Journal articles on the topic 'Text privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Text privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kanyar, Mohammad Naeem. "Differential Privacy “Working Towards Differential Privacy for Sensitive Text “." International Journal of Engineering and Computer Science 12, no. 04 (April 2, 2023): 25691–99. http://dx.doi.org/10.18535/ijecs/v12i04.4727.
Full textShree, A. N. Ramya, and Kiran P. "Privacy Preserving Text Document Summarization." Journal of Engineering Research and Sciences 1, no. 7 (July 2022): 7–14. http://dx.doi.org/10.55708/js0107002.
Full textBihani, Geetanjali. "Interpretable Privacy Preservation of Text Representations Using Vector Steganography." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (June 28, 2022): 12872–73. http://dx.doi.org/10.1609/aaai.v36i11.21573.
Full textDopierała, Renata. "Społeczne wyobrażenia prywatności." Kultura i Społeczeństwo 50, no. 1-2 (March 30, 2006): 307–19. http://dx.doi.org/10.35757/kis.2006.50.1-2.14.
Full textLiang, Zi, Pinghui Wang, Ruofei Zhang, Nuo Xu, Shuo Zhang, Lifeng Xing, Haitao Bai, and Ziyang Zhou. "MERGE: Fast Private Text Generation." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 18 (March 24, 2024): 19884–92. http://dx.doi.org/10.1609/aaai.v38i18.29964.
Full textWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau, and Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification." Applied Sciences 12, no. 21 (November 4, 2022): 11177. http://dx.doi.org/10.3390/app122111177.
Full textPang, Hweehwa, Jialie Shen, and Ramayya Krishnan. "Privacy-preserving similarity-based text retrieval." ACM Transactions on Internet Technology 10, no. 1 (February 2010): 1–39. http://dx.doi.org/10.1145/1667067.1667071.
Full textZhu, You-wen, Liu-sheng Huang, Dong Li, and Wei Yang. "Privacy-preserving Text Information Hiding Detecting Algorithm." Journal of Electronics & Information Technology 33, no. 2 (March 4, 2011): 278–83. http://dx.doi.org/10.3724/sp.j.1146.2010.00375.
Full textTejaswini, G. "Cipher Text Policy Privacy Attribute-Based Security." International Journal of Reliable Information and Assurance 5, no. 1 (July 30, 2017): 15–20. http://dx.doi.org/10.21742/ijria.2017.5.1.03.
Full textXiong, Xingxing, Shubo Liu, Dan Li, Jun Wang, and Xiaoguang Niu. "Locally differentially private continuous location sharing with randomized response." International Journal of Distributed Sensor Networks 15, no. 8 (August 2019): 155014771987037. http://dx.doi.org/10.1177/1550147719870379.
Full textPang, HweeHwa, Xuhua Ding, and Xiaokui Xiao. "Embellishing text search queries to protect user privacy." Proceedings of the VLDB Endowment 3, no. 1-2 (September 2010): 598–607. http://dx.doi.org/10.14778/1920841.1920918.
Full textWitten, Ian H., and John G. Cleary. "On the privacy afforded by adaptive text compression." Computers & Security 7, no. 4 (August 1988): 397–408. http://dx.doi.org/10.1016/0167-4048(88)90580-9.
Full textKhatamova, Kamola. "MARKETING PRIVACY AND USING TEXT ON ONLINE ADVERTISING." International Journal of Word Art 1, no. 1 (January 10, 2019): 108–14. http://dx.doi.org/10.26739/2181-9297-2019-1-16.
Full textLiu, Peng, Yan Bai, Lie Wang, and Xianxian Li. "Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing." International Journal of Software Engineering and Knowledge Engineering 27, no. 01 (February 2017): 71–90. http://dx.doi.org/10.1142/s0218194017500048.
Full textFernández Barbudo, Carlos. "Privacidad (digital) = (Digital) Privacy." EUNOMÍA. Revista en Cultura de la Legalidad, no. 17 (September 27, 2019): 276. http://dx.doi.org/10.20318/eunomia.2019.5033.
Full textDuan, Huabin, Jie Yang, and Huanjun Yang. "A Blockchain-Based Privacy Protection Application for Logistics Big Data." Journal of Cases on Information Technology 24, no. 5 (February 21, 2022): 1–12. http://dx.doi.org/10.4018/jcit.295249.
Full textLiu, Gan, Xiongtao Sun, Yiran Li, Hui Li, Shuchang Zhao, and Zhen Guo. "An Automatic Privacy-Aware Framework for Text Data in Online Social Network Based on a Multi-Deep Learning Model." International Journal of Intelligent Systems 2023 (November 8, 2023): 1–23. http://dx.doi.org/10.1155/2023/1727285.
Full textDa Silva Perez, Natália. "Privacy and Social Spaces." TSEG - The Low Countries Journal of Social and Economic History 18, no. 3 (November 29, 2021): 5–16. http://dx.doi.org/10.52024/tseg.11040.
Full textAtaei, Mehrnaz, Auriol Degbelo, Christian Kray, and Vitor Santos. "Complying with Privacy Legislation: From Legal Text to Implementation of Privacy-Aware Location-Based Services." ISPRS International Journal of Geo-Information 7, no. 11 (November 13, 2018): 442. http://dx.doi.org/10.3390/ijgi7110442.
Full textMosier, Gregory C. "Text messages: privacy in employee communications in the USA." International Journal of Private Law 2, no. 3 (2009): 260. http://dx.doi.org/10.1504/ijpl.2009.024142.
Full textBracamonte, Vanessa, Sebastian Pape, and Sascha Loebner. "“All apps do this”: Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 57–78. http://dx.doi.org/10.56553/popets-2022-0062.
Full textLibbi, Claudia Alessandra, Jan Trienes, Dolf Trieschnigg, and Christin Seifert. "Generating Synthetic Training Data for Supervised De-Identification of Electronic Health Records." Future Internet 13, no. 5 (May 20, 2021): 136. http://dx.doi.org/10.3390/fi13050136.
Full textD’Acunto, David, Serena Volo, and Raffaele Filieri. "“Most Americans like their privacy.” Exploring privacy concerns through US guests’ reviews." International Journal of Contemporary Hospitality Management 33, no. 8 (July 26, 2021): 2773–98. http://dx.doi.org/10.1108/ijchm-11-2020-1329.
Full textAit-Mlouk, Addi, Sadi A. Alawadi, Salman Toor, and Andreas Hellander. "FedQAS: Privacy-Aware Machine Reading Comprehension with Federated Learning." Applied Sciences 12, no. 6 (March 18, 2022): 3130. http://dx.doi.org/10.3390/app12063130.
Full textRamanath, Rohan, Florian Schaub, Shomir Wilson, Fei Liu, Norman Sadeh, and Noah Smith. "Identifying Relevant Text Fragments to Help Crowdsource Privacy Policy Annotations." Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 2 (September 5, 2014): 54–55. http://dx.doi.org/10.1609/hcomp.v2i1.13179.
Full textShenigaram, Vidhya, Susheel Kumar Thakur, Choul Praveen Kumar, and Laxman Maddikunta. "SECURE DATA GROUP SHARING AND CONDITIONAL DISSEMINATION WITH MULTI-OWNER IN CLOUD COMPUTING." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 3 (December 17, 2018): 1312–18. http://dx.doi.org/10.61841/turcomat.v9i3.14475.
Full textXu, Zifeng, Fucai Zhou, Yuxi Li, Jian Xu, and Qiang Wang. "Privacy-Preserving Subgraph Matching Protocol for Two Parties." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 571–88. http://dx.doi.org/10.1142/s0129054119400136.
Full textWei, Weiming, Chunming Tang, and Yucheng Chen. "Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation." Entropy 24, no. 8 (August 18, 2022): 1145. http://dx.doi.org/10.3390/e24081145.
Full textBoldt, Martin, and Kaavya Rekanar. "Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies." International Journal of Information Security and Privacy 13, no. 2 (April 2019): 47–66. http://dx.doi.org/10.4018/ijisp.2019040104.
Full textNing, Yichen, Na Wang, Aodi Liu, and Xuehui du. "Deep Learning based Privacy Information Identification approach for Unstructured Text." Journal of Physics: Conference Series 1848, no. 1 (April 1, 2021): 012032. http://dx.doi.org/10.1088/1742-6596/1848/1/012032.
Full textResende, Amanda, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, and Diego F. Aranha. "Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation." IEEE Transactions on Information Forensics and Security 17 (2022): 428–42. http://dx.doi.org/10.1109/tifs.2022.3144007.
Full textM, Priya. "PRIVACY ANALYSIS OF COMMENT USING TEXT MINING IN OSN FRAMEWORK." International Journal of Advanced Research in Computer Science 9, no. 2 (April 20, 2018): 309–13. http://dx.doi.org/10.26483/ijarcs.v9i2.5765.
Full textZhan, Huixin, and Victor S. Sheng. "Privacy-Preserving Representation Learning for Text-Attributed Networks with Simplicial Complexes." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 13 (June 26, 2023): 16143–44. http://dx.doi.org/10.1609/aaai.v37i13.26932.
Full textChoi, Daeseon, Younho Lee, Seokhyun Kim, and Pilsung Kang. "Private attribute inference from Facebook’s public text metadata: a case study of Korean users." Industrial Management & Data Systems 117, no. 8 (September 11, 2017): 1687–706. http://dx.doi.org/10.1108/imds-07-2016-0276.
Full textPatergianakis, Antonios, and Konstantinos Limniotis. "Privacy Issues in Stylometric Methods." Cryptography 6, no. 2 (April 7, 2022): 17. http://dx.doi.org/10.3390/cryptography6020017.
Full textWang, Qiaozhi, Hao Xue, Fengjun Li, Dongwon Lee, and Bo Luo. "#DontTweetThis: Scoring Private Information in Social Networks." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 72–92. http://dx.doi.org/10.2478/popets-2019-0059.
Full textFeng, Tao, Xudong Wang, and Xinghua Li. "LBS privacy protection technology based on searchable encryption mechanism." MATEC Web of Conferences 189 (2018): 10013. http://dx.doi.org/10.1051/matecconf/201818910013.
Full textAl-Rabeeah, Abdullah Abdulabbas Nahi, and Mohammed Mahdi Hashim. "Social Network Privacy Models." Cihan University-Erbil Scientific Journal 3, no. 2 (August 20, 2019): 92–101. http://dx.doi.org/10.24086/cuesj.v3n2y2019.pp92-101.
Full textSlobogin, Christopher. "The Sacred Fourth Amendment Text." Michigan Law Review Online, no. 119 (2020): 17. http://dx.doi.org/10.36644/mlr.online.119.17.sacred.
Full textWang, Yansheng, Yongxin Tong, and Dingyuan Shi. "Federated Latent Dirichlet Allocation: A Local Differential Privacy Based Framework." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 6283–90. http://dx.doi.org/10.1609/aaai.v34i04.6096.
Full textHu, Zhao-Wei, and Jing Yang. "Trajectory Privacy Protection Based on Location Semantic Perception." International Journal of Cooperative Information Systems 28, no. 03 (September 2019): 1950006. http://dx.doi.org/10.1142/s0218843019500060.
Full textMd, Abdul Quadir, Raghav V. Anand, Senthilkumar Mohan, Christy Jackson Joshua, Sabhari S. Girish, Anthra Devarajan, and Celestine Iwendi. "Data-Driven Analysis of Privacy Policies Using LexRank and KL Summarizer for Environmental Sustainability." Sustainability 15, no. 7 (March 29, 2023): 5941. http://dx.doi.org/10.3390/su15075941.
Full textFord, Elizabeth, Malcolm Oswald, Lamiece Hassan, Kyle Bozentko, Goran Nenadic, and Jackie Cassell. "Should free-text data in electronic medical records be shared for research? A citizens’ jury study in the UK." Journal of Medical Ethics 46, no. 6 (May 26, 2020): 367–77. http://dx.doi.org/10.1136/medethics-2019-105472.
Full textSui, Yi, Xiujuan Wang, Kangfeng Zheng, Yutong Shi, and Siwei Cao. "Personality Privacy Protection Method of Social Users Based on Generative Adversarial Networks." Computational Intelligence and Neuroscience 2022 (April 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/2419987.
Full textMeystre, Stéphane M., Óscar Ferrández, F. Jeffrey Friedlin, Brett R. South, Shuying Shen, and Matthew H. Samore. "Text de-identification for privacy protection: A study of its impact on clinical text information content." Journal of Biomedical Informatics 50 (August 2014): 142–50. http://dx.doi.org/10.1016/j.jbi.2014.01.011.
Full textKulkarni, Yogesh R., and T. Senthil Murugan. "Genetic grey wolf optimization and C-mixture for collaborative data publishing." International Journal of Modeling, Simulation, and Scientific Computing 09, no. 06 (December 2018): 1850058. http://dx.doi.org/10.1142/s1793962318500587.
Full textWang, Lianhai, and Chenxi Guan. "Improving Security in the Internet of Vehicles: A Blockchain-Based Data Sharing Scheme." Electronics 13, no. 4 (February 9, 2024): 714. http://dx.doi.org/10.3390/electronics13040714.
Full textRani, Dr V. Uma, and Godavari S. L. S. Pranitha. "Quick Text Classification with Privacy Protection based on Secure Multiparty Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 2098–104. http://dx.doi.org/10.22214/ijraset.2023.55480.
Full textWu, Zongda, Shigen Shen, Xinze Lian, Xinning Su, and Enhong Chen. "A dummy-based user privacy protection approach for text information retrieval." Knowledge-Based Systems 195 (May 2020): 105679. http://dx.doi.org/10.1016/j.knosys.2020.105679.
Full textLi, Xiaorong, and Zhinian Shu. "Research on Big Data Text Clustering Algorithm Based on Swarm Intelligence." Wireless Communications and Mobile Computing 2022 (April 15, 2022): 1–10. http://dx.doi.org/10.1155/2022/7551035.
Full text