نتایج جستجو برای: privacy preserving

تعداد نتایج: 90476  

Journal: :IEEE Transactions on Mobile Computing 2014

Journal: :IEEE Transactions on Dependable and Secure Computing 2018

Journal: :Journal of Mathematics 2023

In this paper, we consider an exceptional study of differentially private stochastic gradient descent (SGD) algorithms in the convex optimization (SCO). The majority existing literature requires that losses have additional assumptions, such as loss functions with Lipschitz, smooth and strongly convex, uniformly bounded model parameters, or focus on Euclidean (i.e. <math xmlns="http://www.w3.org...

Journal: :ITM web of conferences 2021

Electronic Health Record ( EHR ) is the key to an efficient healthcare service delivery system. The publication of data highly beneficial industries and government institutions support a variety medical census research. However, contains sensitive information patients such could lead unintended privacy disclosures. In this paper, we present comprehensive survey state-of-the-art privacy-enhancin...

2004

Data mining technologies are popular for identifying interesting patterns and trends in large amounts of data. With the advent of high speed networks and easily available storage, many organizations are able to collect large amounts of data. On one hand, these organizations would like to mine their data to understand and discover interesting patterns; on the other hand, many legal and commercia...

2007
Shuguo Han Wee Keong Ng

Privacy-preserving data mining seeks to allow the cooperative execution of data mining algorithms while preserving the data privacy of each party concerned. In recent years, many data mining algorithms have been enhanced with privacy-preserving feature: decision tree induction, frequent itemset counting, association analysis, k-means clustering, support vector machine, Näıve Bayes classifier, B...

2011
Lambodar Jena Ramakrushna Swain

The field of privacy has seen rapid advances in recent years because of the increases in the ability to store data. In particular, recent advances in the data mining field have lead to increased concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the wide proliferation of sensitive information on the internet. As a result privacy becomes one of the pr...

Journal: :IACR Cryptology ePrint Archive 2010
Pu Duan Sanmin Liu Weiqin Ma Guofei Gu Jyh-Charn Liu

In this technical report we present two new privacy-preserving matching protocols for singular attributes and strings, respectively. The first one is used for matching of common attributes without revealing unmatched ones to each other. The second protocol is used to discover the longest common sub-string of two input strings in a privacy-preserving manner. Compared with previous work, our solu...

Journal: :Trans. Data Privacy 2009
Ryo Nojima Youki Kadobayashi

In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter has many applications such as hash-based IP-traceback systems and Web cache sharing. In some of those applications, equipping the Bloom-filter with the privacy-preserving mechanism is crucial for the deployment. In this paper, we propose a cryptographically secure privacy-preserving Bloom-filter protocol. ...

2007
Yanjiang Yang Robert H. Deng Feng Bao

Credentials are an indispensable means for service access control in electronic commerce. However, regular credentials such as X.509 certificates and SPKI/SDSI certificates do not address user privacy at all, while anonymous credentials that protect user privacy are complex and have compatibility problems with existing PKIs. In this paper we propose privacy-preserving credentials, a concept bet...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید