Artículos de revistas sobre el tema "Computational Differential Privacy"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Computational Differential Privacy".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Bhavani Sankar Telaprolu. "Privacy-Preserving Federated Learning in Healthcare - A Secure AI Framework". International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, n.º 3 (16 de julio de 2024): 703–7. https://doi.org/10.32628/cseit2410347.
Texto completoEt. al., Dr Priyank Jain,. "Differentially Private Data Release: Bias Weight Perturbation Method - A Novel Approach". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 10 (28 de abril de 2021): 7165–73. http://dx.doi.org/10.17762/turcomat.v12i10.5607.
Texto completoKii, Masanobu, Atsunori Ichikawa y Takayuki Miura. "Lightweight Two-Party Secure Sampling Protocol for Differential Privacy". Proceedings on Privacy Enhancing Technologies 2025, n.º 1 (enero de 2025): 23–36. http://dx.doi.org/10.56553/popets-2025-0003.
Texto completoMeisingseth, Fredrik y Christian Rechberger. "SoK: Computational and Distributed Differential Privacy for MPC". Proceedings on Privacy Enhancing Technologies 2025, n.º 1 (enero de 2025): 420–39. http://dx.doi.org/10.56553/popets-2025-0023.
Texto completoKim, Jongwook. "DistOD: A Hybrid Privacy-Preserving and Distributed Framework for Origin–Destination Matrix Computation". Electronics 13, n.º 22 (19 de noviembre de 2024): 4545. http://dx.doi.org/10.3390/electronics13224545.
Texto completoFang, Juanru y Ke Yi. "Privacy Amplification by Sampling under User-level Differential Privacy". Proceedings of the ACM on Management of Data 2, n.º 1 (12 de marzo de 2024): 1–26. http://dx.doi.org/10.1145/3639289.
Texto completoAlborch Escobar, Ferran, Sébastien Canard, Fabien Laguillaumie y Duong Hieu Phan. "Computational Differential Privacy for Encrypted Databases Supporting Linear Queries". Proceedings on Privacy Enhancing Technologies 2024, n.º 4 (octubre de 2024): 583–604. http://dx.doi.org/10.56553/popets-2024-0131.
Texto completoLiu, Hai, Zhenqiang Wu, Yihui Zhou, Changgen Peng, Feng Tian y Laifeng Lu. "Privacy-Preserving Monotonicity of Differential Privacy Mechanisms". Applied Sciences 8, n.º 11 (28 de octubre de 2018): 2081. http://dx.doi.org/10.3390/app8112081.
Texto completoPavan Kumar Vadrevu. "Scalable Approaches for Enhancing Privacy in Blockchain Networks: A Comprehensive Review of Differential Privacy Techniques". Journal of Information Systems Engineering and Management 10, n.º 8s (31 de enero de 2025): 635–48. https://doi.org/10.52783/jisem.v10i8s.1119.
Texto completoHong, Yiyang, Xingwen Zhao, Hui Zhu y Hui Li. "A Blockchain-Integrated Divided-Block Sparse Matrix Transformation Differential Privacy Data Publishing Model". Security and Communication Networks 2021 (7 de diciembre de 2021): 1–15. http://dx.doi.org/10.1155/2021/2418539.
Texto completoMeisingseth, Fredrik, Christian Rechberger y Fabian Schmid. "Practical Two-party Computational Differential Privacy with Active Security". Proceedings on Privacy Enhancing Technologies 2025, n.º 1 (enero de 2025): 341–60. http://dx.doi.org/10.56553/popets-2025-0019.
Texto completoKim, Jongwook y Sae-Hong Cho. "A Differential Privacy Framework with Adjustable Efficiency–Utility Trade-Offs for Data Collection". Mathematics 13, n.º 5 (28 de febrero de 2025): 812. https://doi.org/10.3390/math13050812.
Texto completoMr. Samadhan Palkar, Prof. (Dr.) Raghav Mehra y Prof. (Dr.) Lingaraj Hadimani. "Hyper Parameters Optimization for Gaussian Mechanism with Coyote-Badger and Kriging Model for EHR". International Research Journal on Advanced Engineering Hub (IRJAEH) 3, n.º 02 (14 de febrero de 2025): 152–55. https://doi.org/10.47392/irjaeh.2025.0020.
Texto completoNi, Guangyuan y Jiaxin Sun. "Differential privacy protection algorithm for large data sources based on normalized information entropy Bayesian network". Journal of Physics: Conference Series 2813, n.º 1 (1 de agosto de 2024): 012012. http://dx.doi.org/10.1088/1742-6596/2813/1/012012.
Texto completoJain, Pinkal, Vikas Thada y Deepak Motwani. "Providing Highest Privacy Preservation Scenario for Achieving Privacy in Confidential Data". International Journal of Experimental Research and Review 39, Spl Volume (30 de mayo de 2024): 190–99. http://dx.doi.org/10.52756/ijerr.2024.v39spl.015.
Texto completoMudassar, Bakhtawar, Shahzaib Tahir, Fawad Khan, Syed Aziz Shah, Syed Ikram Shah y Qammer Hussain Abbasi. "Privacy-Preserving Data Analytics in Internet of Medical Things". Future Internet 16, n.º 11 (5 de noviembre de 2024): 407. http://dx.doi.org/10.3390/fi16110407.
Texto completoAlmadhoun, Nour, Erman Ayday y Özgür Ulusoy. "Inference attacks against differentially private query results from genomic datasets including dependent tuples". Bioinformatics 36, Supplement_1 (1 de julio de 2020): i136—i145. http://dx.doi.org/10.1093/bioinformatics/btaa475.
Texto completoC.Kanmani Pappa. "Zero-Trust Cryptographic Protocols and Differential Privacy Techniques for Scalable Secure Multi-Party Computation in Big Data Analytics". Journal of Electrical Systems 20, n.º 5s (13 de abril de 2024): 2114–23. http://dx.doi.org/10.52783/jes.2550.
Texto completoKim, Hyeong-Geon, Jinmyeong Shin y Yoon-Ho Choi. "Human-Unrecognizable Differential Private Noised Image Generation Method". Sensors 24, n.º 10 (16 de mayo de 2024): 3166. http://dx.doi.org/10.3390/s24103166.
Texto completoAbdulbaqi, Azmi Shawkat, Adil M. Salman y Sagar B. Tambe. "Privacy-Preserving Data Mining Techniques in Big Data: Balancing Security and Usability". SHIFRA 2023 (10 de enero de 2023): 1–9. http://dx.doi.org/10.70470/shifra/2023/001.
Texto completoGruska, Damas P. "Differential Privacy and Security". Fundamenta Informaticae 143, n.º 1-2 (2 de febrero de 2016): 73–87. http://dx.doi.org/10.3233/fi-2016-1304.
Texto completoXiao, Xiaokui, Guozhang Wang y Johannes Gehrke. "Differential Privacy via Wavelet Transforms". IEEE Transactions on Knowledge and Data Engineering 23, n.º 8 (agosto de 2011): 1200–1214. http://dx.doi.org/10.1109/tkde.2010.247.
Texto completoZhang, Guowei, Shengjian Zhang, Zhiyi Man, Chenlin Cui y Wenli Hu. "Location Privacy Protection in Edge Computing: Co-Design of Differential Privacy and Offloading Mode". Electronics 13, n.º 13 (7 de julio de 2024): 2668. http://dx.doi.org/10.3390/electronics13132668.
Texto completoWang, Lin, Xingang Xu, Xuhui Zhao, Baozhu Li, Ruijuan Zheng y Qingtao Wu. "A randomized block policy gradient algorithm with differential privacy in Content Centric Networks". International Journal of Distributed Sensor Networks 17, n.º 12 (diciembre de 2021): 155014772110599. http://dx.doi.org/10.1177/15501477211059934.
Texto completoDu, Yuntao, Yujia Hu, Zhikun Zhang, Ziquan Fang, Lu Chen, Baihua Zheng y Yunjun Gao. "LDPTrace: Locally Differentially Private Trajectory Synthesis". Proceedings of the VLDB Endowment 16, n.º 8 (abril de 2023): 1897–909. http://dx.doi.org/10.14778/3594512.3594520.
Texto completoLu, Kangjie. "Noise Addition Strategies for Differential Privacy in Stochastic Gradient Descent". Transactions on Computer Science and Intelligent Systems Research 5 (12 de agosto de 2024): 960–67. http://dx.doi.org/10.62051/f2kew975.
Texto completoAdeyinka Ogunbajo, Itunu Taiwo, Adefemi Quddus Abidola, Oluwadamilola Fisayo Adediran y Israel Agbo-Adediran. "Privacy preserving AI models for decentralized data management in federated information systems". GSC Advanced Research and Reviews 22, n.º 2 (28 de febrero de 2025): 104–12. https://doi.org/10.30574/gscarr.2025.22.2.0043.
Texto completoShin, Hyejin, Sungwook Kim, Junbum Shin y Xiaokui Xiao. "Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy". IEEE Transactions on Knowledge and Data Engineering 30, n.º 9 (1 de septiembre de 2018): 1770–82. http://dx.doi.org/10.1109/tkde.2018.2805356.
Texto completoLiu, Fang. "Generalized Gaussian Mechanism for Differential Privacy". IEEE Transactions on Knowledge and Data Engineering 31, n.º 4 (1 de abril de 2019): 747–56. http://dx.doi.org/10.1109/tkde.2018.2845388.
Texto completoLaeuchli, Jesse, Yunior Ramírez-Cruz y Rolando Trujillo-Rasua. "Analysis of centrality measures under differential privacy models". Applied Mathematics and Computation 412 (enero de 2022): 126546. http://dx.doi.org/10.1016/j.amc.2021.126546.
Texto completoHan, Yuchen. "Research on machine learning technology with privacy protection strategy in recommendation field". Applied and Computational Engineering 43, n.º 1 (26 de febrero de 2024): 294–99. http://dx.doi.org/10.54254/2755-2721/43/20230848.
Texto completoMunn, Luke, Tsvetelina Hristova y Liam Magee. "Clouded data: Privacy and the promise of encryption". Big Data & Society 6, n.º 1 (enero de 2019): 205395171984878. http://dx.doi.org/10.1177/2053951719848781.
Texto completoZhao, Jianzhe, Mengbo Yang, Ronglin Zhang, Wuganjing Song, Jiali Zheng, Jingran Feng y Stan Matwin. "Privacy-Enhanced Federated Learning: A Restrictively Self-Sampled and Data-Perturbed Local Differential Privacy Method". Electronics 11, n.º 23 (2 de diciembre de 2022): 4007. http://dx.doi.org/10.3390/electronics11234007.
Texto completoXu, Shasha y Xiufang Yin. "Recommendation System for Privacy-Preserving Education Technologies". Computational Intelligence and Neuroscience 2022 (16 de abril de 2022): 1–8. http://dx.doi.org/10.1155/2022/3502992.
Texto completoVyas, Bhuman. "PRIVACY –PRESERVING DATA VAULTS: SAFE GUARDING PILL INFORMATION IN THE DIGITAL AGE". International Journal of Innovative Research in Advanced Engineering 06, n.º 10 (30 de octubre de 2019): 616–23. http://dx.doi.org/10.26562/ijirae.2019.v0610.04.
Texto completoYang, Zhijie, Xiaolong Yan, Guoguang Chen, Mingli Niu y Xiaoli Tian. "Towards Federated Robust Approximation of Nonlinear Systems with Differential Privacy Guarantee". Electronics 14, n.º 5 (26 de febrero de 2025): 937. https://doi.org/10.3390/electronics14050937.
Texto completoKim, Jong-Wook. "Differential Privacy-Based Data Collection for Improving Data Utility and Reducing Computational Overhead". Transactions of The Korean Institute of Electrical Engineers 74, n.º 1 (31 de enero de 2025): 102–8. https://doi.org/10.5370/kiee.2025.74.1.102.
Texto completoParvandeh, Saeid, Hung-Wen Yeh, Martin P. Paulus y Brett A. McKinney. "Consensus features nested cross-validation". Bioinformatics 36, n.º 10 (27 de enero de 2020): 3093–98. http://dx.doi.org/10.1093/bioinformatics/btaa046.
Texto completoWang, Ji, Weidong Bao, Lichao Sun, Xiaomin Zhu, Bokai Cao y Philip S. Yu. "Private Model Compression via Knowledge Distillation". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17 de julio de 2019): 1190–97. http://dx.doi.org/10.1609/aaai.v33i01.33011190.
Texto completoÖzdel, Süleyman, Efe Bozkir y Enkelejda Kasneci. "Privacy-preserving Scanpath Comparison for Pervasive Eye Tracking". Proceedings of the ACM on Human-Computer Interaction 8, ETRA (20 de mayo de 2024): 1–28. http://dx.doi.org/10.1145/3655605.
Texto completoMin, Minghui, Zeqian Liu, Jincheng Duan, Peng Zhang y Shiyin Li. "Safe-Learning-Based Location-Privacy-Preserved Task Offloading in Mobile Edge Computing". Electronics 13, n.º 1 (25 de diciembre de 2023): 89. http://dx.doi.org/10.3390/electronics13010089.
Texto completoChen, Xiang, Dun Zhang, Zhan-Qi Cui, Qing Gu y Xiao-Lin Ju. "DP-Share: Privacy-Preserving Software Defect Prediction Model Sharing Through Differential Privacy". Journal of Computer Science and Technology 34, n.º 5 (septiembre de 2019): 1020–38. http://dx.doi.org/10.1007/s11390-019-1958-0.
Texto completoDong, Yipeng, Wei Luo, Xiangyang Wang, Lei Zhang, Lin Xu, Zehao Zhou y Lulu Wang. "Multi-Task Federated Split Learning Across Multi-Modal Data with Privacy Preservation". Sensors 25, n.º 1 (3 de enero de 2025): 233. https://doi.org/10.3390/s25010233.
Texto completoElhattab, Fatima, Sara Bouchenak y Cédric Boscher. "PASTEL". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 7, n.º 4 (19 de diciembre de 2023): 1–29. http://dx.doi.org/10.1145/3633808.
Texto completoÖksüz, Abdullah Çağlar, Erman Ayday y Uğur Güdükbay. "Privacy-preserving and robust watermarking on sequential genome data using belief propagation and local differential privacy". Bioinformatics 37, n.º 17 (25 de febrero de 2021): 2668–74. http://dx.doi.org/10.1093/bioinformatics/btab128.
Texto completoLuo, Yuan y Nicholas R. Jennings. "A Differential Privacy Mechanism that Accounts for Network Effects for Crowdsourcing Systems". Journal of Artificial Intelligence Research 69 (3 de diciembre de 2020): 1127–64. http://dx.doi.org/10.1613/jair.1.12158.
Texto completoRahman, Ashequr, Asif Iqbal, Emon Ahmed, Tanvirahmedshuvo . y Md Risalat Hossain Ontor. "PRIVACY-PRESERVING MACHINE LEARNING: TECHNIQUES, CHALLENGES, AND FUTURE DIRECTIONS IN SAFEGUARDING PERSONAL DATA MANAGEMENT". Frontline Marketing, Management and Economics Journal 04, n.º 12 (1 de diciembre de 2024): 84–106. https://doi.org/10.37547/marketing-fmmej-04-12-07.
Texto completoRahman, Ashequr, Asif Iqbal, Emon Ahmed, Tanvirahmedshuvo . y Md Risalat Hossain Ontor. "PRIVACY-PRESERVING MACHINE LEARNING: TECHNIQUES, CHALLENGES, AND FUTURE DIRECTIONS IN SAFEGUARDING PERSONAL DATA MANAGEMENT". International journal of business and management sciences 04, n.º 12 (15 de diciembre de 2024): 18–32. https://doi.org/10.55640/ijbms-04-12-03.
Texto completoZhang, Lei y Lina Ge. "A clustering-based differential privacy protection algorithm for weighted social networks". Mathematical Biosciences and Engineering 21, n.º 3 (2024): 3755–33. http://dx.doi.org/10.3934/mbe.2024166.
Texto completoYeow, Sin-Qian y Kok-Why Ng. "Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques". JOIV : International Journal on Informatics Visualization 7, n.º 3-2 (30 de noviembre de 2023): 2086. http://dx.doi.org/10.30630/joiv.7.3-2.2336.
Texto completo