Literatura académica sobre el tema "Computational Differential Privacy"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Computational Differential Privacy".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Computational Differential Privacy"
Bhavani Sankar Telaprolu. "Privacy-Preserving Federated Learning in Healthcare - A Secure AI Framework". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n.º 3 (16 de julio de 2024): 703–7. https://doi.org/10.32628/cseit2410347.
Texto completoEt. al., Dr Priyank Jain,. "Differentially Private Data Release: Bias Weight Perturbation Method - A Novel Approach". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 10 (28 de abril de 2021): 7165–73. http://dx.doi.org/10.17762/turcomat.v12i10.5607.
Texto completoKii, Masanobu, Atsunori Ichikawa y Takayuki Miura. "Lightweight Two-Party Secure Sampling Protocol for Differential Privacy". Proceedings on Privacy Enhancing Technologies 2025, n.º 1 (enero de 2025): 23–36. http://dx.doi.org/10.56553/popets-2025-0003.
Texto completoMeisingseth, Fredrik y Christian Rechberger. "SoK: Computational and Distributed Differential Privacy for MPC". Proceedings on Privacy Enhancing Technologies 2025, n.º 1 (enero de 2025): 420–39. http://dx.doi.org/10.56553/popets-2025-0023.
Texto completoKim, Jongwook. "DistOD: A Hybrid Privacy-Preserving and Distributed Framework for Origin–Destination Matrix Computation". Electronics 13, n.º 22 (19 de noviembre de 2024): 4545. http://dx.doi.org/10.3390/electronics13224545.
Texto completoFang, Juanru y Ke Yi. "Privacy Amplification by Sampling under User-level Differential Privacy". Proceedings of the ACM on Management of Data 2, n.º 1 (12 de marzo de 2024): 1–26. http://dx.doi.org/10.1145/3639289.
Texto completoAlborch Escobar, Ferran, Sébastien Canard, Fabien Laguillaumie y Duong Hieu Phan. "Computational Differential Privacy for Encrypted Databases Supporting Linear Queries". Proceedings on Privacy Enhancing Technologies 2024, n.º 4 (octubre de 2024): 583–604. http://dx.doi.org/10.56553/popets-2024-0131.
Texto completoLiu, Hai, Zhenqiang Wu, Yihui Zhou, Changgen Peng, Feng Tian y Laifeng Lu. "Privacy-Preserving Monotonicity of Differential Privacy Mechanisms". Applied Sciences 8, n.º 11 (28 de octubre de 2018): 2081. http://dx.doi.org/10.3390/app8112081.
Texto completoPavan Kumar Vadrevu. "Scalable Approaches for Enhancing Privacy in Blockchain Networks: A Comprehensive Review of Differential Privacy Techniques". Journal of Information Systems Engineering and Management 10, n.º 8s (31 de enero de 2025): 635–48. https://doi.org/10.52783/jisem.v10i8s.1119.
Texto completoHong, Yiyang, Xingwen Zhao, Hui Zhu y Hui Li. "A Blockchain-Integrated Divided-Block Sparse Matrix Transformation Differential Privacy Data Publishing Model". Security and Communication Networks 2021 (7 de diciembre de 2021): 1–15. http://dx.doi.org/10.1155/2021/2418539.
Texto completoTesis sobre el tema "Computational Differential Privacy"
Alborch, escobar Ferran. "Private Data Analysis over Encrypted Databases : Mixing Functional Encryption with Computational Differential Privacy". Electronic Thesis or Diss., Institut polytechnique de Paris, 2025. http://www.theses.fr/2025IPPAT003.
Texto completoIn our current digitalized society, data is ruling the world. But as it is most of the time related to individuals, its exploitation should respect the privacy of the latter. This issue has raised the differential privacy paradigm, which permits to protect individuals when querying databases containing data about them. But with the emergence of cloud computing, it is becoming increasingly necessary to also consider the confidentiality of "on-cloud'' storage confidentiality of such vast databases, using encryption techniques. This thesis studies how to provide both privacy and confidentiality of such outsourced databases by mixing two primitives: computational differential privacy and functional encryption. First, we study the relationship between computational differential privacy and functional encryption for randomized functions in a generic way. We analyze the privacy of the setting where a malicious analyst may access the encrypted data stored in a server, either by corrupting or breaching it, and prove that a secure randomized functional encryption scheme supporting the appropriate family of functions guarantees the computational differential privacy of the system. Second, we construct efficient randomized functional encryption schemes for certain useful families of functions, and we prove them secure in the standard model under well-known assumptions. The families of functions considered are linear functions, used for example in counting queries, histograms and linear regressions, and quadratic functions, used for example in quadratic regressions and hypothesis testing. The schemes built are then used together with the first result to construct encrypted databases for their corresponding family of queries. Finally, we implement both randomized functional encryption schemes to analyze their efficiency. This shows that our constructions are practical for databases with up to 1 000 000 entries in the case of linear queries and databases with up to 10 000 database entries in the case of quadratic queries
Leukam, Lako Franklin. "Protection des données à caractère personnel pour les services énergétiques". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS004.
Texto completoSmart grids are important bricks in the fight against climate change. Smart grids allow the massive introduction of renewable energies, which are intermittent, while guaranteeing grid stability, i.e., ensuring a real-time balance between demand and production in the power grid. The management of grid stability is possible thanks to smart meters installed in households, allowing the distribution system operator to collect consumption/production data from consumers/producers at a time step of up to 10 min in France. This real-time consumption data enables to provide new energy services, such as customer consumption forecasts or demand response. Demand response services help to avoid consumption peaks in a neighborhood by ensuring that, at all times, users' consumption does not exceed the maximum power of the local grid. However, the collection of users' consumptions is a key privacy concern. Indeed, individual consumption data reflect the use of all electric appliances by inhabitants in a household over time, and enable to deduce the behaviors, activities, age or preferences of the inhabitants. This thesis aims to propose new energy services, while protecting the privacy of consumers. We propose five contributions that relate to two themes:1- The transformation of a demand response algorithm by making it privacy friendly. This transformation uses secure multiparty computation, allowing to compute an aggregate, such as a sum of users’ consumption, without disclosing any individual consumption.2- The publication of sum of users' consumption while preserving privacy and good utility. This publication uses differential privacy, ensuring that the publication of the sum does not indirectly reveal individual users' consumption. Among other energy services, these sums of consumption enable to perform consumption forecasts
(6565679), Fang-Yu Rao. "Privacy-Enhancing Techniques for Data Analytics". Thesis, 2019.
Buscar texto completoOrganizations today collect and aggregate huge amounts of data from individuals under various scenarios and for different purposes. Such aggregation of individuals’ data when combined with techniques of data analytics allows organizations to make informed decisions and predictions. But in many situations, different portions of the data associated with individuals are collected and curated by different organizations. To derive more accurate conclusions and predictions, those organization may want to conduct the analysis based on their joint data, which cannot be simply accomplished by each organization exchanging its own data with other organizations due to the sensitive nature of data. Developing approaches for collaborative privacy-preserving data analytics, however, is a nontrivial task. At least two major challenges have to be addressed. The first challenge is that the security of the data possessed by each organization should always be properly protected during and after the collaborative analysis process, whereas the second challenge is the high computational complexity usually accompanied by cryptographic primitives used to build such privacy-preserving protocols.
In this dissertation, based on widely adopted primitives in cryptography, we address the aforementioned challenges by developing techniques for data analytics that
not only allow multiple mutually distrustful parties to perform data analysis on their
joint data in a privacy-preserving manner, but also reduce the time required to complete the analysis. More specifically, using three common data analytics tasks as
concrete examples, we show how to construct the respective privacy-preserving protocols under two different scenarios: (1) the protocols are executed by a collaborative process only involving the participating parties; (2) the protocols are outsourced to
some service providers in the cloud. Two types of optimization for improving the
efficiency of those protocols are also investigated. The first type allows each participating party access to a statistically controlled leakage so as to reduce the amount
of required computation, while the second type utilizes the parallelism that could
be incorporated into the task and pushes some computation to the offline phase to
reduce the time needed for each participating party without any additional leakage.
Extensive experiments are also conducted on real-world datasets to demonstrate the
effectiveness of our proposed techniques.
Capítulos de libros sobre el tema "Computational Differential Privacy"
Mironov, Ilya, Omkant Pandey, Omer Reingold y Salil Vadhan. "Computational Differential Privacy". En Advances in Cryptology - CRYPTO 2009, 126–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03356-8_8.
Texto completoPejó, Balázs y Damien Desfontaines. "Computational Power (C)". En Guide to Differential Privacy Modifications, 55–57. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96398-9_9.
Texto completoBen Hamida, Sana, Hichem Mrabet y Abderrazak Jemai. "How Differential Privacy Reinforces Privacy of Machine Learning Models?" En Advances in Computational Collective Intelligence, 661–73. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16210-7_54.
Texto completoValovich, Filipp y Francesco Aldà. "Computational Differential Privacy from Lattice-Based Cryptography". En Number-Theoretic Methods in Cryptology, 121–41. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76620-1_8.
Texto completoKang, Yilin, Jian Li, Yong Liu y Weiping Wang. "Data Heterogeneity Differential Privacy: From Theory to Algorithm". En Computational Science – ICCS 2023, 119–33. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35995-8_9.
Texto completoTao, Fuqiang, Zhe Sun, Rui Liang, Rundong Shao, Yuhan Chai y Yangyang Wang. "FEDSET: Federated Random Forest Based on Differential Privacy". En Computational and Experimental Simulations in Engineering, 791–806. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-42987-3_55.
Texto completoPodsevalov, Ivan, Alexei Podsevalov y Vladimir Korkhov. "Differential Privacy for Statistical Data of Educational Institutions". En Computational Science and Its Applications – ICCSA 2022 Workshops, 603–15. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10542-5_41.
Texto completoGroce, Adam, Jonathan Katz y Arkady Yerukhimovich. "Limits of Computational Differential Privacy in the Client/Server Setting". En Theory of Cryptography, 417–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19571-6_25.
Texto completoQian, Jiaqing, Yanan Chen y Sanxiu Jiao. "DPFL-AES: Differential Privacy Federated Learning Based on Adam Early Stopping". En Computational and Experimental Simulations in Engineering, 905–19. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-42515-8_64.
Texto completoBun, Mark, Yi-Hsiu Chen y Salil Vadhan. "Separating Computational and Statistical Differential Privacy in the Client-Server Model". En Theory of Cryptography, 607–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53641-4_23.
Texto completoActas de conferencias sobre el tema "Computational Differential Privacy"
Li, Xianzhi, Ran Zmigrod, Zhiqiang Ma, Xiaomo Liu y Xiaodan Zhu. "Fine-Tuning Language Models with Differential Privacy through Adaptive Noise Allocation". En Findings of the Association for Computational Linguistics: EMNLP 2024, 8368–75. Stroudsburg, PA, USA: Association for Computational Linguistics, 2024. http://dx.doi.org/10.18653/v1/2024.findings-emnlp.491.
Texto completoGupta, Yash, Jeswin M. S, Aniruddh Mantrala, Davin Henry Monteiro, Adhithi M y M. N. Thippeswamy. "Enhancing Differential Privacy in Federated Learning via Quantum Computation and Algorithms". En 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS), 1–6. IEEE, 2024. https://doi.org/10.1109/csitss64042.2024.10816807.
Texto completoVu, Doan Nam Long, Timour Igamberdiev y Ivan Habernal. "Granularity is crucial when applying differential privacy to text: An investigation for neural machine translation". En Findings of the Association for Computational Linguistics: EMNLP 2024, 507–27. Stroudsburg, PA, USA: Association for Computational Linguistics, 2024. http://dx.doi.org/10.18653/v1/2024.findings-emnlp.29.
Texto completoTajima, Arisa, Wei Jiang, Virendra Marathe y Hamid Mozaffari. "Enhanced Private Decision Trees using Secure Multiparty Computation and Differential Privacy". En 2024 IEEE International Conference on Knowledge Graph (ICKG), 352–59. IEEE, 2024. https://doi.org/10.1109/ickg63256.2024.00051.
Texto completoFlemings, James y Murali Annavaram. "Differentially Private Knowledge Distillation via Synthetic Text Generation". En Findings of the Association for Computational Linguistics ACL 2024, 12957–68. Stroudsburg, PA, USA: Association for Computational Linguistics, 2024. http://dx.doi.org/10.18653/v1/2024.findings-acl.769.
Texto completoChen, Bo, Baike She, Calvin Hawkins, Alex Benvenuti, Brandon Fallin, Philip E. Paré y Matthew Hale. "Differentially Private Computation of Basic Reproduction Numbers in Networked Epidemic Models". En 2024 American Control Conference (ACC), 4422–27. IEEE, 2024. http://dx.doi.org/10.23919/acc60939.2024.10644264.
Texto completoRamesh, Krithika, Nupoor Gandhi, Pulkit Madaan, Lisa Bauer, Charith Peris y Anjalie Field. "Evaluating Differentially Private Synthetic Data Generation in High-Stakes Domains". En Findings of the Association for Computational Linguistics: EMNLP 2024, 15254–69. Stroudsburg, PA, USA: Association for Computational Linguistics, 2024. http://dx.doi.org/10.18653/v1/2024.findings-emnlp.894.
Texto completoMeisenbacher, Stephen, Maulik Chevli, Juraj Vladika y Florian Matthes. "DP-MLM: Differentially Private Text Rewriting Using Masked Language Models". En Findings of the Association for Computational Linguistics ACL 2024, 9314–28. Stroudsburg, PA, USA: Association for Computational Linguistics, 2024. http://dx.doi.org/10.18653/v1/2024.findings-acl.554.
Texto completoGhazi, Badih, Rahul Ilango, Pritish Kamath, Ravi Kumar y Pasin Manurangsi. "Towards Separating Computational and Statistical Differential Privacy". En 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2023. http://dx.doi.org/10.1109/focs57990.2023.00042.
Texto completoKotevska, Olivera, Folami Alamudun y Christopher Stanley. "Optimal Balance of Privacy and Utility with Differential Privacy Deep Learning Frameworks". En 2021 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2021. http://dx.doi.org/10.1109/csci54926.2021.00141.
Texto completoInformes sobre el tema "Computational Differential Privacy"
Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier y Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, octubre de 2021. http://dx.doi.org/10.21248/gups.63413.
Texto completo