Showing 41 - 60 results of 288 for search '"data privacy"', query time: 0.06s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48

    An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks by Qiang Zhou, Geng Yang, Liwen He

    Published 2014-01-01
    “…The scheme adopts a symmetric-key homomorphic encryption to protect data privacy and combines it with homomorphic MAC synchronically to check the aggregation data integrity. …”
    Get full text
    Article
  9. 49

    A Privacy Preserving Method in WSN by Ping Qian, Meng Wu

    Published 2013-01-01
    “…This paper surveyed the general privacy preserving methods from two aspects of location privacy and data privacy in WSN and analyzed their theories and characteristics. …”
    Get full text
    Article
  10. 50

    Privacy protection scheme of DBSCAN clustering based on homomorphic encryption by Chunfu JIA, Ruiqi LI, Yafei WANG

    Published 2021-02-01
    “…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
    Get full text
    Article
  11. 51

    Research on ciphertext search for the cloud environment by Fei XIANG, Chuan-yi LIU, Bin-xing FANG, Chun-lu WANG, HONGRui-ming Z

    Published 2013-07-01
    “…Ciphertext search technology can combine the protection of user data's privacy with the efficient usage of cloud platform services. …”
    Get full text
    Article
  12. 52

    Energy-saving privacy data secure aggregation method by Yong-hao GU, Da GUO, Jiu-chuan LIN

    Published 2014-11-01
    “…For the Internet of things(IoT) secure data aggregation issues,data privacy-preserving and limited computation ability and energy of nodes should be tradeoff.Based on analyzing the pros-and-cons of current works,a low energy-consuming secure data aggregation method (LCSDA) was proposed.This method uses shortest path principle to choose neighbor nodes and generates the data aggregation paths in the cluster based on prim minimum spanning tree algorithm.Simulation results show that this method could effectively cut down energy consumption and reduce the probability of cluster head node being captured,in the same time preserving data privacy.…”
    Get full text
    Article
  13. 53

    Ultra-Short-Term Distributed Photovoltaic Power Probabilistic Forecasting Method Based on Federated Learning and Joint Probability Distribution Modeling by Yubo Wang, Chao Huo, Fei Xu, Libin Zheng, Ling Hao

    Published 2025-01-01
    “…Existing methods regarding cluster information sharing tend to easily trigger issues of data privacy leakage during information sharing, or they suffer from insufficient information sharing while protecting data privacy, leading to suboptimal forecasting performance. …”
    Get full text
    Article
  14. 54

    Federated Learning Lifecycle Management for Distributed Medical Artificial Intelligence Applications: A Case Study on Post-Transcatheter Aortic Valve Replacement Complication Predi... by Min Hyuk Jung, InSeo Song, KangYoon Lee

    Published 2025-01-01
    “…Nevertheless, existing legal frameworks and concerns regarding data privacy associated with medical information impose substantial constraints on implementing AI solutions in this domain. …”
    Get full text
    Article
  15. 55

    Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption by Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI

    Published 2023-05-01
    “…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
    Get full text
    Article
  16. 56

    Privacy-Preserving Continual Federated Clustering via Adaptive Resonance Theory by Naoki Masuyama, Yusuke Nojima, Yuichiro Toda, Chu Kiong Loo, Hisao Ishibuchi, Naoyuki Kubota

    Published 2024-01-01
    “…With the increasing importance of data privacy protection, various privacy-preserving machine learning methods have been proposed. …”
    Get full text
    Article
  17. 57

    Research on differential privacy protection parameter configuration method based on confidence level by Senyou LI, Xinsheng JI, Wei YOU

    Published 2019-08-01
    “…In order to solve the problem that the user's real data information is disclosed during the data release and analysis process,and reduce the probability of an attacker gaining real results through differential attacks and probabilistic inference attacks,a differential privacy protection parameter configuration method based on confidence level is proposed.Analysis of attacker confidence under attacker probabilistic inference attack model and make it no higher than the privacy probability threshold set according to the data privacy attribute.The proposed method can configure more reasonable privacy protection parameters for different query privilege of query users,and avoids the risk of privacy disclosure.The experimental analysis shows that the proposed method analyzes the correspondence between attacker confidence level and privacy protection parameters based on query privilege,noise distribution characteristics and data privacy attributes,and derives the configuration formula of privacy protection parameters,which configure the appropriate parameters without violating the privacy protection probability threshold.…”
    Get full text
    Article
  18. 58

    AFM-DViT: A framework for IoT-driven medical image analysis by Jiacheng Yang

    Published 2025-02-01
    “…These results highlight the model’s robust detection accuracy while maintaining data privacy. The AFM-DViT model offers an effective solution for secure and efficient medical image analysis in IoT-enabled environments.…”
    Get full text
    Article
  19. 59

    Traffic Sign Recognition in Rainy Conditions Based on Federated Learning by Chen Yilin

    Published 2025-01-01
    “…The proposed method is demonstrated by experimental results to enhance performance in challenging weather conditions while also maintaining data privacy in machine learning applications. Overall, this paper underscores the potential of integrating federated learning with CNNs to improve traffic sign recognition capabilities.…”
    Get full text
    Article
  20. 60

    Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering by M. Baqer

    Published 2024-12-01
    “…It is envisaged that the proposed approach will prolong the lifespan of IoT devices and maintain high accuracy in event detection, all while ensuring robust data privacy.…”
    Get full text
    Article