Journal articles on the topic 'Utility-privacy trade-off'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Utility-privacy trade-off.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Hai, Zhenqiang Wu, Yihui Zhou, Changgen Peng, Feng Tian, and Laifeng Lu. "Privacy-Preserving Monotonicity of Differential Privacy Mechanisms." Applied Sciences 8, no. 11 (October 28, 2018): 2081. http://dx.doi.org/10.3390/app8112081.
Full textAvent, Brendan, Javier González, Tom Diethe, Andrei Paleyes, and Borja Balle. "Automatic Discovery of Privacy–Utility Pareto Fronts." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 5–23. http://dx.doi.org/10.2478/popets-2020-0060.
Full textGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami, et al. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques." Scientific Programming 2021 (December 28, 2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Full textZeng, Xia, Chuanchuan Yang, and Bin Dai. "Utility–Privacy Trade-Off in Distributed Machine Learning Systems." Entropy 24, no. 9 (September 14, 2022): 1299. http://dx.doi.org/10.3390/e24091299.
Full textSrivastava, Saurabh, Vinay P. Namboodiri, and T. V. Prabhakar. "Achieving Privacy-Utility Trade-off in existing Software Systems." Journal of Physics: Conference Series 1454 (February 2020): 012004. http://dx.doi.org/10.1088/1742-6596/1454/1/012004.
Full textWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau, and Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification." Applied Sciences 12, no. 21 (November 4, 2022): 11177. http://dx.doi.org/10.3390/app122111177.
Full textMohammed, Kabiru, Aladdin Ayesh, and Eerke Boiten. "Complementing Privacy and Utility Trade-Off with Self-Organising Maps." Cryptography 5, no. 3 (August 17, 2021): 20. http://dx.doi.org/10.3390/cryptography5030020.
Full textKiranagi, Manasi, Devika Dhoble, Madeeha Tahoor, and Dr Rekha Patil. "Finding Optimal Path and Privacy Preserving for Wireless Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 10 (October 31, 2022): 360–65. http://dx.doi.org/10.22214/ijraset.2022.46949.
Full textCai, Lin, Jinchuan Tang, Shuping Dang, and Gaojie Chen. "Privacy protection and utility trade-off for social graph embedding." Information Sciences 676 (August 2024): 120866. http://dx.doi.org/10.1016/j.ins.2024.120866.
Full textRassouli, Borzoo, and Deniz Gunduz. "Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure." IEEE Transactions on Information Forensics and Security 15 (2020): 594–603. http://dx.doi.org/10.1109/tifs.2019.2903658.
Full textFranzen, Daniel, Claudia Müller-Birn, and Odette Wegwarth. "Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential Privacy." Proceedings of the ACM on Human-Computer Interaction 8, CSCW1 (April 17, 2024): 1–56. http://dx.doi.org/10.1145/3637309.
Full textTasnim, Naima, Jafar Mohammadi, Anand D. Sarwate, and Hafiz Imtiaz. "Approximating Functions with Approximate Privacy for Applications in Signal Estimation and Learning." Entropy 25, no. 5 (May 22, 2023): 825. http://dx.doi.org/10.3390/e25050825.
Full textKremer, Steve. "Security and Privacy Column." ACM SIGLOG News 10, no. 1 (January 2023): 3. http://dx.doi.org/10.1145/3584676.3584679.
Full textDe, Abir, and Soumen Chakrabarti. "Differentially Private Link Prediction with Protected Connections." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 1 (May 18, 2021): 63–71. http://dx.doi.org/10.1609/aaai.v35i1.16078.
Full textMiller, Jim. "Who Are You? The Trade-Off between Information Utility and Privacy." IEEE Internet Computing 12, no. 4 (July 2008): 93–96. http://dx.doi.org/10.1109/mic.2008.91.
Full textZhan, Yuting, Hamed Haddadi, and Afra Mashhadi. "Privacy-Aware Adversarial Network in Human Mobility Prediction." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 556–70. http://dx.doi.org/10.56553/popets-2023-0032.
Full textChen, Youqin, Zhengquan Xu, Jianzhang Chen, and Shan Jia. "B-DP: Dynamic Collection and Publishing of Continuous Check-In Data with Best-Effort Differential Privacy." Entropy 24, no. 3 (March 14, 2022): 404. http://dx.doi.org/10.3390/e24030404.
Full textChandrasekaran, Varun, Chuhan Gao, Brian Tang, Kassem Fawaz, Somesh Jha, and Suman Banerjee. "Face-Off: Adversarial Face Obfuscation." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 369–90. http://dx.doi.org/10.2478/popets-2021-0032.
Full textWu, Qihong, Jinchuan Tang, Shuping Dang, and Gaojie Chen. "Data privacy and utility trade-off based on mutual information neural estimator." Expert Systems with Applications 207 (November 2022): 118012. http://dx.doi.org/10.1016/j.eswa.2022.118012.
Full textYao, Xin, Juan Yu, Jianmin Han, Jianfeng Lu, Hao Peng, Yijia Wu, and Xiaoqian Cao. "DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism." ISPRS International Journal of Geo-Information 11, no. 12 (December 5, 2022): 607. http://dx.doi.org/10.3390/ijgi11120607.
Full textZhang, Xiao-Yu, Stefanie Kuenzel, José-Rodrigo Córdoba-Pachón, and Chris Watkins. "Privacy-Functionality Trade-Off: A Privacy-Preserving Multi-Channel Smart Metering System." Energies 13, no. 12 (June 21, 2020): 3221. http://dx.doi.org/10.3390/en13123221.
Full textZhao, Jianzhe, Keming Mao, Chenxi Huang, and Yuyang Zeng. "Utility Optimization of Federated Learning with Differential Privacy." Discrete Dynamics in Nature and Society 2021 (October 8, 2021): 1–14. http://dx.doi.org/10.1155/2021/3344862.
Full textXue, Lulu, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun, and Dezhong Yao. "Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 6 (March 24, 2024): 6404–12. http://dx.doi.org/10.1609/aaai.v38i6.28460.
Full textZhou, Xingcai, and Yu Xiang. "ADMM-Based Differential Privacy Learning for Penalized Quantile Regression on Distributed Functional Data." Mathematics 10, no. 16 (August 16, 2022): 2954. http://dx.doi.org/10.3390/math10162954.
Full textLi, Qiyu, Chunlai Zhou, Biao Qin, and Zhiqiang Xu. "Local Differential Privacy for Belief Functions." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 9 (June 28, 2022): 10025–33. http://dx.doi.org/10.1609/aaai.v36i9.21241.
Full textCao, Hui, Shubo Liu, Renfang Zhao, and Xingxing Xiong. "IFed: A novel federated learning framework for local differential privacy in Power Internet of Things." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772091969. http://dx.doi.org/10.1177/1550147720919698.
Full textBoenisch, Franziska, Christopher Mühl, Roy Rinberg, Jannis Ihrig, and Adam Dziedzic. "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 158–76. http://dx.doi.org/10.56553/popets-2023-0010.
Full textShibata, Hisaichi, Shouhei Hanaoka, Saori Koshino, Soichiro Miki, Yuki Sonoda, and Osamu Abe. "Identity Diffuser: Preserving Abnormal Region of Interests While Diffusing Identity." Applied Sciences 14, no. 18 (September 20, 2024): 8489. http://dx.doi.org/10.3390/app14188489.
Full textGrigoraș, Alexandru, and Florin Leon. "Synthetic Time Series Generation for Decision Intelligence Using Large Language Models." Mathematics 12, no. 16 (August 13, 2024): 2494. http://dx.doi.org/10.3390/math12162494.
Full textThantharate, Pratik, Shyam Bhojwani, and Anurag Thantharate. "DPShield: Optimizing Differential Privacy for High-Utility Data Analysis in Sensitive Domains." Electronics 13, no. 12 (June 14, 2024): 2333. http://dx.doi.org/10.3390/electronics13122333.
Full textTriastcyn, Aleksei, and Boi Faltings. "Generating Higher-Fidelity Synthetic Datasets with Privacy Guarantees." Algorithms 15, no. 7 (July 1, 2022): 232. http://dx.doi.org/10.3390/a15070232.
Full textVijayan, Naveen Edapurath. "Privacy-Preserving Analytics in HR Tech- Federated Learning and Differential Privacy Techniques for Sensitive Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (November 10, 2024): 1–6. http://dx.doi.org/10.55041/ijsrem11473.
Full textPuaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing." International Journal of Strategic Information Technology and Applications 10, no. 1 (January 2019): 1–22. http://dx.doi.org/10.4018/ijsita.2019010101.
Full textBuchholz, Erik, Alsharif Abuadbba, Shuo Wang, Surya Nepal, and Salil S. Kanhere. "SoK: Can Trajectory Generation Combine Privacy and Utility?" Proceedings on Privacy Enhancing Technologies 2024, no. 3 (July 2024): 75–93. http://dx.doi.org/10.56553/popets-2024-0068.
Full textKaplan, Caelin, Chuan Xu, Othmane Marfoq, Giovanni Neglia, and Anderson Santana de Oliveira. "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (January 2024): 525–48. http://dx.doi.org/10.56553/popets-2024-0031.
Full textXiao, Taihong, Yi-Hsuan Tsai, Kihyuk Sohn, Manmohan Chandraker, and Ming-Hsuan Yang. "Adversarial Learning of Privacy-Preserving and Task-Oriented Representations." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 12434–41. http://dx.doi.org/10.1609/aaai.v34i07.6930.
Full textVepakomma, Praneeth, Julia Balla, and Ramesh Raskar. "PrivateMail: Supervised Manifold Learning of Deep Features with Privacy for Image Retrieval." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 8 (June 28, 2022): 8503–11. http://dx.doi.org/10.1609/aaai.v36i8.20827.
Full textTakagi, Shun, Li Xiong, Fumiyuki Kato, Yang Cao, and Masatoshi Yoshikawa. "HRNet: Differentially Private Hierarchical and Multi-Resolution Network for Human Mobility Data Synthesization." Proceedings of the VLDB Endowment 17, no. 11 (July 2024): 3058–71. http://dx.doi.org/10.14778/3681954.3681983.
Full textMiller, Jim. "Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy." IEEE Internet Computing 12, no. 6 (November 2008): 91–93. http://dx.doi.org/10.1109/mic.2008.135.
Full textChen, E., Yang Cao, and Yifei Ge. "A Generalized Shuffle Framework for Privacy Amplification: Strengthening Privacy Guarantees and Enhancing Utility." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 10 (March 24, 2024): 11267–75. http://dx.doi.org/10.1609/aaai.v38i10.29005.
Full textSohail, Syeda Amna, Faiza Allah Bukhsh, and Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata." Applied Sciences 11, no. 22 (November 12, 2021): 10686. http://dx.doi.org/10.3390/app112210686.
Full textVerma, Kishore S., A. Rajesh, and Adeline J. S. Johnsana. "An Improved Classification Analysis on Utility Aware K-Anonymized Dataset." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 445–52. http://dx.doi.org/10.1166/jctn.2019.7748.
Full textMohammady, Meisam, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, and Mourad Debbabi. "A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization." ACM Transactions on Privacy and Security 24, no. 3 (August 31, 2021): 1–36. http://dx.doi.org/10.1145/3439732.
Full textLiu, Xuan, Genlang Chen, Shiting Wen, and Guanghui Song. "An Improved Sanitization Algorithm in Privacy-Preserving Utility Mining." Mathematical Problems in Engineering 2020 (April 25, 2020): 1–14. http://dx.doi.org/10.1155/2020/7489045.
Full textHirschprung, Ron S., and Shani Alkoby. "A Game Theory Approach for Assisting Humans in Online Information-Sharing." Information 13, no. 4 (April 2, 2022): 183. http://dx.doi.org/10.3390/info13040183.
Full textKamalaruban, Parameswaran, Victor Perrier, Hassan Jameel Asghar, and Mohamed Ali Kaafar. "Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 103–25. http://dx.doi.org/10.2478/popets-2020-0007.
Full textEt. al., Waleed M. Ead,. "A General Framework Information Loss of Utility-Based Anonymization in Data Publishing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1450–56. http://dx.doi.org/10.17762/turcomat.v12i5.2102.
Full textPilgram, Lisa, Thierry Meurers, Bradley Malin, Elke Schaeffner, Kai-Uwe Eckardt, and Fabian Prasser. "The Costs of Anonymization: Case Study Using Clinical Data." Journal of Medical Internet Research 26 (April 24, 2024): e49445. http://dx.doi.org/10.2196/49445.
Full textSong, Yi, Xuesong Lu, Sadegh Nobari, Stéphane Bressan, and Panagiotis Karras. "On the Privacy and Utility of Anonymized Social Networks." International Journal of Adaptive, Resilient and Autonomic Systems 4, no. 2 (April 2013): 1–34. http://dx.doi.org/10.4018/jaras.2013040101.
Full textHemmatazad, Nolan, Robin Gandhi, Qiuming Zhu, and Sanjukta Bhowmick. "The Intelligent Data Brokerage." International Journal of Privacy and Health Information Management 2, no. 1 (January 2014): 22–33. http://dx.doi.org/10.4018/ijphim.2014010102.
Full text