-
1
Preserving data privacy in social recommendation
Published 2015-12-01“…Social recommendation is a method which requires the participants of both user’s historical behavior data and social network,which generally belong to different parties,such as recommendation system service provider and social network service provider.Considering the fact that in order to maintain the value of their own data interests and user’s privacy,none of them will provide data information to the other,two privacy preserving protocols are proposed for efficient computation of social recommendation which needs the cooperation of two parties (recommendation system service provider and social network service provider).Both protocols enable two parties to compute the social recommendation without revealing their private data to each other.The protocol based on the well-known oblivious transfer multiplication has a low cost,and is suitable for the application of high efficiency requirements.And the one based on homomorphic cryptosystem has a better privacy preserving,and is more suitable for the application of higher data privacy requirements.Experimental results on the four real datasets show those two protocols are efficient and practical.Users are suggested to choose the appropriate protocol according to their own need.…”
Get full text
Article -
2
Federated Learning in Data Privacy and Security
Published 2024-12-01“…The biggest concern in federated learning is data privacy and cybersecurity. There are many algorithms that federated models have to work on to achieve greater efficiency, security, quality and effective learning. …”
Get full text
Article -
3
Survey of split learning data privacy
Published 2024-06-01“…Finally, future research directions in the area of data privacy for split learning were discussed.…”
Get full text
Article -
4
The New Method of Sensor Data Privacy Protection for IoT
Published 2021-01-01“…This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. …”
Get full text
Article -
5
Personal data privacy protection method based onvertical partitioning
Published 2024-10-01“…This study explored how to protect user data privacy when collusion might exist between CSP. …”
Get full text
Article -
6
Model split-based data privacy protection method for federated learning
Published 2024-09-01“…However, the SL still has limitations such as potential data privacy leakage. Therefore, binarized split learning-based data privacy protection (BLDP) algorithm was proposed. …”
Get full text
Article -
7
Multiorder Fusion Data Privacy-Preserving Scheme for Wireless Sensor Networks
Published 2017-01-01“…At present, the technology of data privacy protection in wireless sensor networks has become a hot research topic, mainly for data aggregation, data query, and access control of data privacy protection. …”
Get full text
Article -
8
Differentially private sequence generative adversarial networks for data privacy masking
Published 2020-08-01Subjects: Get full text
Article -
9
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Published 2022-02-01Get full text
Article -
10
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…Firstly, the research background and challenges of data privacy preservation for search of IoT were described. …”
Get full text
Article -
11
Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles
Published 2022-04-01Get full text
Article -
12
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
Published 2014-01-01“…In this paper, we analyze data privacy issues in VSNs with a game theoretic model, where a defender uses the privacy protecting techniques against the attack strategies implemented by an adversary. …”
Get full text
Article -
13
Patient Perspectives on Health Data Privacy and Management: “Where Is My Data and Whose Is It?”
Published 2018-01-01“…Hence, this study aims to shed more light on the patient perspective on health data privacy and management. Focus groups with cardiac patients were done at the Elizabeth TweeSteden Ziekenhuis (ETZ) in the Netherlands as part of the DoCHANGE project. …”
Get full text
Article -
14
Blockchain applications in managing oral oncology patient data: Privacy, security, and beyond
Published 2024-06-01Get full text
Article -
15
A synchronous compression and encryption method for massive electricity consumption data privacy preserving
Published 2025-01-01Get full text
Article -
16
South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions
Published 2024-12-01Subjects: “…elections, voters, technology, mobile apps, data privacy, data security, South Africa, Electoral Commission, IEC…”
Get full text
Article -
17
Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations
Published 2022-03-01Subjects: Get full text
Article -
18
Probabilistic forecasting of multiple plant day-ahead renewable power generation sequences with data privacy preserving
Published 2025-01-01“…Therefore, only desensitized data, such as parameters of the models, are allowed to be transmitted among end users for preserving local data privacy of power plants. To verify the advantages of the DIFL, a preliminary exploration of its theoretical property is first conducted. …”
Get full text
Article -
19
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01Subjects: “…data privacy protection…”
Get full text
Article -
20