Using MOPSO for Optimizing Randomized Response Schemes in Privacy Computing
نویسندگان
چکیده
منابع مشابه
Using Randomized Response for Differential Privacy Preserving Data Collection
This paper studies how to enforce differential privacy by using the randomized response in the data collection scenario. Given a client’s value, the randomized algorithm executed by the client reports to the untrusted server a perturbed value. The use of randomized response in surveys enables easy estimations of accurate population statistics while preserving the privacy of the individual respo...
متن کاملOn Synchronous, Asynchronous, and Randomized Best-Response schemes for computing equilibria in Stochastic Nash games
In this work, we consider a stochastic Nash game in which each player solves a parameterized stochastic optimization problem. In deterministic regimes, best-response schemes have been shown to be convergent under a suitable spectral property associated with the proximal best-response map. However, a direct application of this scheme to stochastic settings requires obtaining exact solutions to s...
متن کاملPersonalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response
Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need differen...
متن کاملPreserving Privacy and Optimizing Neural Network Classification by using a Mix of Soft Computing Techniques
An Artificial Neural Network (ANN) commonly called as Neural Network (NN) is a mathematical tool that is used in data mining for the analysis of data. Inherently human brain has its own limitations, the inability to handle large volumes of data being one of them. NNs with its power to handle large volumes of data along with imitation of human brain provides good solutions where the size of data...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Problems in Engineering
سال: 2018
ISSN: 1024-123X,1563-5147
DOI: 10.1155/2018/7846547