نتایج جستجو برای: differential protection

تعداد نتایج: 462039  

Journal: :CoRR 2010
Ninghui Li Wahbeh H. Qardaji Dong Su

Privacy-preserving microdata publishing currently lacks a solid theoretical foundation. Most existing techniques are developed to satisfy syntactic privacy notions such as k-anonymity, which fails to provide strong privacy guarantees. The recently proposed notion of differential privacy has been widely accepted as a sound privacy foundation for statistical query answering. However, no general p...

2017
O. Dharmapandit R. K. Patnaik P. K. Dash

This paper proposes a pattern recognition based differential spectral energy protection scheme for ac microgrids using a Fourier kernel based fast sparse time-frequency representation (SST or simply the sparse S-Transform). The average and differential current components are passed through a change detection filter, which senses the instant of fault inception and registers a change detection po...

Journal: :CoRR 2012
Ada Wai-Chee Fu Jia Wang Ke Wang Raymond Chi-Wing Wong

While the introduction of differential privacy has been a major breakthrough in the study of privacy preserving data publication, some recent work has pointed out a number of cases where it is not possible to limit inference about individuals. The dilemma that is intrinsic in the problem is the simultaneous requirement of data utility in the published data. Differential privacy does not aim to ...

2014
Siqi Zheng Cong Sun Matthew E. Kahn

Income inequality is rising in China at the same time that urban air pollution remains high. Households can purchase market products such as masks and air filters to protect themselves from pollution. Using a unique data set of Internet purchases, we document that households invest more in such products when ambient pollution levels exceed key alert thresholds. Richer people are more likely to ...

Journal: :Mathematics 2023

Recently, deep neural networks (DNNs) have achieved exciting things in many fields. However, the DNN models been proven to divulge privacy, so it is imperative protect private information of models. Differential privacy a promising method provide protection for DNNs. existing based on differential usually inject same level noise into parameters, which may lead balance between model performance ...

Journal: :CoRR 2017
Leye Wang Gehua Qin Dingqi Yang Xiao Han Xiaojuan Ma

For real-world mobile applications such as location-based advertising and spatial crowdsourcing, a key to success is targeting mobile users that can maximally cover certain locations in a future period. To find an optimal group of users, existing methods often require information about users’ mobility history, which may cause privacy breaches. In this paper, we propose a method to maximize mobi...

2015
S. N. Alekseev

Provision of reliability of structures is an important issue at the designing stage. One of reliability aspects is durability. In order to estimate the durability of reinforced concrete it is required to apply standard procedure of calculation which, according to SNIP Regulations 2.03.11-85 Protection of Engineering Structures against Corrosion, can be implemented with the use of means of prima...

Journal: :Rel. Eng. & Sys. Safety 2012
Enrico Zio Lucia R. Golea Giovanni Sansavini

This paper addresses the optimization of protection strategies in critical infrastructures within a complex network systems perspective. The focus is on cascading failures triggered by the intentional removal of a single network component. Three different protection strategies are proposed that minimize the consequences of cascading failures on the entire system, on predetermined areas or on bo...

Journal: :PoPETs 2017
Apostolos Pyrgelis Carmela Troncoso Emiliano De Cristofaro

Information about people’s movements and the locations they visit enables an increasing number of mobility analytics applications, e.g., in the context of urban and transportation planning, In this setting, rather than collecting or sharing raw data, entities often use aggregation as a privacy protection mechanism, aiming to hide individual users’ location traces. Furthermore, to bound informat...

Journal: :IACR Cryptology ePrint Archive 2014
Zoya Dyka Thomas Basmer Christian Wittke Peter Langendörfer

Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks are normally prepared by analyzing devices that are identical to the real target. Here we propose to individualize the design of cryptographic devices in order to prevent attacks that use identical devices. We imple...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید