Artículos de revistas sobre el tema "Text privacy"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Text privacy".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Kanyar, Mohammad Naeem. "Differential Privacy “Working Towards Differential Privacy for Sensitive Text “". International Journal of Engineering and Computer Science 12, n.º 04 (2 de abril de 2023): 25691–99. http://dx.doi.org/10.18535/ijecs/v12i04.4727.
Texto completoShree, A. N. Ramya y Kiran P. "Privacy Preserving Text Document Summarization". Journal of Engineering Research and Sciences 1, n.º 7 (julio de 2022): 7–14. http://dx.doi.org/10.55708/js0107002.
Texto completoBihani, Geetanjali. "Interpretable Privacy Preservation of Text Representations Using Vector Steganography". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 11 (28 de junio de 2022): 12872–73. http://dx.doi.org/10.1609/aaai.v36i11.21573.
Texto completoDopierała, Renata. "Społeczne wyobrażenia prywatności". Kultura i Społeczeństwo 50, n.º 1-2 (30 de marzo de 2006): 307–19. http://dx.doi.org/10.35757/kis.2006.50.1-2.14.
Texto completoLiang, Zi, Pinghui Wang, Ruofei Zhang, Nuo Xu, Shuo Zhang, Lifeng Xing, Haitao Bai y Ziyang Zhou. "MERGE: Fast Private Text Generation". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 18 (24 de marzo de 2024): 19884–92. http://dx.doi.org/10.1609/aaai.v38i18.29964.
Texto completoWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau y Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification". Applied Sciences 12, n.º 21 (4 de noviembre de 2022): 11177. http://dx.doi.org/10.3390/app122111177.
Texto completoPang, Hweehwa, Jialie Shen y Ramayya Krishnan. "Privacy-preserving similarity-based text retrieval". ACM Transactions on Internet Technology 10, n.º 1 (febrero de 2010): 1–39. http://dx.doi.org/10.1145/1667067.1667071.
Texto completoZhu, You-wen, Liu-sheng Huang, Dong Li y Wei Yang. "Privacy-preserving Text Information Hiding Detecting Algorithm". Journal of Electronics & Information Technology 33, n.º 2 (4 de marzo de 2011): 278–83. http://dx.doi.org/10.3724/sp.j.1146.2010.00375.
Texto completoTejaswini, G. "Cipher Text Policy Privacy Attribute-Based Security". International Journal of Reliable Information and Assurance 5, n.º 1 (30 de julio de 2017): 15–20. http://dx.doi.org/10.21742/ijria.2017.5.1.03.
Texto completoXiong, Xingxing, Shubo Liu, Dan Li, Jun Wang y Xiaoguang Niu. "Locally differentially private continuous location sharing with randomized response". International Journal of Distributed Sensor Networks 15, n.º 8 (agosto de 2019): 155014771987037. http://dx.doi.org/10.1177/1550147719870379.
Texto completoPang, HweeHwa, Xuhua Ding y Xiaokui Xiao. "Embellishing text search queries to protect user privacy". Proceedings of the VLDB Endowment 3, n.º 1-2 (septiembre de 2010): 598–607. http://dx.doi.org/10.14778/1920841.1920918.
Texto completoWitten, Ian H. y John G. Cleary. "On the privacy afforded by adaptive text compression". Computers & Security 7, n.º 4 (agosto de 1988): 397–408. http://dx.doi.org/10.1016/0167-4048(88)90580-9.
Texto completoKhatamova, Kamola. "MARKETING PRIVACY AND USING TEXT ON ONLINE ADVERTISING". International Journal of Word Art 1, n.º 1 (10 de enero de 2019): 108–14. http://dx.doi.org/10.26739/2181-9297-2019-1-16.
Texto completoLiu, Peng, Yan Bai, Lie Wang y Xianxian Li. "Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing". International Journal of Software Engineering and Knowledge Engineering 27, n.º 01 (febrero de 2017): 71–90. http://dx.doi.org/10.1142/s0218194017500048.
Texto completoFernández Barbudo, Carlos. "Privacidad (digital) = (Digital) Privacy". EUNOMÍA. Revista en Cultura de la Legalidad, n.º 17 (27 de septiembre de 2019): 276. http://dx.doi.org/10.20318/eunomia.2019.5033.
Texto completoDuan, Huabin, Jie Yang y Huanjun Yang. "A Blockchain-Based Privacy Protection Application for Logistics Big Data". Journal of Cases on Information Technology 24, n.º 5 (21 de febrero de 2022): 1–12. http://dx.doi.org/10.4018/jcit.295249.
Texto completoLiu, Gan, Xiongtao Sun, Yiran Li, Hui Li, Shuchang Zhao y Zhen Guo. "An Automatic Privacy-Aware Framework for Text Data in Online Social Network Based on a Multi-Deep Learning Model". International Journal of Intelligent Systems 2023 (8 de noviembre de 2023): 1–23. http://dx.doi.org/10.1155/2023/1727285.
Texto completoDa Silva Perez, Natália. "Privacy and Social Spaces". TSEG - The Low Countries Journal of Social and Economic History 18, n.º 3 (29 de noviembre de 2021): 5–16. http://dx.doi.org/10.52024/tseg.11040.
Texto completoAtaei, Mehrnaz, Auriol Degbelo, Christian Kray y Vitor Santos. "Complying with Privacy Legislation: From Legal Text to Implementation of Privacy-Aware Location-Based Services". ISPRS International Journal of Geo-Information 7, n.º 11 (13 de noviembre de 2018): 442. http://dx.doi.org/10.3390/ijgi7110442.
Texto completoMosier, Gregory C. "Text messages: privacy in employee communications in the USA". International Journal of Private Law 2, n.º 3 (2009): 260. http://dx.doi.org/10.1504/ijpl.2009.024142.
Texto completoBracamonte, Vanessa, Sebastian Pape y Sascha Loebner. "“All apps do this”: Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content". Proceedings on Privacy Enhancing Technologies 2022, n.º 3 (julio de 2022): 57–78. http://dx.doi.org/10.56553/popets-2022-0062.
Texto completoLibbi, Claudia Alessandra, Jan Trienes, Dolf Trieschnigg y Christin Seifert. "Generating Synthetic Training Data for Supervised De-Identification of Electronic Health Records". Future Internet 13, n.º 5 (20 de mayo de 2021): 136. http://dx.doi.org/10.3390/fi13050136.
Texto completoD’Acunto, David, Serena Volo y Raffaele Filieri. "“Most Americans like their privacy.” Exploring privacy concerns through US guests’ reviews". International Journal of Contemporary Hospitality Management 33, n.º 8 (26 de julio de 2021): 2773–98. http://dx.doi.org/10.1108/ijchm-11-2020-1329.
Texto completoAit-Mlouk, Addi, Sadi A. Alawadi, Salman Toor y Andreas Hellander. "FedQAS: Privacy-Aware Machine Reading Comprehension with Federated Learning". Applied Sciences 12, n.º 6 (18 de marzo de 2022): 3130. http://dx.doi.org/10.3390/app12063130.
Texto completoRamanath, Rohan, Florian Schaub, Shomir Wilson, Fei Liu, Norman Sadeh y Noah Smith. "Identifying Relevant Text Fragments to Help Crowdsource Privacy Policy Annotations". Proceedings of the AAAI Conference on Human Computation and Crowdsourcing 2 (5 de septiembre de 2014): 54–55. http://dx.doi.org/10.1609/hcomp.v2i1.13179.
Texto completoShenigaram, Vidhya, Susheel Kumar Thakur, Choul Praveen Kumar y Laxman Maddikunta. "SECURE DATA GROUP SHARING AND CONDITIONAL DISSEMINATION WITH MULTI-OWNER IN CLOUD COMPUTING". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, n.º 3 (17 de diciembre de 2018): 1312–18. http://dx.doi.org/10.61841/turcomat.v9i3.14475.
Texto completoXu, Zifeng, Fucai Zhou, Yuxi Li, Jian Xu y Qiang Wang. "Privacy-Preserving Subgraph Matching Protocol for Two Parties". International Journal of Foundations of Computer Science 30, n.º 04 (junio de 2019): 571–88. http://dx.doi.org/10.1142/s0129054119400136.
Texto completoWei, Weiming, Chunming Tang y Yucheng Chen. "Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation". Entropy 24, n.º 8 (18 de agosto de 2022): 1145. http://dx.doi.org/10.3390/e24081145.
Texto completoBoldt, Martin y Kaavya Rekanar. "Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies". International Journal of Information Security and Privacy 13, n.º 2 (abril de 2019): 47–66. http://dx.doi.org/10.4018/ijisp.2019040104.
Texto completoNing, Yichen, Na Wang, Aodi Liu y Xuehui du. "Deep Learning based Privacy Information Identification approach for Unstructured Text". Journal of Physics: Conference Series 1848, n.º 1 (1 de abril de 2021): 012032. http://dx.doi.org/10.1088/1742-6596/1848/1/012032.
Texto completoResende, Amanda, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento y Diego F. Aranha. "Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation". IEEE Transactions on Information Forensics and Security 17 (2022): 428–42. http://dx.doi.org/10.1109/tifs.2022.3144007.
Texto completoM, Priya. "PRIVACY ANALYSIS OF COMMENT USING TEXT MINING IN OSN FRAMEWORK". International Journal of Advanced Research in Computer Science 9, n.º 2 (20 de abril de 2018): 309–13. http://dx.doi.org/10.26483/ijarcs.v9i2.5765.
Texto completoZhan, Huixin y Victor S. Sheng. "Privacy-Preserving Representation Learning for Text-Attributed Networks with Simplicial Complexes". Proceedings of the AAAI Conference on Artificial Intelligence 37, n.º 13 (26 de junio de 2023): 16143–44. http://dx.doi.org/10.1609/aaai.v37i13.26932.
Texto completoChoi, Daeseon, Younho Lee, Seokhyun Kim y Pilsung Kang. "Private attribute inference from Facebook’s public text metadata: a case study of Korean users". Industrial Management & Data Systems 117, n.º 8 (11 de septiembre de 2017): 1687–706. http://dx.doi.org/10.1108/imds-07-2016-0276.
Texto completoPatergianakis, Antonios y Konstantinos Limniotis. "Privacy Issues in Stylometric Methods". Cryptography 6, n.º 2 (7 de abril de 2022): 17. http://dx.doi.org/10.3390/cryptography6020017.
Texto completoWang, Qiaozhi, Hao Xue, Fengjun Li, Dongwon Lee y Bo Luo. "#DontTweetThis: Scoring Private Information in Social Networks". Proceedings on Privacy Enhancing Technologies 2019, n.º 4 (1 de octubre de 2019): 72–92. http://dx.doi.org/10.2478/popets-2019-0059.
Texto completoFeng, Tao, Xudong Wang y Xinghua Li. "LBS privacy protection technology based on searchable encryption mechanism". MATEC Web of Conferences 189 (2018): 10013. http://dx.doi.org/10.1051/matecconf/201818910013.
Texto completoAl-Rabeeah, Abdullah Abdulabbas Nahi y Mohammed Mahdi Hashim. "Social Network Privacy Models". Cihan University-Erbil Scientific Journal 3, n.º 2 (20 de agosto de 2019): 92–101. http://dx.doi.org/10.24086/cuesj.v3n2y2019.pp92-101.
Texto completoSlobogin, Christopher. "The Sacred Fourth Amendment Text". Michigan Law Review Online, n.º 119 (2020): 17. http://dx.doi.org/10.36644/mlr.online.119.17.sacred.
Texto completoWang, Yansheng, Yongxin Tong y Dingyuan Shi. "Federated Latent Dirichlet Allocation: A Local Differential Privacy Based Framework". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 04 (3 de abril de 2020): 6283–90. http://dx.doi.org/10.1609/aaai.v34i04.6096.
Texto completoHu, Zhao-Wei y Jing Yang. "Trajectory Privacy Protection Based on Location Semantic Perception". International Journal of Cooperative Information Systems 28, n.º 03 (septiembre de 2019): 1950006. http://dx.doi.org/10.1142/s0218843019500060.
Texto completoMd, Abdul Quadir, Raghav V. Anand, Senthilkumar Mohan, Christy Jackson Joshua, Sabhari S. Girish, Anthra Devarajan y Celestine Iwendi. "Data-Driven Analysis of Privacy Policies Using LexRank and KL Summarizer for Environmental Sustainability". Sustainability 15, n.º 7 (29 de marzo de 2023): 5941. http://dx.doi.org/10.3390/su15075941.
Texto completoFord, Elizabeth, Malcolm Oswald, Lamiece Hassan, Kyle Bozentko, Goran Nenadic y Jackie Cassell. "Should free-text data in electronic medical records be shared for research? A citizens’ jury study in the UK". Journal of Medical Ethics 46, n.º 6 (26 de mayo de 2020): 367–77. http://dx.doi.org/10.1136/medethics-2019-105472.
Texto completoSui, Yi, Xiujuan Wang, Kangfeng Zheng, Yutong Shi y Siwei Cao. "Personality Privacy Protection Method of Social Users Based on Generative Adversarial Networks". Computational Intelligence and Neuroscience 2022 (13 de abril de 2022): 1–13. http://dx.doi.org/10.1155/2022/2419987.
Texto completoMeystre, Stéphane M., Óscar Ferrández, F. Jeffrey Friedlin, Brett R. South, Shuying Shen y Matthew H. Samore. "Text de-identification for privacy protection: A study of its impact on clinical text information content". Journal of Biomedical Informatics 50 (agosto de 2014): 142–50. http://dx.doi.org/10.1016/j.jbi.2014.01.011.
Texto completoKulkarni, Yogesh R. y T. Senthil Murugan. "Genetic grey wolf optimization and C-mixture for collaborative data publishing". International Journal of Modeling, Simulation, and Scientific Computing 09, n.º 06 (diciembre de 2018): 1850058. http://dx.doi.org/10.1142/s1793962318500587.
Texto completoWang, Lianhai y Chenxi Guan. "Improving Security in the Internet of Vehicles: A Blockchain-Based Data Sharing Scheme". Electronics 13, n.º 4 (9 de febrero de 2024): 714. http://dx.doi.org/10.3390/electronics13040714.
Texto completoRani, Dr V. Uma y Godavari S. L. S. Pranitha. "Quick Text Classification with Privacy Protection based on Secure Multiparty Computing". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 2098–104. http://dx.doi.org/10.22214/ijraset.2023.55480.
Texto completoWu, Zongda, Shigen Shen, Xinze Lian, Xinning Su y Enhong Chen. "A dummy-based user privacy protection approach for text information retrieval". Knowledge-Based Systems 195 (mayo de 2020): 105679. http://dx.doi.org/10.1016/j.knosys.2020.105679.
Texto completoLi, Xiaorong y Zhinian Shu. "Research on Big Data Text Clustering Algorithm Based on Swarm Intelligence". Wireless Communications and Mobile Computing 2022 (15 de abril de 2022): 1–10. http://dx.doi.org/10.1155/2022/7551035.
Texto completo