Showing 1 - 20 results of 288 for search '"data privacy"', query time: 0.08s Refine Results
  1. 1

    Preserving data privacy in social recommendation by Shu-shu LIU, An LIU, Lei ZHAO, Guan-feng LIU, Zhi-xu LI, Kai ZHENG, Xiao-fang ZHOU

    Published 2015-12-01
    “…Social recommendation is a method which requires the participants of both user’s historical behavior data and social network,which generally belong to different parties,such as recommendation system service provider and social network service provider.Considering the fact that in order to maintain the value of their own data interests and user’s privacy,none of them will provide data information to the other,two privacy preserving protocols are proposed for efficient computation of social recommendation which needs the cooperation of two parties (recommendation system service provider and social network service provider).Both protocols enable two parties to compute the social recommendation without revealing their private data to each other.The protocol based on the well-known oblivious transfer multiplication has a low cost,and is suitable for the application of high efficiency requirements.And the one based on homomorphic cryptosystem has a better privacy preserving,and is more suitable for the application of higher data privacy requirements.Experimental results on the four real datasets show those two protocols are efficient and practical.Users are suggested to choose the appropriate protocol according to their own need.…”
    Get full text
    Article
  2. 2

    Federated Learning in Data Privacy and Security by Dokuru Trisha Reddy, Haripriya Nandigam, Sai Charan Indla, S. P. Raja

    Published 2024-12-01
    “…The biggest concern in federated learning is data privacy and cybersecurity. There are many algorithms that federated models have to work on to achieve greater efficiency, security, quality and effective learning. …”
    Get full text
    Article
  3. 3

    Survey of split learning data privacy by QIN Yiqun, MA Xiaojing, FU Jiayun, HU Pingyi, XU Peng, JIN Hai

    Published 2024-06-01
    “…Finally, future research directions in the area of data privacy for split learning were discussed.…”
    Get full text
    Article
  4. 4

    The New Method of Sensor Data Privacy Protection for IoT by Yue Wu, Liangtu Song, Lei Liu

    Published 2021-01-01
    “…This article introduces the new method of sensor data privacy protection method for IoT. Asymmetric encryption is used to verify the identity of the gateway by the sensor. …”
    Get full text
    Article
  5. 5

    Personal data privacy protection method based onvertical partitioning by RUAN Huafeng, LI Rui, LUO Kailun

    Published 2024-10-01
    “…This study explored how to protect user data privacy when collusion might exist between CSP. …”
    Get full text
    Article
  6. 6

    Model split-based data privacy protection method for federated learning by CHEN Ka

    Published 2024-09-01
    “…However, the SL still has limitations such as potential data privacy leakage. Therefore, binarized split learning-based data privacy protection (BLDP) algorithm was proposed. …”
    Get full text
    Article
  7. 7

    Multiorder Fusion Data Privacy-Preserving Scheme for Wireless Sensor Networks by Mingshan Xie, Yong Bai, Mengxing Huang, Zhuhua Hu

    Published 2017-01-01
    “…At present, the technology of data privacy protection in wireless sensor networks has become a hot research topic, mainly for data aggregation, data query, and access control of data privacy protection. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG

    Published 2017-01-01
    “…Firstly, the research background and challenges of data privacy preservation for search of IoT were described. …”
    Get full text
    Article
  11. 11
  12. 12

    A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks by Yunhua He, Limin Sun, Weidong Yang, Hong Li

    Published 2014-01-01
    “…In this paper, we analyze data privacy issues in VSNs with a game theoretic model, where a defender uses the privacy protecting techniques against the attack strategies implemented by an adversary. …”
    Get full text
    Article
  13. 13

    Patient Perspectives on Health Data Privacy and Management: “Where Is My Data and Whose Is It?” by Mart Wetzels, Eva Broers, Peter Peters, Loe Feijs, Jos Widdershoven, Mirela Habibovic

    Published 2018-01-01
    “…Hence, this study aims to shed more light on the patient perspective on health data privacy and management. Focus groups with cardiac patients were done at the Elizabeth TweeSteden Ziekenhuis (ETZ) in the Netherlands as part of the DoCHANGE project. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions by Nawal Omar, Scott Timcke

    Published 2024-12-01
    Subjects: “…elections, voters, technology, mobile apps, data privacy, data security, South Africa, Electoral Commission, IEC…”
    Get full text
    Article
  17. 17
  18. 18

    Probabilistic forecasting of multiple plant day-ahead renewable power generation sequences with data privacy preserving by Hong Liu, Zijun Zhang

    Published 2025-01-01
    “…Therefore, only desensitized data, such as parameters of the models, are allowed to be transmitted among end users for preserving local data privacy of power plants. To verify the advantages of the DIFL, a preliminary exploration of its theoretical property is first conducted. …”
    Get full text
    Article
  19. 19
  20. 20