Academic literature on the topic 'Text privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Text privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Text privacy"
Kanyar, Mohammad Naeem. "Differential Privacy “Working Towards Differential Privacy for Sensitive Text “." International Journal of Engineering and Computer Science 12, no. 04 (April 2, 2023): 25691–99. http://dx.doi.org/10.18535/ijecs/v12i04.4727.
Full textShree, A. N. Ramya, and Kiran P. "Privacy Preserving Text Document Summarization." Journal of Engineering Research and Sciences 1, no. 7 (July 2022): 7–14. http://dx.doi.org/10.55708/js0107002.
Full textBihani, Geetanjali. "Interpretable Privacy Preservation of Text Representations Using Vector Steganography." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (June 28, 2022): 12872–73. http://dx.doi.org/10.1609/aaai.v36i11.21573.
Full textDopierała, Renata. "Społeczne wyobrażenia prywatności." Kultura i Społeczeństwo 50, no. 1-2 (March 30, 2006): 307–19. http://dx.doi.org/10.35757/kis.2006.50.1-2.14.
Full textLiang, Zi, Pinghui Wang, Ruofei Zhang, Nuo Xu, Shuo Zhang, Lifeng Xing, Haitao Bai, and Ziyang Zhou. "MERGE: Fast Private Text Generation." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 18 (March 24, 2024): 19884–92. http://dx.doi.org/10.1609/aaai.v38i18.29964.
Full textWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau, and Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification." Applied Sciences 12, no. 21 (November 4, 2022): 11177. http://dx.doi.org/10.3390/app122111177.
Full textPang, Hweehwa, Jialie Shen, and Ramayya Krishnan. "Privacy-preserving similarity-based text retrieval." ACM Transactions on Internet Technology 10, no. 1 (February 2010): 1–39. http://dx.doi.org/10.1145/1667067.1667071.
Full textZhu, You-wen, Liu-sheng Huang, Dong Li, and Wei Yang. "Privacy-preserving Text Information Hiding Detecting Algorithm." Journal of Electronics & Information Technology 33, no. 2 (March 4, 2011): 278–83. http://dx.doi.org/10.3724/sp.j.1146.2010.00375.
Full textTejaswini, G. "Cipher Text Policy Privacy Attribute-Based Security." International Journal of Reliable Information and Assurance 5, no. 1 (July 30, 2017): 15–20. http://dx.doi.org/10.21742/ijria.2017.5.1.03.
Full textXiong, Xingxing, Shubo Liu, Dan Li, Jun Wang, and Xiaoguang Niu. "Locally differentially private continuous location sharing with randomized response." International Journal of Distributed Sensor Networks 15, no. 8 (August 2019): 155014771987037. http://dx.doi.org/10.1177/1550147719870379.
Full textDissertations / Theses on the topic "Text privacy"
Aryasomayajula, Naga Srinivasa Baradwaj. "Machine Learning Models for Categorizing Privacy Policy Text." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535633397362514.
Full textHammoud, Khodor. "Trust in online data : privacy in text, and semantic-based author verification in micro-messages." Electronic Thesis or Diss., Université Paris Cité, 2021. http://www.theses.fr/2021UNIP5203.
Full textMany Problems surround the spread and use of data on social media. There is a need to promote trust on social platforms, regarding the sharing and consumption of data. Data online is mostly in textual form which poses challenges for automation solutions because of the richness of natural language. In addition, the use of micro-messages as the main means of communication on social media makes the problem much more challenging because of the scarceness of features to analyze per body of text. Our experiments show that data anonymity solutions cannot preserve user anonymity without sacrificing data quality. In addition, in the field of author verification, which is the problem of determining if a body of text was written by a specific person or not, given a set of documents known to be authored by them, we found a lack of research working with micro-messages. We also noticed that the state-of-the-art does not take text semantics into consideration, making them vulnerable to impersonation attacks. Motivated by these findings, we devote this thesis to tackle the tasks of (1) identifying the current problems with user data anonymity in text, and provide an initial novel semantic-based approach to tackle this problem, (2) study author verification in micro-messages and identify the challenges in this field, and develop a novel semantics-based approach to solve these challenges, and (3) study the effect of including semantics in handling manipulation attacks, and the temporal effect of data, where the authors might have changing opinions over time. The first part of the thesis focuses on user anonymity in textual data, with the aim to anonymize personal information from online user data for safe data analysis without compromising users’ privacy. We present an initial novel semantic-based approach, which can be customized to balance between preserving data quality and maximizing user anonymity depending on the application at hand. In the second part, we study author verification in micro-messages on social media. We confirm the lack of research in author verification on micro-messages, and we show that the state-of-the-art, which primarily handles long and medium-sized texts, does not perform well when applied on micro-messages. Then we present a semantics-based novel approach which uses word embeddings and sentiment analysis to collect the author’s opinion history to determine the correctness of the claim of authorship, and show its competitive performance on micro-messages. We use these results in the third part of the thesis to further improve upon our approach. We construct a dataset consisting of the tweets of the 88 most followed twitter influencers. We use it to show that the state-of-the-art is not able to handle impersonation attacks, where the content of a tweet is altered, changing the message behind the tweet, while the writing pattern is preserved. On the other hand, since our approach is aware of the text’s semantics, it is able to detect text manipulations with an accuracy above 90%. And in the fourth part of the thesis, we analyze the temporal effect of data on our approach for author verification. We study the change of authors’ opinions over time, and how to accommodate for that in our approach. We study trends of sentiments of an author per a specific topic over a period of time, and predict false authorship claims depending on what timeframe does the claim of authorship fall in
Connelly, Eric M. "[Redacted Text] and Surveillance: An Ideographic Analysis of the Struggle between National Security and Privacy." Digital Archive @ GSU, 2010. http://digitalarchive.gsu.edu/communication_theses/66.
Full textRekanar, Kaavya. "Text Classification of Legitimate and Rogue online Privacy Policies : Manual Analysis and a Machine Learning Experimental Approach." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-13363.
Full textMysore, Gopinath Abhijith Athreya. "Automatic Detection of Section Title and Prose Text in HTML Documents Using Unsupervised and Supervised Learning." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535371714338677.
Full textLiu, Meng-Chang. "Achieving privacy-preserving distributed statistical computation." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/achieving-privacypreserving-distributed-statistical-computation(6831db5c-d605-4a38-9711-7592d2b94e01).html.
Full textSteiner, Wolfgang Ernst. "Justifying limitations on privacy: the influence of the proportionality test in South African and German law." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/4738.
Full textBaldwin, Lind Paula. "Looking for privacy in Shakespeare : woman's place and space in a selection of plays and early modern texts." Thesis, University of Birmingham, 2015. http://etheses.bham.ac.uk//id/eprint/5848/.
Full textChow, Mark A. (Mark Andrew) 1972. "A rating system to test private investment decisions in public infrastructure projects." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50511.
Full textIncludes bibliographical references (p. 167-168).
This thesis will develop a basic method to evaluate the overall quality of proposed infrastructure projects for private sector financial investment. INFRATEST is meant to aid both potential private infrastructure developers and public entities, which desire to privatize certain infrastructure projects, in selection of the most appropriate infrastructure projects to benefit from the advantages of free enterprise. INFRATEST is premised on 15 equally-weighted factors which represent the major components that affect overall infrastructure project economic, financial, and technical viability. Associated with each of the 15 factors are indicators which measure the important aspects of their respective factors. There are 31 indicators in all and they are evaluated on a numerical scale of one to ten. Factor scores are determined from indicator value averages. INFRATEST can serve the private developer and the public entity by providing an information base for deciding which privately funded infrastructure development proposals deserve consideration in the capital markets and for deciding which proposed infrastructure projects are to be developed with public or private funds. Application of INFRATEST to two real-world project proposals, the SAVE project and the Northumberland Bridge project, demonstrated the method's ease and universality of application as well as the method's simple and clear conclusions.
by Mark A. Chow.
S.M.
Brodin, Gustav. "Privatekonomi i läroböcker : En läroboksstudie i samhällsvetenskap om privatekonomins kvantitet och innehåll." Thesis, Karlstads universitet, Institutionen för samhälls- och kulturvetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-28147.
Full textThe debts of children and teenagers that are registered at the Swedish Enforcement Authority, have in the past few years hit an all-time high. School has a responsibility to try and stop this disturbing development. This essay is about private economy and its existence in three different textbooks for civics 1A1 and the Swedish high school. The goal is to investigate which support these books can give teachers and students. Private economy is a recent addition to the Swedish teaching program 2011 and is now read by all high school students. I have been able to identify the existence of private economy in textbooks by creating a code schedule. This way I have been able to decide the quantitative by simply counting words. The review is categorical in two parts where the second part illuminating the content and tries to make conclusions by different types of text analyses. The conclusion of this essay is that the books have its differences, both strengths and weaknesses. It is mostly the use of language that differs. A textbook in civics does not demand great text understanding. Two of the books handle this well, while the third one does not.
Books on the topic "Text privacy"
Aryeh Greenfield-A.G. Publications (Israel), ed. Protection of Privacy: Full text English translation of the Protection of Privacy Law 5741-1981 and of relevant subsidiary legislation correct as of November 1, 2011. 6th ed. Haifa, Israel]: Aryeh Greenfield-A.G. Publications, 2011.
Find full textUnited States. Federal Aviation Administration., ed. Private pilot test guide. Renton, Wash: Aviation Supplies & Academics, 1992.
Find full textBenson, Peter. Theory of private law: Selected topics and text. Toronto]: Faculty of Law, University of Toronto, 2013.
Find full textUnited States. Health Care Financing Administration. Medicare and private health insurance: A training text. Baltimore, Maryland?]: U.S. Department of Health and Human Services, Health Care Financing Administration, 1985.
Find full textBenson, Peter. Theory of private law: Selected topics and text. Toronto]: Faculty of Law, University of Toronto, 2014.
Find full textBenson, Peter. Theory of private law: Selected topics and text. Toronto]: Faculty of Law, University of Toronto, 2010.
Find full textUnited States. Federal Aviation Administration. Office of Flight Standards., ed. Private pilot: Practical test standards. Washington, DC: U.S. Dept. of Transportation, Federal Aviation Administration, Office of Flight Standards, 1987.
Find full textUnited States. Federal Aviation Administration. Office of Flight Standards Service., ed. Private pilot: Practical test standards. Washington, DC: Flight Standards Service, 1995.
Find full textUnited States. Federal Aviation Administration. Office of Flight Standards Service., ed. Private pilot: Practical test standards. Washington, DC: Flight Standards Service, 1995.
Find full textMcCarthy, Steven J. Unbroken record: Electronic communication, forever undigitized. Falcon Heights, Minnesota]: Steven McCarthy, 2014.
Find full textBook chapters on the topic "Text privacy"
Salomon, David. "Data Hiding in Text." In Data Privacy and Security, 245–67. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9_11.
Full textHart, Michael, Pratyusa Manadhata, and Rob Johnson. "Text Classification for Data Loss Prevention." In Privacy Enhancing Technologies, 18–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22263-4_2.
Full textGarg, Vaibhav, L. Jean Camp, Katherine Connelly, and Lesa Lorenzen-Huber. "Risk Communication Design: Video vs. Text." In Privacy Enhancing Technologies, 279–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31680-7_15.
Full textDanezis, George, Claudia Diaz, Carmela Troncoso, and Ben Laurie. "$\text{Drac}$ : An Architecture for Anonymous Low-Volume Communications." In Privacy Enhancing Technologies, 202–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14527-8_12.
Full textMüller, Nicolas M., Daniel Kowatsch, Pascal Debus, Donika Mirdita, and Konstantin Böttinger. "On GDPR Compliance of Companies’ Privacy Policies." In Text, Speech, and Dialogue, 151–59. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27947-9_13.
Full textHaralabopoulos, Giannis, Mercedes Torres Torres, Ioannis Anagnostopoulos, and Derek McAuley. "Privacy-Preserving Text Labelling Through Crowdsourcing." In Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops, 431–45. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79157-5_35.
Full textManzanares-Salor, Benet, David Sánchez, and Pierre Lison. "Automatic Evaluation of Disclosure Risks of Text Anonymization Methods." In Privacy in Statistical Databases, 157–71. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13945-1_12.
Full textDalianis, Hercules. "Ethics and Privacy of Patient Records for Clinical Text Mining Research." In Clinical Text Mining, 97–108. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78503-5_9.
Full textFernandes, Natasha, Mark Dras, and Annabelle McIver. "Generalised Differential Privacy for Text Document Processing." In Lecture Notes in Computer Science, 123–48. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17138-4_6.
Full textAlnasser, Walaa, Ghazaleh Beigi, and Huan Liu. "Privacy Preserving Text Representation Learning Using BERT." In Social, Cultural, and Behavioral Modeling, 91–100. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80387-2_9.
Full textConference papers on the topic "Text privacy"
Xu, Qiongkai, Lizhen Qu, Chenchen Xu, and Ran Cui. "Privacy-Aware Text Rewriting." In Proceedings of the 12th International Conference on Natural Language Generation. Stroudsburg, PA, USA: Association for Computational Linguistics, 2019. http://dx.doi.org/10.18653/v1/w19-8633.
Full textPonomareva, Natalia, Jasmijn Bastings, and Sergei Vassilvitskii. "Training Text-to-Text Transformers with Privacy Guarantees." In Proceedings of the Fourth Workshop on Privacy in Natural Language Processing. Stroudsburg, PA, USA: Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.privatenlp-1.4.
Full textPonomareva, Natalia, Jasmijn Bastings, and Sergei Vassilvitskii. "Training Text-to-Text Transformers with Privacy Guarantees." In Findings of the Association for Computational Linguistics: ACL 2022. Stroudsburg, PA, USA: Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.findings-acl.171.
Full textBeigi, Ghazaleh, Kai Shu, Ruocheng Guo, Suhang Wang, and Huan Liu. "Privacy Preserving Text Representation Learning." In HT '19: 30th ACM Conference on Hypertext and Social Media. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3342220.3344925.
Full textYue, Xiang, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, and Sherman S. M. Chow. "Differential Privacy for Text Analytics via Natural Text Sanitization." In Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021. Stroudsburg, PA, USA: Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.findings-acl.337.
Full textCoavoux, Maximin, Shashi Narayan, and Shay B. Cohen. "Privacy-preserving Neural Representations of Text." In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Stroudsburg, PA, USA: Association for Computational Linguistics, 2018. http://dx.doi.org/10.18653/v1/d18-1001.
Full textBasu, Priyam, Tiasa Singha Roy, Rakshit Naidu, and Zumrut Muftuoglu. "Privacy enabled Financial Text Classification using Differential Privacy and Federated Learning." In Proceedings of the Third Workshop on Economics and Natural Language Processing. Stroudsburg, PA, USA: Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.econlp-1.7.
Full textLi, Yitong, Timothy Baldwin, and Trevor Cohn. "Towards Robust and Privacy-preserving Text Representations." In Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). Stroudsburg, PA, USA: Association for Computational Linguistics, 2018. http://dx.doi.org/10.18653/v1/p18-2005.
Full textAdelani, David Ifeoluwa, Ali Davody, Thomas Kleinbauer, and Dietrich Klakow. "Privacy Guarantees for De-Identifying Text Transformations." In Interspeech 2020. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/interspeech.2020-2208.
Full textCostantino, Gianpiero, Antonio La Marra, Fabio Martinelli, Andrea Saracino, and Mina Sheikhalishahi. "Privacy-preserving text mining as a service." In 2017 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2017. http://dx.doi.org/10.1109/iscc.2017.8024639.
Full textReports on the topic "Text privacy"
Cantor, Amy G., Rebecca M. Jungbauer, Andrea C. Skelly, Erica L. Hart, Katherine Jorda, Cynthia Davis-O'Reilly, Aaron B. Caughey, and Ellen L. Tilden. Respectful Maternity Care: Dissemination and Implementation of Perinatal Safety Culture To Improve Equitable Maternal Healthcare Delivery and Outcomes. Agency for Healthcare Research and Quality (AHRQ), January 2024. http://dx.doi.org/10.23970/ahrqepccer269.
Full textAndrabi, Tahir, Natalie Bau, Jishnu Das, and Asim I. Khwaja. Heterogeneity in School Value-Added and the Private Premium. Research on Improving Systems of Education (RISE), November 2022. http://dx.doi.org/10.35489/bsg-risewp_2022/116.
Full textAgüero, Jorge M., and Verónica Frisancho. Systematic Bias in Sensitive Health Behaviors and Its Impact on Treatment Effects: An Application to Violence against Women. Inter-American Development Bank, April 2017. http://dx.doi.org/10.18235/0007031.
Full textAndrabi, Tahir, Natalie Bau, Jishnu Das, Naureen Karachiwalla, and Asim I. Khwaja. Crowding in Private Quality: The Equilibrium Effects of Public Spending in Education. Research on Improving Systems of Education (RISE), January 2023. http://dx.doi.org/10.35489/bsg-rise-wp_2023/124.
Full textBonaldi, Pietro, and Mauricio Villamizar-Villegas. An Auction-Based Test of Private Information in an Interdealer FX Market. Bogotá, Colombia: Banco de la República, August 2018. http://dx.doi.org/10.32468/be.1049.
Full textBronnenberg, Bart, Jean-Pierre Dubé, and Robert Sanders. Consumer Misinformation and the Brand Premium: A Private Label Blind Taste Test. Cambridge, MA: National Bureau of Economic Research, November 2018. http://dx.doi.org/10.3386/w25214.
Full textAhwireng-Obeng, Asabea Shirley, and Frederick Ahwireng-Obeng. Private Philanthropic Cross-Border Flows and Sustainable Development in Africa. Centre on African Philanthropy and Social Investment, August 2011. http://dx.doi.org/10.47019/2021.ra1.
Full textGan, Li, Feng Huang, and Adalbert Mayer. A Simple Test of Private Information in the Insurance Markets with Heterogeneous Insurance Demand. Cambridge, MA: National Bureau of Economic Research, January 2011. http://dx.doi.org/10.3386/w16738.
Full textBorger, Michael, Gregory Elacqua, Isabel Jacas, Christopher Neilson, and Anne Sofie Westh Olsen. Report Cards: Parental Preferences, Information and School Choice in Haiti. Inter-American Development Bank, May 2023. http://dx.doi.org/10.18235/0004933.
Full textMoreno, Ángel Iván, and Teresa Caminero. Assessing the data challenges of climate-related disclosures in european banks. A text mining study. Madrid: Banco de España, September 2023. http://dx.doi.org/10.53479/33752.
Full text