmid:26587362 pmcid:PMC4643068 fatcat:twwirrmehva4pfkieiufldrxve

Privacy Preserving Data Mining for Ordinal Data using Correlation Based Transformation Strategy (CBTS)

N. P. Nethravathi, Prasanth G. Rao, Chaitra C. Vaidya, S. Geethanjali, P. Madhura, K. Neha Nandan, P. Deepa Shenoy, M. Indiramma, K. R. Venugopal
2016 Indian Journal of Science and Technology  
is required to provide privacy to the data and simultaneously protecting the quality of data mining algorithms.  ...  Objectives: Preservation of privacy is a significant aspect of data mining.  ...  This method strives at preserving the privacy of data which are partially lost.  ... 
doi:10.17485/ijst/2016/v9i47/107360 fatcat:abvvcyawkzhnvfe3qzv4f4ttua
« Previous Showing results 1 — 15 out of 35,930 results