Artículos de revistas sobre el tema "Utility-privacy trade-off"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Utility-privacy trade-off".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Liu, Hai, Zhenqiang Wu, Yihui Zhou, Changgen Peng, Feng Tian y Laifeng Lu. "Privacy-Preserving Monotonicity of Differential Privacy Mechanisms". Applied Sciences 8, n.º 11 (28 de octubre de 2018): 2081. http://dx.doi.org/10.3390/app8112081.
Texto completoAvent, Brendan, Javier González, Tom Diethe, Andrei Paleyes y Borja Balle. "Automatic Discovery of Privacy–Utility Pareto Fronts". Proceedings on Privacy Enhancing Technologies 2020, n.º 4 (1 de octubre de 2020): 5–23. http://dx.doi.org/10.2478/popets-2020-0060.
Texto completoGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami et al. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques". Scientific Programming 2021 (28 de diciembre de 2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Texto completoZeng, Xia, Chuanchuan Yang y Bin Dai. "Utility–Privacy Trade-Off in Distributed Machine Learning Systems". Entropy 24, n.º 9 (14 de septiembre de 2022): 1299. http://dx.doi.org/10.3390/e24091299.
Texto completoSrivastava, Saurabh, Vinay P. Namboodiri y T. V. Prabhakar. "Achieving Privacy-Utility Trade-off in existing Software Systems". Journal of Physics: Conference Series 1454 (febrero de 2020): 012004. http://dx.doi.org/10.1088/1742-6596/1454/1/012004.
Texto completoWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau y Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification". Applied Sciences 12, n.º 21 (4 de noviembre de 2022): 11177. http://dx.doi.org/10.3390/app122111177.
Texto completoMohammed, Kabiru, Aladdin Ayesh y Eerke Boiten. "Complementing Privacy and Utility Trade-Off with Self-Organising Maps". Cryptography 5, n.º 3 (17 de agosto de 2021): 20. http://dx.doi.org/10.3390/cryptography5030020.
Texto completoKiranagi, Manasi, Devika Dhoble, Madeeha Tahoor y Dr Rekha Patil. "Finding Optimal Path and Privacy Preserving for Wireless Network". International Journal for Research in Applied Science and Engineering Technology 10, n.º 10 (31 de octubre de 2022): 360–65. http://dx.doi.org/10.22214/ijraset.2022.46949.
Texto completoCai, Lin, Jinchuan Tang, Shuping Dang y Gaojie Chen. "Privacy protection and utility trade-off for social graph embedding". Information Sciences 676 (agosto de 2024): 120866. http://dx.doi.org/10.1016/j.ins.2024.120866.
Texto completoRassouli, Borzoo y Deniz Gunduz. "Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure". IEEE Transactions on Information Forensics and Security 15 (2020): 594–603. http://dx.doi.org/10.1109/tifs.2019.2903658.
Texto completoFranzen, Daniel, Claudia Müller-Birn y Odette Wegwarth. "Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential Privacy". Proceedings of the ACM on Human-Computer Interaction 8, CSCW1 (17 de abril de 2024): 1–56. http://dx.doi.org/10.1145/3637309.
Texto completoTasnim, Naima, Jafar Mohammadi, Anand D. Sarwate y Hafiz Imtiaz. "Approximating Functions with Approximate Privacy for Applications in Signal Estimation and Learning". Entropy 25, n.º 5 (22 de mayo de 2023): 825. http://dx.doi.org/10.3390/e25050825.
Texto completoKremer, Steve. "Security and Privacy Column". ACM SIGLOG News 10, n.º 1 (enero de 2023): 3. http://dx.doi.org/10.1145/3584676.3584679.
Texto completoDe, Abir y Soumen Chakrabarti. "Differentially Private Link Prediction with Protected Connections". Proceedings of the AAAI Conference on Artificial Intelligence 35, n.º 1 (18 de mayo de 2021): 63–71. http://dx.doi.org/10.1609/aaai.v35i1.16078.
Texto completoMiller, Jim. "Who Are You? The Trade-Off between Information Utility and Privacy". IEEE Internet Computing 12, n.º 4 (julio de 2008): 93–96. http://dx.doi.org/10.1109/mic.2008.91.
Texto completoZhan, Yuting, Hamed Haddadi y Afra Mashhadi. "Privacy-Aware Adversarial Network in Human Mobility Prediction". Proceedings on Privacy Enhancing Technologies 2023, n.º 1 (enero de 2023): 556–70. http://dx.doi.org/10.56553/popets-2023-0032.
Texto completoChen, Youqin, Zhengquan Xu, Jianzhang Chen y Shan Jia. "B-DP: Dynamic Collection and Publishing of Continuous Check-In Data with Best-Effort Differential Privacy". Entropy 24, n.º 3 (14 de marzo de 2022): 404. http://dx.doi.org/10.3390/e24030404.
Texto completoChandrasekaran, Varun, Chuhan Gao, Brian Tang, Kassem Fawaz, Somesh Jha y Suman Banerjee. "Face-Off: Adversarial Face Obfuscation". Proceedings on Privacy Enhancing Technologies 2021, n.º 2 (29 de enero de 2021): 369–90. http://dx.doi.org/10.2478/popets-2021-0032.
Texto completoWu, Qihong, Jinchuan Tang, Shuping Dang y Gaojie Chen. "Data privacy and utility trade-off based on mutual information neural estimator". Expert Systems with Applications 207 (noviembre de 2022): 118012. http://dx.doi.org/10.1016/j.eswa.2022.118012.
Texto completoYao, Xin, Juan Yu, Jianmin Han, Jianfeng Lu, Hao Peng, Yijia Wu y Xiaoqian Cao. "DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism". ISPRS International Journal of Geo-Information 11, n.º 12 (5 de diciembre de 2022): 607. http://dx.doi.org/10.3390/ijgi11120607.
Texto completoZhang, Xiao-Yu, Stefanie Kuenzel, José-Rodrigo Córdoba-Pachón y Chris Watkins. "Privacy-Functionality Trade-Off: A Privacy-Preserving Multi-Channel Smart Metering System". Energies 13, n.º 12 (21 de junio de 2020): 3221. http://dx.doi.org/10.3390/en13123221.
Texto completoZhao, Jianzhe, Keming Mao, Chenxi Huang y Yuyang Zeng. "Utility Optimization of Federated Learning with Differential Privacy". Discrete Dynamics in Nature and Society 2021 (8 de octubre de 2021): 1–14. http://dx.doi.org/10.1155/2021/3344862.
Texto completoXue, Lulu, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun y Dezhong Yao. "Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 6 (24 de marzo de 2024): 6404–12. http://dx.doi.org/10.1609/aaai.v38i6.28460.
Texto completoZhou, Xingcai y Yu Xiang. "ADMM-Based Differential Privacy Learning for Penalized Quantile Regression on Distributed Functional Data". Mathematics 10, n.º 16 (16 de agosto de 2022): 2954. http://dx.doi.org/10.3390/math10162954.
Texto completoLi, Qiyu, Chunlai Zhou, Biao Qin y Zhiqiang Xu. "Local Differential Privacy for Belief Functions". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 9 (28 de junio de 2022): 10025–33. http://dx.doi.org/10.1609/aaai.v36i9.21241.
Texto completoCao, Hui, Shubo Liu, Renfang Zhao y Xingxing Xiong. "IFed: A novel federated learning framework for local differential privacy in Power Internet of Things". International Journal of Distributed Sensor Networks 16, n.º 5 (mayo de 2020): 155014772091969. http://dx.doi.org/10.1177/1550147720919698.
Texto completoBoenisch, Franziska, Christopher Mühl, Roy Rinberg, Jannis Ihrig y Adam Dziedzic. "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees". Proceedings on Privacy Enhancing Technologies 2023, n.º 1 (enero de 2023): 158–76. http://dx.doi.org/10.56553/popets-2023-0010.
Texto completoShibata, Hisaichi, Shouhei Hanaoka, Saori Koshino, Soichiro Miki, Yuki Sonoda y Osamu Abe. "Identity Diffuser: Preserving Abnormal Region of Interests While Diffusing Identity". Applied Sciences 14, n.º 18 (20 de septiembre de 2024): 8489. http://dx.doi.org/10.3390/app14188489.
Texto completoGrigoraș, Alexandru y Florin Leon. "Synthetic Time Series Generation for Decision Intelligence Using Large Language Models". Mathematics 12, n.º 16 (13 de agosto de 2024): 2494. http://dx.doi.org/10.3390/math12162494.
Texto completoThantharate, Pratik, Shyam Bhojwani y Anurag Thantharate. "DPShield: Optimizing Differential Privacy for High-Utility Data Analysis in Sensitive Domains". Electronics 13, n.º 12 (14 de junio de 2024): 2333. http://dx.doi.org/10.3390/electronics13122333.
Texto completoTriastcyn, Aleksei y Boi Faltings. "Generating Higher-Fidelity Synthetic Datasets with Privacy Guarantees". Algorithms 15, n.º 7 (1 de julio de 2022): 232. http://dx.doi.org/10.3390/a15070232.
Texto completoVijayan, Naveen Edapurath. "Privacy-Preserving Analytics in HR Tech- Federated Learning and Differential Privacy Techniques for Sensitive Data". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 11 (10 de noviembre de 2024): 1–6. http://dx.doi.org/10.55041/ijsrem11473.
Texto completoPuaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing". International Journal of Strategic Information Technology and Applications 10, n.º 1 (enero de 2019): 1–22. http://dx.doi.org/10.4018/ijsita.2019010101.
Texto completoBuchholz, Erik, Alsharif Abuadbba, Shuo Wang, Surya Nepal y Salil S. Kanhere. "SoK: Can Trajectory Generation Combine Privacy and Utility?" Proceedings on Privacy Enhancing Technologies 2024, n.º 3 (julio de 2024): 75–93. http://dx.doi.org/10.56553/popets-2024-0068.
Texto completoKaplan, Caelin, Chuan Xu, Othmane Marfoq, Giovanni Neglia y Anderson Santana de Oliveira. "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses". Proceedings on Privacy Enhancing Technologies 2024, n.º 1 (enero de 2024): 525–48. http://dx.doi.org/10.56553/popets-2024-0031.
Texto completoXiao, Taihong, Yi-Hsuan Tsai, Kihyuk Sohn, Manmohan Chandraker y Ming-Hsuan Yang. "Adversarial Learning of Privacy-Preserving and Task-Oriented Representations". Proceedings of the AAAI Conference on Artificial Intelligence 34, n.º 07 (3 de abril de 2020): 12434–41. http://dx.doi.org/10.1609/aaai.v34i07.6930.
Texto completoVepakomma, Praneeth, Julia Balla y Ramesh Raskar. "PrivateMail: Supervised Manifold Learning of Deep Features with Privacy for Image Retrieval". Proceedings of the AAAI Conference on Artificial Intelligence 36, n.º 8 (28 de junio de 2022): 8503–11. http://dx.doi.org/10.1609/aaai.v36i8.20827.
Texto completoTakagi, Shun, Li Xiong, Fumiyuki Kato, Yang Cao y Masatoshi Yoshikawa. "HRNet: Differentially Private Hierarchical and Multi-Resolution Network for Human Mobility Data Synthesization". Proceedings of the VLDB Endowment 17, n.º 11 (julio de 2024): 3058–71. http://dx.doi.org/10.14778/3681954.3681983.
Texto completoMiller, Jim. "Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy". IEEE Internet Computing 12, n.º 6 (noviembre de 2008): 91–93. http://dx.doi.org/10.1109/mic.2008.135.
Texto completoChen, E., Yang Cao y Yifei Ge. "A Generalized Shuffle Framework for Privacy Amplification: Strengthening Privacy Guarantees and Enhancing Utility". Proceedings of the AAAI Conference on Artificial Intelligence 38, n.º 10 (24 de marzo de 2024): 11267–75. http://dx.doi.org/10.1609/aaai.v38i10.29005.
Texto completoSohail, Syeda Amna, Faiza Allah Bukhsh y Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata". Applied Sciences 11, n.º 22 (12 de noviembre de 2021): 10686. http://dx.doi.org/10.3390/app112210686.
Texto completoVerma, Kishore S., A. Rajesh y Adeline J. S. Johnsana. "An Improved Classification Analysis on Utility Aware K-Anonymized Dataset". Journal of Computational and Theoretical Nanoscience 16, n.º 2 (1 de febrero de 2019): 445–52. http://dx.doi.org/10.1166/jctn.2019.7748.
Texto completoMohammady, Meisam, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi y Mourad Debbabi. "A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization". ACM Transactions on Privacy and Security 24, n.º 3 (31 de agosto de 2021): 1–36. http://dx.doi.org/10.1145/3439732.
Texto completoLiu, Xuan, Genlang Chen, Shiting Wen y Guanghui Song. "An Improved Sanitization Algorithm in Privacy-Preserving Utility Mining". Mathematical Problems in Engineering 2020 (25 de abril de 2020): 1–14. http://dx.doi.org/10.1155/2020/7489045.
Texto completoHirschprung, Ron S. y Shani Alkoby. "A Game Theory Approach for Assisting Humans in Online Information-Sharing". Information 13, n.º 4 (2 de abril de 2022): 183. http://dx.doi.org/10.3390/info13040183.
Texto completoKamalaruban, Parameswaran, Victor Perrier, Hassan Jameel Asghar y Mohamed Ali Kaafar. "Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries". Proceedings on Privacy Enhancing Technologies 2020, n.º 1 (1 de enero de 2020): 103–25. http://dx.doi.org/10.2478/popets-2020-0007.
Texto completoEt. al., Waleed M. Ead,. "A General Framework Information Loss of Utility-Based Anonymization in Data Publishing". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 5 (11 de abril de 2021): 1450–56. http://dx.doi.org/10.17762/turcomat.v12i5.2102.
Texto completoPilgram, Lisa, Thierry Meurers, Bradley Malin, Elke Schaeffner, Kai-Uwe Eckardt y Fabian Prasser. "The Costs of Anonymization: Case Study Using Clinical Data". Journal of Medical Internet Research 26 (24 de abril de 2024): e49445. http://dx.doi.org/10.2196/49445.
Texto completoSong, Yi, Xuesong Lu, Sadegh Nobari, Stéphane Bressan y Panagiotis Karras. "On the Privacy and Utility of Anonymized Social Networks". International Journal of Adaptive, Resilient and Autonomic Systems 4, n.º 2 (abril de 2013): 1–34. http://dx.doi.org/10.4018/jaras.2013040101.
Texto completoHemmatazad, Nolan, Robin Gandhi, Qiuming Zhu y Sanjukta Bhowmick. "The Intelligent Data Brokerage". International Journal of Privacy and Health Information Management 2, n.º 1 (enero de 2014): 22–33. http://dx.doi.org/10.4018/ijphim.2014010102.
Texto completo