Filters








4,004 Hits in 2.7 sec

Multi-resolution privacy-enhancing technologies for smart metering

Fabian Knirsch, Günther Eibl, Dominik Engel
2017 EURASIP Journal on Information Security  
For three types of privacy methods (secure aggregation, masking and differential privacy), we show that MRA not only enhances privacy, but also adds additional flexibility and control for the end-user.  ...  The combination of MRA and PETs is evaluated in terms of privacy, computational demands, and real-world feasibility for each of the three method types.  ...  Acknowledgements The financial support by the Austrian Federal Ministry of Science, Research and Economy and the Austrian National Foundation for Research, Technology and Development is gratefully acknowledged  ... 
doi:10.1186/s13635-017-0058-3 fatcat:fhci2qc35jecnmd6xxdg5sa7ya

LightDP: towards automating differential privacy proofs

Danfeng Zhang, Daniel Kifer
2017 SIGPLAN notices  
The core of LightDP is a novel relational type system that separates relational reasoning from privacy budget calculations.  ...  The growing popularity and adoption of differential privacy in academic and industrial settings has resulted in the development of increasingly sophisticated algorithms for releasing information while  ...  Acknowledgments We thank Adam Smith, our shepherd Marco Gaboardi and anonymous reviewers for their helpful suggestions. This work was supported by NSF grants CNS-1228669 and CCF-1566411.  ... 
doi:10.1145/3093333.3009884 fatcat:pmxbrti2c5bqjkodkeqylgnhhq

LightDP: Towards Automating Differential Privacy Proofs [article]

Danfeng Zhang, Daniel Kifer
2016 arXiv   pre-print
The core of LightDP is a novel relational type system that separates relational reasoning from privacy budget calculations.  ...  The growing popularity and adoption of differential privacy in academic and industrial settings has resulted in the development of increasingly sophisticated algorithms for releasing information while  ...  Program logic for differential privacy Probabilistic relational program logic (Barthe et al. 2012 Barthe and Olmedo 2013; Barthe et al. 2016 ) use custom relational logics to verify differential privacy  ... 
arXiv:1607.08228v2 fatcat:csro55xgkbdslj5verphm7yoc4

Private Release of Graph Statistics using Ladder Functions

Jun Zhang, Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, Xiaokui Xiao
2015 Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data - SIGMOD '15  
In this paper, we introduce a new method which guarantees differential privacy.  ...  Our experimental study confirms that our method outperforms existing methods for counting triangles and stars in terms of accuracy, and provides solutions for some problems for which no effective method  ...  In what follows, we review some other related efforts to realize privacy protection for graph data. Hay et al.  ... 
doi:10.1145/2723372.2737785 dblp:conf/sigmod/ZhangCPSX15 fatcat:f2mg7ahgvfa3boiej7xfvs2mwq

Lifted Relational Neural Networks [article]

Gustav Sourek, Vojtech Aschenbrenner, Filip Zelezny, Ondrej Kuzelka
2015 arXiv   pre-print
A general lifted architecture, possibly reflecting some background domain knowledge, is described through relational rules which may be handcrafted or learned.  ...  The framework allows for hierarchical relational modeling constructs and learning of latent relational concepts through shared hidden layers weights corresponding to the rules.  ...  Acknowledgments GS and FŽ are supported by Cisco sponsored research project "Modelling network traffic with relational features".  ... 
arXiv:1508.05128v2 fatcat:yhez6siaqvflrcebqxfryybhtq

Book report

1995 Computers and Mathematics with Applications  
Cyber-crimes: Pitfalls for the unwary traveler. Notes. Appendices. A. Where to go for more help. B. The electronic communications privacy act.  ...  Direct methods for constructing positive spline interpolants. W. HeB and J.W. Schmidt. Conditionally lower Riesz bounds for scattered data interpolation. K. Jetter. The 'face lift' algorithm. J.  ... 
doi:10.1016/0898-1221(95)90275-9 fatcat:d5oc6j5q7bcgljyo7nkivve7la

Higher-order probabilistic adversarial computations: Categorical semantics and program logics [article]

Alejandro Aguirre, Gilles Barthe, Marco Gaboardi, Deepak Garg, Shin-ya Katsumata, Tetsuya Sato
2021 arXiv   pre-print
We prove the soundness of the logics in the category of quasi-Borel spaces, using a general notion of graded predicate liftings, and we use logical relations over graded predicate liftings to establish  ...  We develop unary program logics for reasoning about error probabilities and expected values, and a relational logic for reasoning about coupling-based properties.  ...  We introduce the concept of Heyting-algebra valued strong graded relational lifting. 93:25 Example 6.6 (Relational lifting for differential privacy).  ... 
arXiv:2107.01155v1 fatcat:pvfuaokk3rcrtlkd63hdtkzn7i

Generalised Differential Privacy for Text Document Processing [article]

Natasha Fernandes, Mark Dras, Annabelle McIver
2019 arXiv   pre-print
In this paper we combine ideas from "generalised differential privacy" and machine learning techniques for text processing to model privacy for text documents.  ...  We show that our mechanism satisfies privacy with respect to a metric for semantic similarity, thereby providing a balance between utility, defined by the semantic content of texts, with the obfuscation  ...  [12] for lifting a differentially private mechanism K: X → DX to a differentially private mechanism K : X N → DX N on vectors in X N .  ... 
arXiv:1811.10256v2 fatcat:pdhkjngqvvgsvlsonv2vexgjg4

Efficient Lipschitz Extensions for High-Dimensional Graph Statistics and Node Private Degree Distributions [article]

Sofya Raskhodnikova, Adam Smith
2015 arXiv   pre-print
Lipschitz extensions were recently proposed as a tool for designing node differentially private algorithms.  ...  We also develop new tools for employing Lipschitz extensions in the design of differentially private algorithms.  ...  There are two natural variants of differential privacy that are suited for graph datasets: edge differential privacy and node differential privacy.  ... 
arXiv:1504.07912v1 fatcat:y4qxs6wourgrnobtbjguylku7q

Modelling Requirements for Content Recommendation Systems [article]

Sarah Bouraga and Ivan Jureta and Stéphane Faulkner
2016 arXiv   pre-print
This paper addresses the modelling of requirements for a content Recommendation System (RS) for Online Social Networks (OSNs).  ...  for the modelling of the problem domain.  ...  Once the trigger occurs, the symbol of the base layer lift up to the second layer.  ... 
arXiv:1606.05746v1 fatcat:oiqqs3tbvrf4nbyr3xbd6dmaaa

Analyzing Information Leakage of Updates to Natural Language Models [article]

Marc Brockschmidt, Boris Köpf, Olga Ohrimenko, Andrew Paverd, Victor Rühle, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin
2020 arXiv   pre-print
We propose two new metrics---differential score and differential rank---for analyzing the leakage due to updates of natural language models.  ...  We discuss the privacy implications of our findings, propose mitigation strategies and evaluate their effect.  ...  For the layperson: Los Angeles Kings, Minnesota North Stars, and Toronto Maple Leaf are National Hockey League teams; Norm Green was the owner of the North Stars; an ice hockey game consists of three periods  ... 
arXiv:1912.07942v3 fatcat:dbkzvycmzzejdipfndzzmkxibq

The impact of dwelling renovation on spatial quality

Fernanda Acre, Annemie Wyckmans
2015 Smart and Sustainable Built Environment  
The impact on spatial quality is observed by considering all the renovation measures, instead of only considering the measures primarily related to energy performance.  ...  This emphasises the need for a cross-disciplinary approach between technical and non-technical dimensions in the energy renovation of dwellings.  ...  David Cougier from MANASLU Ing. for being the contact and the source for information regarding the dwelling renovation of the case presented in this paper, the MS-1 building in the Arlequin neighbourhood  ... 
doi:10.1108/sasbe-05-2015-0008 fatcat:a5eembm4yra67dcsi6zjdf3nt4

Specificities, Obstacles and Limits to Building Customer Loyalty in Mountain Resort Luxury Hotels

Maud Tixier
2011 Modern Economy  
We shall base our findings on the example of Courchevel, located in the Savoie region, in France, a resort renowned worldwide for its concentration of luxury and 5-star hotels with their star-winning chefs  ...  Fifty or so qualitative interviews on the topic of customer loyalty were carried out in twenty or so hotels for this study between 2008 and 2010.  ...  Meeting these expectations is the priority for any luxury hotel and will have more or less impact according to their discriminatory and differentiating character compared to the competition.  ... 
doi:10.4236/me.2011.25096 fatcat:za2vpcjgivgqbkklh2663h7zj4

Towards the Capacity of Private Information Retrieval from Coded and Colluding Servers [article]

Lukas Holzbaur, Ragnar Freij-Hollanti, Jie Li, Camilla Hollanti
2021 arXiv   pre-print
In this work, two practical concepts related to private information retrieval (PIR) are introduced and coined full support-rank PIR and strongly linear PIR.  ...  It is also shown that, further restricting to strongly-linear PIR schemes with deterministic linear interference cancellation, the so-called star product scheme proposed by Freij-Hollanti et al. is essentially  ...  Qiwen Wang for helpful discussions.  ... 
arXiv:1903.12552v7 fatcat:wpgypxt4krbidjx524oxelcbym

Motorbikes against Ho Chi Minh? Or the icons of a social transformation in Vietnam

Alexandre Dormeier Freire
2009 The Copenhagen Journal of Asian Studies  
This article addresses the question of the new values and social transformation within the post-socialist society in Vietnam, as seem to symbolize the social behaviours related to the use of motorbikes  ...  It analyses the new social values and practices of differentiation related to the emergence of consumerism in Vietnam.  ...  ' or privacy in the use of the motorbikes.  ... 
doi:10.22439/cjas.v27i1.1693 fatcat:s5dp2tjnrbbmlkkjqt2kncmfie
« Previous Showing results 1 — 15 out of 4,004 results