نتایج جستجو برای: privacy preserving
تعداد نتایج: 90476 فیلتر نتایج به سال:
In this paper, we consider an exceptional study of differentially private stochastic gradient descent (SGD) algorithms in the convex optimization (SCO). The majority existing literature requires that losses have additional assumptions, such as loss functions with Lipschitz, smooth and strongly convex, uniformly bounded model parameters, or focus on Euclidean (i.e. <math xmlns="http://www.w3.org...
Electronic Health Record ( EHR ) is the key to an efficient healthcare service delivery system. The publication of data highly beneficial industries and government institutions support a variety medical census research. However, contains sensitive information patients such could lead unintended privacy disclosures. In this paper, we present comprehensive survey state-of-the-art privacy-enhancin...
Data mining technologies are popular for identifying interesting patterns and trends in large amounts of data. With the advent of high speed networks and easily available storage, many organizations are able to collect large amounts of data. On one hand, these organizations would like to mine their data to understand and discover interesting patterns; on the other hand, many legal and commercia...
Privacy-preserving data mining seeks to allow the cooperative execution of data mining algorithms while preserving the data privacy of each party concerned. In recent years, many data mining algorithms have been enhanced with privacy-preserving feature: decision tree induction, frequent itemset counting, association analysis, k-means clustering, support vector machine, Näıve Bayes classifier, B...
The field of privacy has seen rapid advances in recent years because of the increases in the ability to store data. In particular, recent advances in the data mining field have lead to increased concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. As a result privacy becomes one of the pr...
In this technical report we present two new privacy-preserving matching protocols for singular attributes and strings, respectively. The first one is used for matching of common attributes without revealing unmatched ones to each other. The second protocol is used to discover the longest common sub-string of two input strings in a privacy-preserving manner. Compared with previous work, our solu...
In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter has many applications such as hash-based IP-traceback systems and Web cache sharing. In some of those applications, equipping the Bloom-filter with the privacy-preserving mechanism is crucial for the deployment. In this paper, we propose a cryptographically secure privacy-preserving Bloom-filter protocol. ...
Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do not address user privacy at all, while anonymous credentials that protect user privacy are complex and have compatibility problems with existing PKIs. In this paper we propose privacy-preserving credentials, a concept bet...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید