Academic literature on the topic 'Private'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Private.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Private"

1

Gold, Andrew. "Private Rights and Private Wrongs." Michigan Law Review, no. 115.6 (2017): 1071. http://dx.doi.org/10.36644/mlr.115.6.private.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Culshaw, Helen. "Private sector libraries and privacy." ANZTLA EJournal, no. 49 (April 29, 2019): 10–13. http://dx.doi.org/10.31046/anztla.v0i49.1196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Munro, Moira, and Ruth Madigan. "Privacy in the private sphere." Housing Studies 8, no. 1 (January 1993): 29–45. http://dx.doi.org/10.1080/02673039308720748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Etzioni, Amitai. "Privacy and the private realm." Innovation: The European Journal of Social Science Research 25, no. 1 (March 2012): 57–66. http://dx.doi.org/10.1080/13511610.2012.655574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Darr, Kurt. "Privacy—Private Lives, Public Lives." Hospital Topics 81, no. 3 (January 2003): 29–32. http://dx.doi.org/10.1080/00185860309598025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bläser, Markus, Andreas Jakoby, Maciej Liśkiewicz, and Bodo Manthey. "Privacy in Non-private Environments." Theory of Computing Systems 48, no. 1 (October 16, 2009): 211–45. http://dx.doi.org/10.1007/s00224-009-9243-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zamoshkin, Iu A. "Private Life, Private Interest, Private Property." Russian Studies in Philosophy 31, no. 1 (July 1992): 49–86. http://dx.doi.org/10.2753/rsp1061-1967310149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zamoshkin, Iu A. "Private Life, Private Interest, Private Property." Russian Social Science Review 33, no. 6 (November 1992): 14–48. http://dx.doi.org/10.2753/rss1061-1428330614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Black, Kenneth. "Private Equity & Private Suits: Using 10B-5 Antifraud Suits to Discipline a Transforming Industry." Michigan Business & Entrepreneurial Law Review, no. 2.2 (2013): 271. http://dx.doi.org/10.36639/mbelr.2.2.private.

Full text
Abstract:
This note demonstrates why private equity will no longer be able to avoid private investor suits as it has (mostly) done in the past and explores the industry’s response to a growing number of investor suits. Notably, the industry has already begun to shift its strategy from regulatory avoidance to regulatory capture, at least in part to avoid investor suits. Given these changes, this note proposes that the best way to maintain discipline in the transforming private equity market is to protect the ability of investors to bring private suits.
APA, Harvard, Vancouver, ISO, and other styles
10

O’Brien, Raymond. "Private Caregiver Presumption For Elder Caregivers." University of Michigan Journal of Law Reform, no. 56.2 (2023): 345. http://dx.doi.org/10.36646/mjlr.56.2.private.

Full text
Abstract:
The percentage of older Americans increases each year, with a corresponding percentage increase of those considered the older old. Many older persons will develop chronic conditions, decreasing their ability to manage the activities of daily living and requiring many to move into assisted living facilities or group homes. When surveyed, a majority of people expressed that they wish to age in their own homes, and government programs are increasingly supportive of this option. This is a viable option for many if they have the assistance of private caregivers—who provide a vast array of support services—and essential person-to-person human contact during the last years of life. Not all caregivers are family; many are friends, partners, and former colleagues. Whether family or nonfamily, private caregivers often provide a recipient with self-sufficiency for many years, and for some until death. This Article discusses the statistics of aging and the obstacles faced by private caregivers who suffer economic deprivation as a result of the time and expense expended on behalf of an elder recipient. Presumptions, statutes, and the process of estate devolution work against compensation for a private caregiver. There is far too little recognition of what is contributed when a person feeds, bathes, administers medications, provides companionship, and confronts the bureaucracy meant to help the old. The common sentiment of all caregivers would be that they do it because they feel they must. But upon the death of the recipient, one person should not walk away with the benefits of the decedent’s estate and the other with nothing except the recognition of what they must do and did. To better provide for the equal treatment of private caretakers, this Article posits the creation of a private caretaker presumption in favor of elder caregivers. This presumption would apply to any person who dedicates himself or herself another’s care for a period of time sufficient to engender economic benefit to the recipient’s estate and a concomitant loss to the caregiver. Then, based upon the estate assets available, the parameters of the claim, and defined mitigating factors, a presumption is raised that the caregiver may file a creditor claim against the estate in an amount that would make the caregiver equal to the other objects of the decedent’s bounty. Existing remedies are insufficient; more is needed to promote equity.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Private"

1

Loesing, Karsten. "Privacy-enhancing technologies for private services." Bamberg Univ. of Bamberg Press, 2009. http://d-nb.info/994593937/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Diel, Jochen Nicolas. "Private Equity Infrastruktur als alternative Anlagemöglichkeiten für privates Kapital /." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/02607075002/$FILE/02607075002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stewart, Michael Clark. "How Private is Private?: Effects of Degree of Information Sharing on Group Ideation." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23238.

Full text
Abstract:
Many Computer-Supported Cooperative Work (CSCW) applications go to great lengths to maximize transparency by making available participants\' actions and respective application states to all others in real-time. Designers might intend to enhance coordination through increased transparency, but what other outcomes might be influenced by these choices? We developed two versions of a CSCW application to support a group idea generation task for collocated groups. One version had diminished transparency in comparison to the other. We studied the effects of this varied transparency on the groups\' generativity and collaboration. We found that in modulating transparency there was a trade-off between generativity and collaboration. Groups with diminished transparency felt that their groupmates built on their ideas more, but groups with increased transparency were more generative. These findings are tentative but suggest that the full story of group vs. solitary, private vs. public manipulations of technology, at least in the area of idea generation, is not yet sufficiently theorized or understood.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
4

Halvarsson, Niklas. "Privatisering av svensk säkerhet : Vilka faktorer driver expansionen av privata säkerhetsföretag?" Thesis, Försvarshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1431.

Full text
Abstract:
Sedan kalla krigets slut har en ny typ av aktör dykt upp i internationella konflikter och krig världen över. Denna aktör är privata företag som i dagsläget erbjuder allt från supplementär logistik till att helt ersätta nationella arméer. Utgångspunkten i denna uppsats är att ta reda på vilka faktorer som har skapat en marknad för dessa företag generellt, samt vilka av dessa faktorer som kan förklara framväxten i Sverige specifikt. I uppsatsen undersöks befintlig forskning kring vad som drivit utvecklingen. Därefter kommer befintlig teori att prövas som förklaringsmodell för expansionen i Sverige. Den befintliga teorin som prövats på Sverige består av sju faktorer beskrivandes politiska och samhälleliga förutsättningar vilka förklarar expansionen. Av dessa återfinns samtliga i Sverige, men genom en analys av deras respektive giltighet i svensk kontext uppstår en mer nyanserad bild, där endast fyra av faktorerna är relevanta som förklaringar. Dessa är en transformation av försvarets fokus och organisation, en politisk trend av privatisering samt ett överflöd av militärt utbildad personal utan sysselsättning. Av dessa är den förstnämnda den starkaste katalysatorn medan den sistnämnda endast i viss mån påverkar den redan pågående expansionen.
Since the end of the Cold War a new phenomenon has shown in international conflict and war, worldwide. This phenomenon is the private companies nowadays offering supplementary logistics, armed troops to the front and everything in between. This essay aims to identify which factors that have contributed to the creating of a market for these companies in general, and which of these that can explain the growth of Swedish companies in particular. In the essay previous research on the topic of privatization of security are examined and thereafter applied onSwedenin order to examine to what extent it can be used to explain the changes inSweden. The existent theory applied onSwedenconsists of seven factors, describing political and social basis, which explain the expansion. All of these are found in Sweden, however, through a further analysis of their individual relevance, a more nuanced result can be seen, whereas only four out of seven are relevant as explanations. These are a transformation in defence focus and organization, a political trend of privatization and a flood of trained unemployed military personnel. The first one of these is the strongest catalyst for expansion while the latter only to a certain degree reinforces the already ongoing process.
APA, Harvard, Vancouver, ISO, and other styles
5

Loesing, Karsten [Verfasser]. "Privacy-enhancing technologies for private services / von Karsten Loesing." Bamberg : Univ. of Bamberg Press, 2009. http://d-nb.info/994593937/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tuomisto, Tino, Adrian Ringström, and Aleksi Vekki. "Is your privacy private on mobile social media platforms?" Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96089.

Full text
Abstract:
Purpose: The purpose of this paper is to explain the effect of trust, knowledge, and control on privacy concerns on mobile social media platforms. Methodology: This paper used a quantitative research approach with a Cross Sectional Research Design, in form of a survey, to collect a number of 76 responses. The sample consisted primarily of swedish respondents in the ages of 18-25 with high school education living in a household earning below 19 999 SEK. Findings: Our study found significant negative relationships between trust and privacy concerns and knowledge and privacy concerns. This furthers the research field for trust that Milne and Boza (1999), Proudfoot, et al. (2018) and Wenjing and Kavita (2019) laid the foundation on. This also applies to knowledge, by confirming the results of Smit, Van Noor and Voorveld (2014) and Aguirre, et al. (2016). We provide a model where trust and knowledge is described to negatively affect privacy concerns on mobile social media. We also document a so-called privacy paradox from the results. Research Implications: Our results suggest that in order for managers to reduce privacy concerns on mobile social media platforms, increasing the levels of trust or knowledge can moderately alleviate such concerns. Knowledge to a slightly larger degree than trust. However, for such companies to customize visible cues only to appear reliable, as per Aguirre, et al (2015), can thereby be argued of little use as this would have little impact on the level of privacy concern displayed in mobile social media users. Originality/Value: This paper tests findings from Nowak and Phelps (1995), Milne and Boza (1999), Taylor, Davis and Jillapalli (2009), Smit, Van Noor and Voorveld (2014), Gu, et al. (2017), Proudfoot, et al. (2018), Nam (2018) and Wenjing and Kavita (2019) within a previously yet to be tested context, mobile social media platforms. Keywords: Privacy, Concerns, Violations, Social Media, Mobile, Platforms, Facebook, Trust, Knowledge, Control
APA, Harvard, Vancouver, ISO, and other styles
7

Siemes, Marc. "Going private unter Beteiligung von Finanzinvestoren in Deutschland /." Wiesbaden : Dt. Univ.-Verl, 2003. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=010250240&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Quazzo, Dante. "Examining Gains in Operational Efficiency in Public-to-Private and Private-to-Private Transactions." Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/cmc_theses/1000.

Full text
Abstract:
Using private firm financial data, I compare operational improvements in public-to-private and private-to-private leveraged transactions in Western Europe between 2003 and 2010. Results are consistent with the recent literature and find operational gains to be significantly smaller then when buyouts were originally analyzed by Jensen (1989) and Kaplan (1989). Public firms experience an increase in raw EBITDA margin of 7.2 percentage points three years post-buyout, while a doubling of firm size yields an increase in EBITDA margin of 4.6 percentage points in year three post-buyout. Using industry-adjusted data, prior corporate form is positive and significant in year two post-buyout. Contrary to prior literature’s expectations, governance state does not impact increases in net profit margin or return on assets. My analysis offers support for the free cash flow theory, as the positive and significant effect of a public structure on EBITDA margin suggests that public firms have greater growth potential for private equity investors and more agency costs than their private counterparts.
APA, Harvard, Vancouver, ISO, and other styles
9

Dunar, Charles J. Mitchell Jared L. Robbins Donald L. "Private military industry analysis private and public companies /." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FDunar%5FMBA.pdf.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2007."
Advisor(s): Dew, Nicholas ; Hudgens, Bryan J. "December 2007." "MBA professional report"--Cover. Description based on title screen as viewed on January 10, 2008. Includes bibliographical references (p. 87-127). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
10

Dunar, Charles J., Donald L. Robbins, and Jared L. Mitchell. "Private military industry analysis: private and public companies." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/10195.

Full text
Abstract:
MBA Professional Report
Approved for public release; distribution is unlimited
Since the end of the Cold War, the Private Military Industry has skyrocketed. This study gathers, compiles and examines demographic and financial information on 585 private and public companies that operate in the Private Military Industry. The demographic analysis reveals that an overwhelming majority of firms are privately held and offered no financial information. Firm inception dates are closely correlated with past and current world events. Majority of the private firms founders have military or government backgrounds and are located in the United States and United Kingdom. Using Singer's and Avant's classification of the Private Military Industry, the study determines that most firms are not restricted to one classification as they operate in more then one arena. The analysis of public firms reveals that revenues and profits have been increasing steadily since 2003 as well as operating expenses, shrinking profit margins. The public firm analysis presents the financial relationships between the Initial Public Offerings, locations, and employee numbers to the success of the companies. Overall this study and the analysis of the Private Military Firms offer insight into the prevalence of the Private Military Industry in the business world and how financially rewarding it can be.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Private"

1

Carvajal, Nelson Maica. Private! Caracas: [N. Maica Carvajal], 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

James, Patterson. Private. New York: Little, Brown and Co., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ribeiro, Fernando J. Private. Portugal]: IN.TRANSIT editions, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

James, Patterson. Private. New York: Little, Brown and Company, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Costanzo, Saverio. Private. Venezia: Marsilio, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

James, Patterson. Private. New York: Little, Brown and Co., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

James, Patterson. Private. New York: Little, Brown and Co., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hirte, Heribert, and Christoph Teichmann, eds. The European Private Company - Societas Privata Europaea (SPE). Berlin, Boston: DE GRUYTER, 2012. http://dx.doi.org/10.1515/9783110260458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ebbing, Frank. Private Zivilgerichte: Möglichkeiten und Grenzen privater (schiedsgerichtlicher) Zivilrechtsprechung. München: Beck, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gasser, Bruno. Bruno Gasser: Private view, Werke in privaten Sammlungen. Zürich: Verlag Scheidegger & Spiess, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Private"

1

Kanterian, Edward. "Privacy and Private Language." In A Companion to Wittgenstein, 443–64. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118884607.ch28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stirnemann, Patricia. "Private Libraries Privately Made." In Medieval Manuscripts, Their Makers and Users, 185–98. Turnhout: Brepols Publishers, 2011. http://dx.doi.org/10.1484/m.stpmsbh-eb.1.100065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weik, Martin H. "private." In Computer Science and Communications Dictionary, 1334. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reddy, Moola Atchi. "Private." In East India Company and Trade in South India, 107–35. London: Routledge India, 2023. http://dx.doi.org/10.4324/9781003432494-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bläser, Markus, Andreas Jakoby, Maciej Liśkiewicz, and Bodo Manthey. "Privacy in Non-private Environments." In Advances in Cryptology - ASIACRYPT 2004, 137–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30539-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lapidus, John. "Private Provision and Private Funding." In The Quest for a Divided Welfare State, 33–48. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24784-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sack, Detlef. "Public Private Partnership/Öffentlich-Private Partnerschaften." In Handbuch zur Verwaltungsreform, 275–84. Wiesbaden: Springer Fachmedien Wiesbaden, 2019. http://dx.doi.org/10.1007/978-3-658-21563-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sack, Detlef. "Public Private Partnership/Öffentlich-Private Partnerschaften." In Handbuch Organisationssoziologie, 1–11. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-21571-2_25-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tuckett, Angela. "Private Railways Versus Private Road Haulage." In The Scottish Carter, 218–44. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003470168-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Benölken, Heinz, Emma Gerber, and Reinhard M. Skudlik. "Private Unternehmenskunden." In Versicherungsvertrieb im Wandel, 115–18. Wiesbaden: Gabler Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-91304-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Private"

1

Ukil, Arijit, Soma Bandyopadhyay, and Arpan Pal. "IoT-Privacy: To be private or not to be private." In IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2014. http://dx.doi.org/10.1109/infcomw.2014.6849186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chaves, Iago, and Javam Machado. "Differentially Private Group-by Data Releasing Algorithm." In XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.

Full text
Abstract:
Privacy concerns are growing fast because of data protection regulations around the world. Many works have built private algorithms avoiding sensitive information leakage through data publication. Differential privacy, based on formal definitions, is a strong guarantee for individual privacy and the cutting edge for designing private algorithms. This work proposes a differentially private group-by algorithm for data publication under the exponential mechanism. Our method publishes data groups according to a specified attribute while maintaining the desired privacy level and trustworthy utility results.
APA, Harvard, Vancouver, ISO, and other styles
3

He, Kevin, Fedor Sandomirskiy, and Omer Tamuz. "Private Private Information." In EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Drozdova, Alla, and Natalia Stepanova. "Private/Public Space of New Media." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-51.

Full text
Abstract:
Today, we have a situation that the new media environment has reshaped our conception of reality while changing social spaces, modes of existence, and the functional mechanisms of the private sphere. In the space of new media, the boundary between privacy and publicity is redefined with the emergence of multiple network communities having become a subject of observation and evaluation, collective discussions, and even third party interventions. In the current situation, the privacy/publicity boundary can be defined both through the societal/the individual, and through such concepts as visible/invisible. The new media era sees the personification of online publicness, therefore the very sphere of private life gets consumed by the public sphere open both for being discussed and for being controlled by the government, market, and advertisement. The public sphere has fallen under the power of certain private/vested interests, which only transiently become common, coinciding with the interests of other groups, but not the public sphere. The ambivalent nature of new media, while based on personalisation and filtration, obviously determines the ambiguous and controversial relationship of the public and the private. Thus, the private not only reflects, but also represents the public, whereas the public implements privacy up to its inherent special intimate atmosphere and intonation. This fast-changing virtual reality requires the development of conceptual tools for analysing new content and forms of social and personal life, one of which is the relationship between publicity and privacy.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Bochao, Pengju Wang, Shikun Li, Dan Zeng, and Shiming Ge. "Model Conversion via Differentially Private Data-Free Distillation." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/243.

Full text
Abstract:
While massive valuable deep models trained on large-scale data have been released to facilitate the artificial intelligence community, they may encounter attacks in deployment which leads to privacy leakage of training data. In this work, we propose a learning approach termed differentially private data-free distillation (DPDFD) for model conversion that can convert a pretrained model (teacher) into its privacy-preserving counterpart (student) via an intermediate generator without access to training data. The learning collaborates three parties in a unified way. First, massive synthetic data are generated with the generator. Then, they are fed into the teacher and student to compute differentially private gradients by normalizing the gradients and adding noise before performing descent. Finally, the student is updated with these differentially private gradients and the generator is updated by taking the student as a fixed discriminator in an alternate manner. In addition to a privacy-preserving student, the generator can generate synthetic data in a differentially private way for other down-stream tasks. We theoretically prove that our approach can guarantee differential privacy and well convergence. Extensive experiments that significantly outperform other differentially private generative approaches demonstrate the effectiveness of our approach.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Wenhao, Shaoyang Song, and Chunlai Zhou. "Generate Synthetic Text Approximating the Private Distribution with Differential Privacy." In Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. California: International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/735.

Full text
Abstract:
Due to the potential leakage of sensitive information in text, there is a societal call for feeding privacy-preserving text to model training. Recently, a lot of work showed that using synthetic text with differential privacy, rather than private text, can provide a strong privacy protection. However, achieving higher semantic similarity between synthetic and private text has not been thoroughly investigated. In this paper, we propose an approach that combines the iteratively optimized mindset from genetic algorithms to align the distribution of synthetic text with that of private text. Furthermore, not only does the final synthetic text meet the requirements of privacy protection, but also has a high level of quality. Through comparisons with various baselines on different datasets, we demonstrate that our synthetic text can closely match the utility of private text, while providing privacy protection standards robust enough to resist membership inference attacks from malicious users.
APA, Harvard, Vancouver, ISO, and other styles
7

Inan, Ali, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino. "Private record matching using differential privacy." In the 13th International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1739041.1739059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

A. Hayek, Frederic, Mirko Koscina, Pascal Lafourcade, and Charles Olivier-Anclin. "Generic Privacy Preserving Private Permissioned Blockchains." In SAC '23: 38th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3555776.3577735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yu, Da, Huishuai Zhang, Wei Chen, Jian Yin, and Tie-Yan Liu. "Gradient Perturbation is Underrated for Differentially Private Convex Optimization." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/431.

Full text
Abstract:
Gradient perturbation, widely used for differentially private optimization, injects noise at every iterative update to guarantee differential privacy. Previous work first determines the noise level that can satisfy the privacy requirement and then analyzes the utility of noisy gradient updates as in the non-private case. In contrast, we explore how the privacy noise affects the optimization property. We show that for differentially private convex optimization, the utility guarantee of differentially private (stochastic) gradient descent is determined by an expected curvature rather than the minimum curvature. The expected curvature, which represents the average curvature over the optimization path, is usually much larger than the minimum curvature. By using the expected curvature, we show that gradient perturbation can achieve a significantly improved utility guarantee that can theoretically justify the advantage of gradient perturbation over other perturbation methods. Finally, our extensive experiments suggest that gradient perturbation with the advanced composition method indeed outperforms other perturbation approaches by a large margin, matching our theoretical findings.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Jingcheng, and Kunal Talwar. "Private selection from private candidates." In STOC '19: 51st Annual ACM SIGACT Symposium on the Theory of Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3313276.3316377.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Private"

1

Morgan, Keith, Kory Edward Wegmeyer, and Ryan Daniel Iverson. Private Cloud. Office of Scientific and Technical Information (OSTI), November 2018. http://dx.doi.org/10.2172/1482905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hart, Oliver, David Thesmar, and Luigi Zingales. Private Sanctions. Cambridge, MA: National Bureau of Economic Research, December 2022. http://dx.doi.org/10.3386/w30728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dunar, III, Mitchell Charles J., Robbins Jared L., and Donald L. III. Private Military Industry Analysis: Private and Public Companies. Fort Belvoir, VA: Defense Technical Information Center, December 2007. http://dx.doi.org/10.21236/ada475797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jha, Somesh, Vitaly Shmatikov, and Matthew Fredrikson. Private Information Retrieval. Fort Belvoir, VA: Defense Technical Information Center, December 2010. http://dx.doi.org/10.21236/ada536856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Williams, Noah. Persistent Private Information. Cambridge, MA: National Bureau of Economic Research, March 2008. http://dx.doi.org/10.3386/w13894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Syverson, Paul F., Michael G. Reed, and David M. Goldschlag. Private Web Browsing. Fort Belvoir, VA: Defense Technical Information Center, June 1997. http://dx.doi.org/10.21236/ada464972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sorensen, Morten, Neng Wang, and Jinqiang Yang. Valuing Private Equity. Cambridge, MA: National Bureau of Economic Research, November 2013. http://dx.doi.org/10.3386/w19612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Delestre, Isaac. Private pensions explained. The IFS, March 2023. http://dx.doi.org/10.1920/ex.ifs.2023.0003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Martin, Dougal, Juan José Durante, and Ben Rowland. Belize: A Private Sector Assessment: Private Sector Development Discussion Paper #6. Inter-American Development Bank, December 2010. http://dx.doi.org/10.18235/0006918.

Full text
Abstract:
Two basic factors shape private sector development in Belize. First, the population is small - only 322,000 as of mid-2008. This limits the size of the domestic market and potential economies of scale. The economy was only US$1.3 billion in 2009 and diversification is limited. The economy depends strongly on trade with the world economy, both as a market for domestic produce and as a source of the wide range of products that would be costly or impossible to produce domestically. Aside from Caribbean micro-states, Belize is the fourth most open economy in Latin America and the Caribbean (Figure 1). Any strategy to promote private sector development has to recognize that growth will continue to be export-led. The purpose of this study has been to describe Belize's private sector which accounts for roughly two-thirds of the economy.
APA, Harvard, Vancouver, ISO, and other styles
10

Fox, B., and B. Gleeson. Virtual Private Networks Identifier. RFC Editor, September 1999. http://dx.doi.org/10.17487/rfc2685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography