Articoli di riviste sul tema "Utility-privacy trade-off"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Utility-privacy trade-off".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Liu, Hai, Zhenqiang Wu, Yihui Zhou, Changgen Peng, Feng Tian e Laifeng Lu. "Privacy-Preserving Monotonicity of Differential Privacy Mechanisms". Applied Sciences 8, n. 11 (28 ottobre 2018): 2081. http://dx.doi.org/10.3390/app8112081.
Testo completoAvent, Brendan, Javier González, Tom Diethe, Andrei Paleyes e Borja Balle. "Automatic Discovery of Privacy–Utility Pareto Fronts". Proceedings on Privacy Enhancing Technologies 2020, n. 4 (1 ottobre 2020): 5–23. http://dx.doi.org/10.2478/popets-2020-0060.
Testo completoGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami et al. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques". Scientific Programming 2021 (28 dicembre 2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Testo completoZeng, Xia, Chuanchuan Yang e Bin Dai. "Utility–Privacy Trade-Off in Distributed Machine Learning Systems". Entropy 24, n. 9 (14 settembre 2022): 1299. http://dx.doi.org/10.3390/e24091299.
Testo completoSrivastava, Saurabh, Vinay P. Namboodiri e T. V. Prabhakar. "Achieving Privacy-Utility Trade-off in existing Software Systems". Journal of Physics: Conference Series 1454 (febbraio 2020): 012004. http://dx.doi.org/10.1088/1742-6596/1454/1/012004.
Testo completoWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau e Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification". Applied Sciences 12, n. 21 (4 novembre 2022): 11177. http://dx.doi.org/10.3390/app122111177.
Testo completoMohammed, Kabiru, Aladdin Ayesh e Eerke Boiten. "Complementing Privacy and Utility Trade-Off with Self-Organising Maps". Cryptography 5, n. 3 (17 agosto 2021): 20. http://dx.doi.org/10.3390/cryptography5030020.
Testo completoKiranagi, Manasi, Devika Dhoble, Madeeha Tahoor e Dr Rekha Patil. "Finding Optimal Path and Privacy Preserving for Wireless Network". International Journal for Research in Applied Science and Engineering Technology 10, n. 10 (31 ottobre 2022): 360–65. http://dx.doi.org/10.22214/ijraset.2022.46949.
Testo completoCai, Lin, Jinchuan Tang, Shuping Dang e Gaojie Chen. "Privacy protection and utility trade-off for social graph embedding". Information Sciences 676 (agosto 2024): 120866. http://dx.doi.org/10.1016/j.ins.2024.120866.
Testo completoRassouli, Borzoo, e Deniz Gunduz. "Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure". IEEE Transactions on Information Forensics and Security 15 (2020): 594–603. http://dx.doi.org/10.1109/tifs.2019.2903658.
Testo completoFranzen, Daniel, Claudia Müller-Birn e Odette Wegwarth. "Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential Privacy". Proceedings of the ACM on Human-Computer Interaction 8, CSCW1 (17 aprile 2024): 1–56. http://dx.doi.org/10.1145/3637309.
Testo completoTasnim, Naima, Jafar Mohammadi, Anand D. Sarwate e Hafiz Imtiaz. "Approximating Functions with Approximate Privacy for Applications in Signal Estimation and Learning". Entropy 25, n. 5 (22 maggio 2023): 825. http://dx.doi.org/10.3390/e25050825.
Testo completoKremer, Steve. "Security and Privacy Column". ACM SIGLOG News 10, n. 1 (gennaio 2023): 3. http://dx.doi.org/10.1145/3584676.3584679.
Testo completoDe, Abir, e Soumen Chakrabarti. "Differentially Private Link Prediction with Protected Connections". Proceedings of the AAAI Conference on Artificial Intelligence 35, n. 1 (18 maggio 2021): 63–71. http://dx.doi.org/10.1609/aaai.v35i1.16078.
Testo completoMiller, Jim. "Who Are You? The Trade-Off between Information Utility and Privacy". IEEE Internet Computing 12, n. 4 (luglio 2008): 93–96. http://dx.doi.org/10.1109/mic.2008.91.
Testo completoZhan, Yuting, Hamed Haddadi e Afra Mashhadi. "Privacy-Aware Adversarial Network in Human Mobility Prediction". Proceedings on Privacy Enhancing Technologies 2023, n. 1 (gennaio 2023): 556–70. http://dx.doi.org/10.56553/popets-2023-0032.
Testo completoChen, Youqin, Zhengquan Xu, Jianzhang Chen e Shan Jia. "B-DP: Dynamic Collection and Publishing of Continuous Check-In Data with Best-Effort Differential Privacy". Entropy 24, n. 3 (14 marzo 2022): 404. http://dx.doi.org/10.3390/e24030404.
Testo completoChandrasekaran, Varun, Chuhan Gao, Brian Tang, Kassem Fawaz, Somesh Jha e Suman Banerjee. "Face-Off: Adversarial Face Obfuscation". Proceedings on Privacy Enhancing Technologies 2021, n. 2 (29 gennaio 2021): 369–90. http://dx.doi.org/10.2478/popets-2021-0032.
Testo completoWu, Qihong, Jinchuan Tang, Shuping Dang e Gaojie Chen. "Data privacy and utility trade-off based on mutual information neural estimator". Expert Systems with Applications 207 (novembre 2022): 118012. http://dx.doi.org/10.1016/j.eswa.2022.118012.
Testo completoYao, Xin, Juan Yu, Jianmin Han, Jianfeng Lu, Hao Peng, Yijia Wu e Xiaoqian Cao. "DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism". ISPRS International Journal of Geo-Information 11, n. 12 (5 dicembre 2022): 607. http://dx.doi.org/10.3390/ijgi11120607.
Testo completoZhang, Xiao-Yu, Stefanie Kuenzel, José-Rodrigo Córdoba-Pachón e Chris Watkins. "Privacy-Functionality Trade-Off: A Privacy-Preserving Multi-Channel Smart Metering System". Energies 13, n. 12 (21 giugno 2020): 3221. http://dx.doi.org/10.3390/en13123221.
Testo completoZhao, Jianzhe, Keming Mao, Chenxi Huang e Yuyang Zeng. "Utility Optimization of Federated Learning with Differential Privacy". Discrete Dynamics in Nature and Society 2021 (8 ottobre 2021): 1–14. http://dx.doi.org/10.1155/2021/3344862.
Testo completoXue, Lulu, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun e Dezhong Yao. "Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 38, n. 6 (24 marzo 2024): 6404–12. http://dx.doi.org/10.1609/aaai.v38i6.28460.
Testo completoZhou, Xingcai, e Yu Xiang. "ADMM-Based Differential Privacy Learning for Penalized Quantile Regression on Distributed Functional Data". Mathematics 10, n. 16 (16 agosto 2022): 2954. http://dx.doi.org/10.3390/math10162954.
Testo completoLi, Qiyu, Chunlai Zhou, Biao Qin e Zhiqiang Xu. "Local Differential Privacy for Belief Functions". Proceedings of the AAAI Conference on Artificial Intelligence 36, n. 9 (28 giugno 2022): 10025–33. http://dx.doi.org/10.1609/aaai.v36i9.21241.
Testo completoCao, Hui, Shubo Liu, Renfang Zhao e Xingxing Xiong. "IFed: A novel federated learning framework for local differential privacy in Power Internet of Things". International Journal of Distributed Sensor Networks 16, n. 5 (maggio 2020): 155014772091969. http://dx.doi.org/10.1177/1550147720919698.
Testo completoBoenisch, Franziska, Christopher Mühl, Roy Rinberg, Jannis Ihrig e Adam Dziedzic. "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees". Proceedings on Privacy Enhancing Technologies 2023, n. 1 (gennaio 2023): 158–76. http://dx.doi.org/10.56553/popets-2023-0010.
Testo completoShibata, Hisaichi, Shouhei Hanaoka, Saori Koshino, Soichiro Miki, Yuki Sonoda e Osamu Abe. "Identity Diffuser: Preserving Abnormal Region of Interests While Diffusing Identity". Applied Sciences 14, n. 18 (20 settembre 2024): 8489. http://dx.doi.org/10.3390/app14188489.
Testo completoGrigoraș, Alexandru, e Florin Leon. "Synthetic Time Series Generation for Decision Intelligence Using Large Language Models". Mathematics 12, n. 16 (13 agosto 2024): 2494. http://dx.doi.org/10.3390/math12162494.
Testo completoThantharate, Pratik, Shyam Bhojwani e Anurag Thantharate. "DPShield: Optimizing Differential Privacy for High-Utility Data Analysis in Sensitive Domains". Electronics 13, n. 12 (14 giugno 2024): 2333. http://dx.doi.org/10.3390/electronics13122333.
Testo completoTriastcyn, Aleksei, e Boi Faltings. "Generating Higher-Fidelity Synthetic Datasets with Privacy Guarantees". Algorithms 15, n. 7 (1 luglio 2022): 232. http://dx.doi.org/10.3390/a15070232.
Testo completoVijayan, Naveen Edapurath. "Privacy-Preserving Analytics in HR Tech- Federated Learning and Differential Privacy Techniques for Sensitive Data". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n. 11 (10 novembre 2024): 1–6. http://dx.doi.org/10.55041/ijsrem11473.
Testo completoPuaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing". International Journal of Strategic Information Technology and Applications 10, n. 1 (gennaio 2019): 1–22. http://dx.doi.org/10.4018/ijsita.2019010101.
Testo completoBuchholz, Erik, Alsharif Abuadbba, Shuo Wang, Surya Nepal e Salil S. Kanhere. "SoK: Can Trajectory Generation Combine Privacy and Utility?" Proceedings on Privacy Enhancing Technologies 2024, n. 3 (luglio 2024): 75–93. http://dx.doi.org/10.56553/popets-2024-0068.
Testo completoKaplan, Caelin, Chuan Xu, Othmane Marfoq, Giovanni Neglia e Anderson Santana de Oliveira. "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses". Proceedings on Privacy Enhancing Technologies 2024, n. 1 (gennaio 2024): 525–48. http://dx.doi.org/10.56553/popets-2024-0031.
Testo completoXiao, Taihong, Yi-Hsuan Tsai, Kihyuk Sohn, Manmohan Chandraker e Ming-Hsuan Yang. "Adversarial Learning of Privacy-Preserving and Task-Oriented Representations". Proceedings of the AAAI Conference on Artificial Intelligence 34, n. 07 (3 aprile 2020): 12434–41. http://dx.doi.org/10.1609/aaai.v34i07.6930.
Testo completoVepakomma, Praneeth, Julia Balla e Ramesh Raskar. "PrivateMail: Supervised Manifold Learning of Deep Features with Privacy for Image Retrieval". Proceedings of the AAAI Conference on Artificial Intelligence 36, n. 8 (28 giugno 2022): 8503–11. http://dx.doi.org/10.1609/aaai.v36i8.20827.
Testo completoTakagi, Shun, Li Xiong, Fumiyuki Kato, Yang Cao e Masatoshi Yoshikawa. "HRNet: Differentially Private Hierarchical and Multi-Resolution Network for Human Mobility Data Synthesization". Proceedings of the VLDB Endowment 17, n. 11 (luglio 2024): 3058–71. http://dx.doi.org/10.14778/3681954.3681983.
Testo completoMiller, Jim. "Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy". IEEE Internet Computing 12, n. 6 (novembre 2008): 91–93. http://dx.doi.org/10.1109/mic.2008.135.
Testo completoChen, E., Yang Cao e Yifei Ge. "A Generalized Shuffle Framework for Privacy Amplification: Strengthening Privacy Guarantees and Enhancing Utility". Proceedings of the AAAI Conference on Artificial Intelligence 38, n. 10 (24 marzo 2024): 11267–75. http://dx.doi.org/10.1609/aaai.v38i10.29005.
Testo completoSohail, Syeda Amna, Faiza Allah Bukhsh e Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata". Applied Sciences 11, n. 22 (12 novembre 2021): 10686. http://dx.doi.org/10.3390/app112210686.
Testo completoVerma, Kishore S., A. Rajesh e Adeline J. S. Johnsana. "An Improved Classification Analysis on Utility Aware K-Anonymized Dataset". Journal of Computational and Theoretical Nanoscience 16, n. 2 (1 febbraio 2019): 445–52. http://dx.doi.org/10.1166/jctn.2019.7748.
Testo completoMohammady, Meisam, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi e Mourad Debbabi. "A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization". ACM Transactions on Privacy and Security 24, n. 3 (31 agosto 2021): 1–36. http://dx.doi.org/10.1145/3439732.
Testo completoLiu, Xuan, Genlang Chen, Shiting Wen e Guanghui Song. "An Improved Sanitization Algorithm in Privacy-Preserving Utility Mining". Mathematical Problems in Engineering 2020 (25 aprile 2020): 1–14. http://dx.doi.org/10.1155/2020/7489045.
Testo completoHirschprung, Ron S., e Shani Alkoby. "A Game Theory Approach for Assisting Humans in Online Information-Sharing". Information 13, n. 4 (2 aprile 2022): 183. http://dx.doi.org/10.3390/info13040183.
Testo completoKamalaruban, Parameswaran, Victor Perrier, Hassan Jameel Asghar e Mohamed Ali Kaafar. "Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries". Proceedings on Privacy Enhancing Technologies 2020, n. 1 (1 gennaio 2020): 103–25. http://dx.doi.org/10.2478/popets-2020-0007.
Testo completoEt. al., Waleed M. Ead,. "A General Framework Information Loss of Utility-Based Anonymization in Data Publishing". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n. 5 (11 aprile 2021): 1450–56. http://dx.doi.org/10.17762/turcomat.v12i5.2102.
Testo completoPilgram, Lisa, Thierry Meurers, Bradley Malin, Elke Schaeffner, Kai-Uwe Eckardt e Fabian Prasser. "The Costs of Anonymization: Case Study Using Clinical Data". Journal of Medical Internet Research 26 (24 aprile 2024): e49445. http://dx.doi.org/10.2196/49445.
Testo completoSong, Yi, Xuesong Lu, Sadegh Nobari, Stéphane Bressan e Panagiotis Karras. "On the Privacy and Utility of Anonymized Social Networks". International Journal of Adaptive, Resilient and Autonomic Systems 4, n. 2 (aprile 2013): 1–34. http://dx.doi.org/10.4018/jaras.2013040101.
Testo completoHemmatazad, Nolan, Robin Gandhi, Qiuming Zhu e Sanjukta Bhowmick. "The Intelligent Data Brokerage". International Journal of Privacy and Health Information Management 2, n. 1 (gennaio 2014): 22–33. http://dx.doi.org/10.4018/ijphim.2014010102.
Testo completo