Filters








67,206 Hits in 3.6 sec

Privacy-Preserving Observation in Public Spaces [chapter]

Florian Kerschbaum, Hoon Wei Lim
2015 Lecture Notes in Computer Science  
One method of privacy-preserving accounting or billing in cyber-physical systems, such as electronic toll collection or public transportation ticketing, is to have the user present an encrypted record  ...  The probability can be set high enough to allow for spot checking, but in all other cases privacy is perfectly preserved.  ...  We then present a privacy-preserving spot checking protocol that allows privacy-preserving observations in public spaces and can be used to enforce honesty in billing while still preserving privacy.  ... 
doi:10.1007/978-3-319-24177-7_5 fatcat:mgqzms4tgjfs7jnlteyxpsabxy

Opponent-Aware Planning with Admissible Privacy Preserving for UGV Security Patrol under Contested Environment

Junren Luo, Wanpeng Zhang, Wei Gao, Zhiyong Liao, Xiang Ji, Xueqiang Gu
2019 Electronics  
In this paper, we attempt to generate opponent-aware privacy-preserving plans, mainly focusing on two questions: what is opponent-aware privacy-preserving planning, and, how can we generate opponent-aware  ...  Then, we demonstrate how to generate opponent-aware privacy-preserving plans. The search-based planning algorithms were restricted to public information shared among the cooperators.  ...  Following the definition of belief space from [35] , we take the belief space of the adversary into account in path planning, so as to control the observability of the adversary.  ... 
doi:10.3390/electronics9010005 fatcat:ms2g5anxp5glzebrqtjaerzwbi

[Paper] Digital Diorama: Privacy-Preserving and Intelligible Sensing-Based Real-World Content

Naoko Nitta, Noboru Babaguchi
2015 ITE Transactions on Media Technology and Applications  
public spaces.  ...  The results of subjective evaluations indicated that utilizing appropriate human icons can improve the intelligibility of the content while preserving the privacy of the monitored persons.  ...  of the detected persons in the basic view enables the viewers to observe the current congestion situation in the monitored space without violating the privacy of persons in the space.  ... 
doi:10.3169/mta.3.184 fatcat:z6rpp7vmzrbvfmdxqr2i2fnyee

Regulating Real-World Surveillance

Margot E. Kaminski
2015 Social Science Research Network  
But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal.  ...  Stemming from this understanding of privacy, the government has two related interests in enacting laws prohibiting surveillance: an interest in providing notice so that an individual can adjust her behavior  ...  But it is important that courts understand that government interests go beyond preserving privacy in secluded spaces, or preserving privacy in sensitive information.  ... 
doi:10.2139/ssrn.2681128 fatcat:hw4ecipnvveldoqiq63l4drsui

Privacy Preserving RBF Kernel Support Vector Machine

Haoran Li, Li Xiong, Lucila Ohno-Machado, Xiaoqian Jiang
2014 BioMed Research International  
We developed a hybrid privacy-preserving differentially private support vector machine (SVM) model that uses public data and private data together.  ...  This often results in too much noise in the final outputs.  ...  use the privacy preserving linear SVM algorithm in [25] .  ... 
doi:10.1155/2014/827371 pmid:25013805 pmcid:PMC4071990 fatcat:mwoxbhvdlnhztpxrdw5sqymgii

Approximate privacy

Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira
2010 Proceedings of the 11th ACM conference on Electronic commerce - EC '10  
provisioning of a public good, and also set disjointness and set intersection.  ...  Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce.  ...  We observe that, in terms of privacy-approximation ratios, the public-good and millionaires problems are equivalent.  ... 
doi:10.1145/1807342.1807369 dblp:conf/sigecom/FeigenbaumJS10 fatcat:4jpjlwlbere3jmmmpyc2uirg6u

The Comparative Study of Privacy in Designing Qajar Dynasty Isfahan`s Houses and Malaysia`s Traditional Houses

Zahra Kazemi Zahrani, Seyedeh Marziah Tabaeian
2016 Journal of Design and the Built Environment  
This survey is to analyze privacy layering in Iranian architectural houses and as a religious value by the use of the mentioned method (observation, interview, and studying the maps) in the traditional  ...  The conclusion of this study shows the existence of extrovert privacy pattern in Malaysian houses and also existence of introvert privacy pattern in Qajar houses and different spatial categorizations;  ...  But in terms of ensuring privacy, both samples are similar in the following cases: 1) Observing the hierarchy of access from public to private. 2) Positioning private areas in the periphery. 3) Positioning  ... 
doi:10.22452/jdbe.sp2016no1.6 fatcat:pnjooirr7be4vcve5zfmtzxxoy

Approximate Privacy: Foundations and Quantification [article]

Joan Feigenbaum, Aaron D. Jaggard, Michael Schapira
2010 arXiv   pre-print
that are linear in k (i.e., logarithmic in the size of the space of possible inputs).  ...  There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments.  ...  It is easy to show (via Observation 2.4) that for Public Good k , as for The Millionaires Problem k , no perfectly privacy-preserving communication protocol exists.  ... 
arXiv:0910.5714v2 fatcat:f6uhfj2ivbe2xar5jx3y7a3zoa

Privacy Enhancement for Cloud-Based Few-Shot Learning [article]

Archit Parnami, Muhammad Usama, Liyue Fan, Minwoo Lee
2022 arXiv   pre-print
This paper studies the privacy enhancement for the few-shot learning in an untrusted environment, e.g., the cloud, by establishing a novel privacy-preserved embedding space that preserves the privacy of  ...  that learns privacy-preserved representation through the joint loss.  ...  Observation of the Privacy-Preserved Embedding Space Fig. 7 shows the evolution of the embeddings in the process of privacy encoding and privacy-preserved representation We report the results for a case  ... 
arXiv:2205.07864v1 fatcat:orei2dkm5nan5bfxzpvrxhhrue

The ethics of inattention: revitalising civil inattention as a privacy-protecting mechanism in public spaces

Tamar Sharon, Bert-Jaap Koops
2021 Ethics and Information Technology  
We argue for the need to revitalise, in academic and policy debates, the role of civil inattention and related practices in regulating behaviour in public space.  ...  Our analysis highlights the relational nature of privacy and the importance of social norms in accomplishing and preserving it.  ...  public space.  ... 
doi:10.1007/s10676-020-09575-7 pmid:33488275 pmcid:PMC7811391 fatcat:t63azu3f4rctxlmvn54sscgjve

Civil Society and Cybersurveillance

Andrew McCanse Wright
2016 Social Science Research Network  
The theory divides the world into public and private spaces, with a "society" in the middle that mediates between the public and private spheres.  ...  Under traditional Fourth Amendment analysis, people would not have a reasonable expectation of privacy in tattoos visible to the public. 125 No individual collection by the officer or camera's observation  ... 
doi:10.2139/ssrn.2800200 fatcat:zeraltzvxrag3guxxuvbi46nsu

Preservative License Plate De-identification for Privacy Protection

Liang Du, Haibin Ling
2011 2011 International Conference on Document Analysis and Recognition  
In this work, we study the problem of privacy preserving with focus on license plate number protecting in imagery.  ...  We tested the proposed method on a public dataset in comparison with several popular de-identification methods.  ...  This work is supported in part by NSF Grant IIS-1049032.  ... 
doi:10.1109/icdar.2011.100 dblp:conf/icdar/DuL11 fatcat:3644vfv63vcqba3hhjnbxv7diy

The effect of privacy legislation on observational research

A. S. Gershon, J. V. Tu
2008 CMAJ - Canadian Medical Association Journal  
This is where educational brochures, easily available in public spaces (e.g., hospital waiting rooms or nursing stations), describe observational research projects, and a contact name and telephone number  ...  In addition, new ways of informing and gaining support from the public for observational research should be developed and evaluated.  ...  Both of the authors approved the final version submitted for publication.  ... 
doi:10.1503/cmaj.061353 pmid:18362384 pmcid:PMC2267836 fatcat:usvbvgiftrhy7mqi4iuxgyoeji

Explicitly Privacy-Aware Space Usage Analysis

Sanjiv S. Jha, Simon Mayer, Tanja Schneider
2020 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)  
Surveillance in private and public spaces provides observers with information that can enhance protection and efficiency but usually infringes upon the privacy of the individuals and groups.  ...  We implement our prototype in the context of office space surveillance, where the proposed solution considers privacy requirements in such environments to improve users' trust in the surveillance system  ...  ACKNOWLEDGMENT The authors gratefully acknowledge Fabrice Guermann and Nora Kueng's efforts and contributions in developing the prototype and concept for this project and article.  ... 
doi:10.1109/trustcom50675.2020.00172 fatcat:uphrpxpp3zguhb23bbgribmmta

Data-Driven Automated Cardiac Health Management with Robust Edge Analytics and De-Risking

Arijit Ukil, Antonio J. Jara, Leandro Marin
2019 Sensors  
When a user sets for privacy protection, appropriate privacy preservation is guaranteed for defense against privacy-breaching knowledge mining attacks.  ...  In this era of IoT and machine intelligence, this work is of practical importance, which enables on-demand automated screening of cardiac health under minimizing the privacy breaching risk.  ...  The probability distribution of this feature space as depicted in Figure 4 shows that the features are capable to distinguish the two classes. We observe: i.  ... 
doi:10.3390/s19122733 fatcat:ha222tvzyfhqvgvpriwh4irnai
« Previous Showing results 1 — 15 out of 67,206 results