24,080 Hits in 2.9 sec

Privacy-Preserving Matrix Factorization for Cross-Domain Recommendation

Taiwo Blessing Ogunseyi, Cossi Blaise Avoussoukpo, Yiqiang Jiang
2021 IEEE Access  
To the best of our knowledge, the only study on privacy-preserving crossdomain recommendation is on location-based recommendation, which is not applicable to a generic cross-domain recommendation.  ...  First, we formulate the three privacy requirements of a privacy-preserving cross-domain recommender system.  ... 
doi:10.1109/access.2021.3091426 fatcat:awvjql4tl5ce5olqc7xssdi44u

Advances in Processing, Mining, and Learning Complex Data: From Foundations to Real-World Applications

Jia Wu, Shirui Pan, Chuan Zhou, Gang Li, Wu He, Chengqi Zhang
2018 Complexity  
In view of these two challenges, a novel privacy-preserving and scalable service recommendation approach based on SimHash, that is, SerRecSimHash, is put forward in the paper titled "Privacy-Preserving  ...  of cross-cloud collaborative service recommendation severely.  ...  In view of these two challenges, a novel privacy-preserving and scalable service recommendation approach based on SimHash, that is, SerRecSimHash, is put forward in the paper titled "Privacy-Preserving  ... 
doi:10.1155/2018/7861860 fatcat:6mc7cqtqzjcjlghqbmlhb5hifa

Privacy in the age of Pervasive Internet and Big Data Analytics – Challenges and Opportunities

Saraswathi Punagin, Arti Arya
2015 International Journal of Modern Education and Computer Science  
We conclude with a discussion on future work in user controlled privacy preservation and selective personalization, particularly in the domain of search engines.  ...  The article reviews current privacy challenges, existing privacy preserving solutions and their limitations.  ...  Agir et al. in [2] , discuss a general approach to preserve location privacy which is commonly tracked by location sensing devices and applications that feed the Internet of Things (IoT).  ... 
doi:10.5815/ijmecs.2015.07.05 fatcat:twrxbhfuznbbdnzlceviavgqpu

Introduction to spatio-temporal data driven urban computing

Shuo Shang, Kai Zheng, Panos Kalnis
2020 Distributed and parallel databases  
spatio-temporal data while preserving the users' privacy.  ...  Additionally, their paper "Privacy-preserving spatial keyword location-to-trajectory matching," presents a network expansion algorithm and pruning strategies for finding location-trajectory pairs from  ... 
doi:10.1007/s10619-020-07300-3 fatcat:e7js4tbxuneg7nzqakksvdtlum

Exploring privacy-enhancing technologies in the automotive value chain [article]

Gonzalo Munilla Garrido, Kaja Schmidt, Christopher Harth-Kitzerow, Johannes Klepsch, Andre Luckow, Florian Matthes
2022 arXiv   pre-print
While we focus mainly on automotive use cases, the results also apply to other use case domains.  ...  Privacy-enhancing technologies (PETs) are becoming increasingly crucial for addressing customer needs, security, privacy (e.g., enhancing anonymity and confidentiality), and regulatory requirements.  ...  For this purpose, we investigate eight application domains, ranging from recommender systems, computer vision to data analytics.  ... 
arXiv:2209.05085v1 fatcat:thmnxvrrqnaifdym3b7ab4nsla

Successive Point-of-Interest Recommendation With Local Differential Privacy

Jong Seon Kim, Jong Wook Kim, Yon Dohn Chung
2021 IEEE Access  
In recent years, the notion of cross-domain (CD) recommendation [16] , which leverages additional knowledge learned from other domains to improve the target domain recommendation task, has emerged.  ...  LOCAL DIFFERENTIAL PRIVACY (LDP) LDP is a rigorous mathematical definition of privacy [20] , which is used to preserve the location privacy of users in our study.  ... 
doi:10.1109/access.2021.3076809 fatcat:gqvhphmwi5fvfeplnoykfnt6c4

The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study

Hussain Mutlaq Alnajrani, Azah Anir Norman
2020 Symmetry  
Although debate continues about the best strategies to preserve privacy and personal data protection in MCC, it is essential to explore the effects of applying privacy by design (PbD) to preserve privacy  ...  Mobile cloud computing (MCC) is a domain that stemmed from advances in mobile technology and cloud computing.  ...  To illustrate applying privacy by design framework to preserve privacy and personal data protection in MCC. 2 How does the privacy by design framework effects preserving privacy and personal data protection  ... 
doi:10.3390/sym12122039 fatcat:sint2kbpgzfvte5qovnusqk6cq

Privacy Aspects of Recommender Systems [chapter]

Arik Friedman, Bart P. Knijnenburg, Kris Vanhecke, Luc Martens, Shlomo Berkovsky
2015 Recommender Systems Handbook  
We analyze the risks to user privacy imposed by recommender systems, survey the existing solutions, and discuss the privacy implications for the users of the recommenders.  ...  In this chapter we overview the state of the art in privacy enhanced recommendations.  ...  Hence, cross-domain recommenders call for a special focus on the preservation of user privacy. Mobile and context-aware recommendations.  ... 
doi:10.1007/978-1-4899-7637-6_19 fatcat:a37glurl2vgyhconf6ihghekge

Resolving Cross Domain Firewall Policy Anomalies

Abdul Raziya, Amrutasagar Kavarthapu
2015 International Journal of Computer Applications  
So it involves wireless router extension recommend to imitate this event and confirm conclusion in accordance with the results.  ...  Although largest rule calculations methods help to some extent they are unsuccessful of performance in accordance with the presence of NAT (Network Address Translation) device across different subnets (domains  ...  To best information, no past techniques perform concentrates on cross-domain privacy-preserving inter firewall marketing. This paper represents the first step in discovering this unidentified space.  ... 
doi:10.5120/ijca2015905771 fatcat:75cgdvfvave6feubjpoagci67e

Tracking and Personalization [chapter]

Rahat Masood, Shlomo Berkovsky, Mohamed Ali Kaafar
2021 Modern Socio-Technical Perspectives on Privacy  
This includes the state-of-the-art practices, current challenges, and practical recommendations for system developers willing to strike this balance.  ...  Lastly, this chapter discusses the ways to balance personalization benefits and privacy concerns.  ...  We recommend interested readers to go through the chapter for more information on privacy preserving solutions.  ... 
doi:10.1007/978-3-030-82786-1_9 fatcat:au7bgwajqzeffb2cvtgn3ytasy

A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks

Abdul Majeed, Safiullah Khan, Seong Oun Hwang
2022 Electronics  
analysis, friend recommendation, etc.) of OSNs.  ...  Specifically, we classify the existing privacy-preserving solutions into two main categories: privacy-preserving graph publishing (PPGP) and privacy preservation in application-specific scenarios of the  ...  cloud computing, location-based systems, Internet of Things, recommender systems, telemedicine, and AI-based services.  ... 
doi:10.3390/electronics11131931 fatcat:wn3ism2pqrb23npcpkjhb5zmte

A Comparative Study of Android and iOS Mobile Applications' Data Handling Practices Versus Compliance to Privacy Policy [chapter]

Sophia Kununka, Nikolay Mehandjiev, Pedro Sampaio
2018 IFIP Advances in Information and Communication Technology  
privacy policies.  ...  We conducted an assessment of the extent to which apps' data practices matched their privacy policies. This study entails an in-depth comparison of Android and iOS apps' privacy compliance.  ...  is enhanced by cross checking apps' data handling practices against the apps' privacy commitments to app users as stipulated within their privacy policies.  ... 
doi:10.1007/978-3-319-92925-5_20 fatcat:3gfy53omefb2bb3iv6injbrmmu

Decentralized Identifiers and Self-sovereign Identity in 6G [article]

Sandro Rodriguez Garzon, Hakan Yildiz, Axel Küpper
2022 arXiv   pre-print
and privacy-preserving identity and key management in 6G networks.  ...  Recent decentralized identity management concepts, such as the W3C recommendation of Decentralized Identifiers, provide a secure, tamper-proof, and cross-domain identity management alternative for future  ...  This makes SSI a new fundamental concept to enforce privacy preservation and to enable trust building between actors of different trust domains.  ... 
arXiv:2112.09450v2 fatcat:kpyoshs4njddlhmlhckjvjgtge

Personalized Mobile App Recommendation by Learning User's Interest from Social Media

Miss. Pratiksha Yuvraj Sawant, Mr. Mangesh D Salunke
2022 International Journal for Research in Applied Science and Engineering Technology  
Keywords: Social Media, User Profile, deep learning, Privacy, matrix factorization,App recommendation.  ...  All of these findings show that our method can reliably extract user interests from tweets in order to aid in the solution of the personalised app recommendation problem.  ...  In this paper, new algorithms developed to deal with these practical variables in both deanonymization and location-privacy-preserving techniques have demonstrated promising performance, confirming our  ... 
doi:10.22214/ijraset.2022.41246 fatcat:zj7koxvfwngtzp2cnuyn63j2em

Trust and Privacy in Development of Publish/Subscribe Systems

Emanuel Onica, Hugues Mercier, Etienne Riviere
2019 Information Systems Development  
This trend, despite its advantages, opens up multiple important data privacy and trust issues.  ...  These should be enforced when crossing into both domains for preserving trust.  ...  This is the boundary that appears when crossing from a more trusted domain to a less trusted domain.  ... 
dblp:conf/isdevel/OnicaMR19 fatcat:tydzpvtkq5d33claj6t5vgwkei
« Previous Showing results 1 — 15 out of 24,080 results