Filters








40,490 Hits in 3.5 sec

Guest editorial: web applications and techniques

Wei Wang, Wenjie Zhang
2015 World wide web (Bussum)  
., "Detecting Anomaly in Data Streams by Fractal Model", addresses the limitations of existing work in detecting anomaly in data streams.  ...  Strong correlations are identified between user locations and event locations to detect emerging events.  ...  Finally, the paper "Privacy Preserving Graph Publication in a Distributed Environment", by Yuan et al., focuses on privacy preserving data publishing in social networks, where each publisher only holds  ... 
doi:10.1007/s11280-015-0345-1 fatcat:nrkg3g5ainaajg7cnaromzbzpa

Disclosure detection over data streams in database publishing

Deming Dou, Stéphane Coulondre
2011 Proceedings of the 2011 Joint EDBT/ICDT Ph.D. Workshop on - PhD '11  
In this paper, we focus on disclosure detection related to database publishing, and present a novel approach of detecting privacy leakages over data streams on querying databases by using dynamic pattern  ...  Recently, a number of privacy-preserving techniques have been proposed, however, they are either precontrols or post-controls and limited in protection of privacy without information loss or distortion  ...  This undertaking is called Privacy-preserving data publishing (PPDP).  ... 
doi:10.1145/1966874.1966876 dblp:conf/edbt/DouC11 fatcat:elnddda6gndwdbznm6o6szajxy

A real-time aggregate data publishing scheme with adaptive ω-event differential privacy

Chengtao Yong, Yan Huo, Chunqiang Hu, Yanfei Lu, Guanlin Jing
2018 Mathematical Foundations of Computing  
-differential privacy is a notable model to provide strong privacy preserving in statistics.  ...  In view of this issue, we explore a real-time scheme with adaptive ω-event for differentially private time-series publishing (ADP) in this paper.  ...  ., trajectories of vehicles and personal health data) of each region are published continually.  ... 
doi:10.3934/mfc.2018014 fatcat:iav7dxsg6jfmpjl6u4l6onse2y

Privacy Preserving Data Mining for Pharmacovigilance

2019 International Journal of Engineering and Advanced Technology  
Preserving data owners privacy is done by using visual cryptography technique.  ...  In this paper, visual cryptography concept is used for preserving the privacy of sensitive data used for pharmacovigilance.  ...  The future work also focus on analyzing the adverse events due to multiple drugs Privacy Preserving Data Mining forPharmacovigilance Kamatchi Sankar, Latha Parthiban Privacy Preserving Data Mining for  ... 
doi:10.35940/ijeat.a1015.1091s19 fatcat:chmkz6n3y5h4jm3kexo53wqbgm

Detecting Privacy Violations in Multiple Views Publishing [chapter]

Deming Dou, Stéphane Coulondre
2012 Lecture Notes in Computer Science  
We present a sound data-value-dependent method of detecting privacy violations in the context of multiple views publishing.  ...  We assume that privacy violation takes the form of linkages, that is, identifier-privacy value pair appearing in the same data record.  ...  We refer readers to [3] for a survey of different privacy preserving approaches with respect to privacy-preserving data publishing.  ... 
doi:10.1007/978-3-642-32597-7_46 fatcat:rc54ffi4ojbcxhj6skq6rfhap4

Realizing IoT service's policy privacy over publish/subscribe-based middleware

Li Duan, Yang Zhang, Shiping Chen, Shiyao Wang, Bo Cheng, Junliang Chen
2016 SpringerPlus  
However, preserving IoT service's policy privacy is difficult in this paradigm, because a classical publisher has little control of its own event after being published; and a subscriber has to accept all  ...  for preserving the privacy of service policy.  ...  For example, a sensor continuously measures the temperature of water and publishes the temperature data event every second. Different temperature data have only the difference in timestamp.  ... 
doi:10.1186/s40064-016-3250-x pmid:27652188 pmcid:PMC5028380 fatcat:c2kxykeyt5hxfmrfwygxoqxt6a

A Systematic Literature Review on Wearable Health Data Publishing under Differential Privacy [article]

Munshi Saifuzzaman, Tajkia Nuri Ananna, Mohammad Jabed Morshed Chowdhury, Md Sadek Ferdous, Farida Chowdhury
2021 arXiv   pre-print
Recently, Differential Privacy (DP) has emerged as a proficient technique to publish privacy sensitive data, including data from wearable devices.  ...  publishing.  ...  We have performed an SLR on wearable data publishing (which generates data in a continuous manner) under differential privacy in the period from 2007 to April 31, 2020.  ... 
arXiv:2109.07334v1 fatcat:njnoffcp7bbwrnwwclocrdkl4y

Security Problems in Iot Model and Privacy Preserving in Various Iot Devices

2019 International journal of recent technology and engineering  
privacy-preserving time-series data publishing  ...  Initially, data professionals need to have to process privacysensitive data to remove the counted on details without particular privacy enclosure.  ...  CHALLENGES AND ARCHITECTURE FOR PRIVACY-PRESERVING TIME-SERIES DATA PUBLISHING In the future, IoT permits everywhere data event and individual tracking, yet when these favourable components developed incorrectly  ... 
doi:10.35940/ijrte.d8382.118419 fatcat:refxxcaeyvbz3kfjb53f7i5gma

Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges

Ling Liu, Georgia Institute of Technology
2007 2007 IEEE International Conference on Granular Computing (GRC 2007)  
privacy preserving computational model for location-aware computing applications.  ...  Companies need enterprise-level privacy to preserve corporate secrets and maintain competitive edge.  ...  privacy preserving computational model for location-aware computing applications.  ... 
doi:10.1109/grc.2007.4403056 fatcat:cojehvmqpzh7tmrlxoczc5zbza

Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges

Ling Liu, Georgia Institute of Technology
2007 2007 IEEE International Conference on Granular Computing (GRC 2007)  
privacy preserving computational model for location-aware computing applications.  ...  Companies need enterprise-level privacy to preserve corporate secrets and maintain competitive edge.  ...  privacy preserving computational model for location-aware computing applications.  ... 
doi:10.1109/grc.2007.162 dblp:conf/grc/Liu07 fatcat:m5ivcwx64ff6dpqgya5wa673ii

D8.5 Community engagement and technology transfer activities

Antoine Garnier, Antonia Kuster, Domenic Franke
2021 Zenodo  
The title of our chapter is "Privacy Preserving Technologies for Trusted Data Spaces".  ...  preserving its privacy as presented in Figure 4 ).  ...  They would be invited to stay informed about activities of taskforces 6 "Data Protection" and taskforce 11 "Trustworthy AI", particularly relevant for anyone interested in MUSKETEER activities.  ... 
doi:10.5281/zenodo.5842172 fatcat:yaqco3lgkzcajjiwnm32vl6dgq

Privacy Preserving Data Anonymization of Spontaneous ADE Reporting System Dataset

Wen-Yang Lin, Duen-Chuan Yang, Jie-Teng Wang
2015 Proceedings of the ACM Ninth International Workshop on Data and Text Mining in Biomedical Informatics - DTMBIO '15  
Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing  ...  Methods: We propose a new privacy model called MS(k, θ * )-bounding for protecting published spontaneous ADE reporting data from privacy attacks.  ...  Availability of data and materials  ... 
doi:10.1145/2811163.2811176 dblp:conf/cikm/LinYW15 fatcat:5de463arrfgjpg4uu2acezbnwy

Privacy preserving data anonymization of spontaneous ADE reporting system dataset

Wen-Yang Lin, Duen-Chuan Yang, Jie-Teng Wang
2016 BMC Medical Informatics and Decision Making  
Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing  ...  Methods: We propose a new privacy model called MS(k, θ * )-bounding for protecting published spontaneous ADE reporting data from privacy attacks.  ...  Availability of data and materials  ... 
doi:10.1186/s12911-016-0293-4 pmid:27454754 pmcid:PMC4959360 fatcat:agfhmekrlbb7tikw5s7js6twty

Differentially Private Anomaly Detection with a Case Study on Epidemic Outbreak Detection

Liyue Fan, Li Xiong
2013 2013 IEEE 13th International Conference on Data Mining Workshops  
The data collected from individual users contain sensitive information, such as health records and network usage data, and thus need to be transformed prior to the release for privacy preservation.  ...  Real-time private user data can be aggregated and perturbed to guarantee privacy, while the posterior estimate is released continuously for anomaly detection tasks.  ...  The current state-of-the-art paradigm for privacypreserving data publishing is differential privacy [1] , which requires that the aggregate statistics reported by a data publisher be perturbed by a randomized  ... 
doi:10.1109/icdmw.2013.129 dblp:conf/icdm/FanX13 fatcat:vcwuadhgg5ekbmolgwseykwshm

Re-ADP: Real-Time Data Aggregation with Adaptive ω-Event Differential Privacy for Fog Computing

Yan Huo, Chengtao Yong, Yanfei Lu
2018 Wireless Communications and Mobile Computing  
Thus, various data encryption technologies have emerged to achieve privacy preserving.  ...  Considering these challenges, we propose a real-time stream data aggregation framework with adaptive ω-event differential privacy (Re-ADP).  ...  Considering multiple events occurring at continuous time segments, Kellaris et al. presented a -event -differential privacy model in [17] .  ... 
doi:10.1155/2018/6285719 fatcat:ewk53n7nkna27efpytktnl232q
« Previous Showing results 1 — 15 out of 40,490 results