Gotowa bibliografia na temat „Utility-privacy trade-off”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Utility-privacy trade-off”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Utility-privacy trade-off"
Liu, Hai, Zhenqiang Wu, Yihui Zhou, Changgen Peng, Feng Tian i Laifeng Lu. "Privacy-Preserving Monotonicity of Differential Privacy Mechanisms". Applied Sciences 8, nr 11 (28.10.2018): 2081. http://dx.doi.org/10.3390/app8112081.
Pełny tekst źródłaAvent, Brendan, Javier González, Tom Diethe, Andrei Paleyes i Borja Balle. "Automatic Discovery of Privacy–Utility Pareto Fronts". Proceedings on Privacy Enhancing Technologies 2020, nr 4 (1.10.2020): 5–23. http://dx.doi.org/10.2478/popets-2020-0060.
Pełny tekst źródłaGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami i in. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques". Scientific Programming 2021 (28.12.2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Pełny tekst źródłaZeng, Xia, Chuanchuan Yang i Bin Dai. "Utility–Privacy Trade-Off in Distributed Machine Learning Systems". Entropy 24, nr 9 (14.09.2022): 1299. http://dx.doi.org/10.3390/e24091299.
Pełny tekst źródłaSrivastava, Saurabh, Vinay P. Namboodiri i T. V. Prabhakar. "Achieving Privacy-Utility Trade-off in existing Software Systems". Journal of Physics: Conference Series 1454 (luty 2020): 012004. http://dx.doi.org/10.1088/1742-6596/1454/1/012004.
Pełny tekst źródłaWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau i Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification". Applied Sciences 12, nr 21 (4.11.2022): 11177. http://dx.doi.org/10.3390/app122111177.
Pełny tekst źródłaMohammed, Kabiru, Aladdin Ayesh i Eerke Boiten. "Complementing Privacy and Utility Trade-Off with Self-Organising Maps". Cryptography 5, nr 3 (17.08.2021): 20. http://dx.doi.org/10.3390/cryptography5030020.
Pełny tekst źródłaKiranagi, Manasi, Devika Dhoble, Madeeha Tahoor i Dr Rekha Patil. "Finding Optimal Path and Privacy Preserving for Wireless Network". International Journal for Research in Applied Science and Engineering Technology 10, nr 10 (31.10.2022): 360–65. http://dx.doi.org/10.22214/ijraset.2022.46949.
Pełny tekst źródłaCai, Lin, Jinchuan Tang, Shuping Dang i Gaojie Chen. "Privacy protection and utility trade-off for social graph embedding". Information Sciences 676 (sierpień 2024): 120866. http://dx.doi.org/10.1016/j.ins.2024.120866.
Pełny tekst źródłaRassouli, Borzoo, i Deniz Gunduz. "Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure". IEEE Transactions on Information Forensics and Security 15 (2020): 594–603. http://dx.doi.org/10.1109/tifs.2019.2903658.
Pełny tekst źródłaRozprawy doktorskie na temat "Utility-privacy trade-off"
Aldà, Francesco [Verfasser], Hans Ulrich [Gutachter] Simon i Alexander [Gutachter] May. "On the trade-off between privacy and utility in statistical data analysis / Francesco Aldà ; Gutachter: Hans Ulrich Simon, Alexander May ; Fakultät für Mathematik". Bochum : Ruhr-Universität Bochum, 2018. http://d-nb.info/1161942416/34.
Pełny tekst źródłaKaplan, Caelin. "Compromis inhérents à l'apprentissage automatique préservant la confidentialité". Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4045.
Pełny tekst źródłaAs machine learning (ML) models are increasingly integrated into a wide range of applications, ensuring the privacy of individuals' data is becoming more important than ever. However, privacy-preserving ML techniques often result in reduced task-specific utility and may negatively impact other essential factors like fairness, robustness, and interpretability. These challenges have limited the widespread adoption of privacy-preserving methods. This thesis aims to address these challenges through two primary goals: (1) to deepen the understanding of key trade-offs in three privacy-preserving ML techniques—differential privacy, empirical privacy defenses, and federated learning; (2) to propose novel methods and algorithms that improve utility and effectiveness while maintaining privacy protections. The first study in this thesis investigates how differential privacy impacts fairness across groups defined by sensitive attributes. While previous assumptions suggested that differential privacy could exacerbate unfairness in ML models, our experiments demonstrate that selecting an optimal model architecture and tuning hyperparameters for DP-SGD (Differentially Private Stochastic Gradient Descent) can mitigate fairness disparities. Using standard ML fairness datasets, we show that group disparities in metrics like demographic parity, equalized odds, and predictive parity are often reduced or remain negligible when compared to non-private baselines, challenging the prevailing notion that differential privacy worsens fairness for underrepresented groups. The second study focuses on empirical privacy defenses, which aim to protect training data privacy while minimizing utility loss. Most existing defenses assume access to reference data---an additional dataset from the same or a similar distribution as the training data. However, previous works have largely neglected to evaluate the privacy risks associated with reference data. To address this, we conducted the first comprehensive analysis of reference data privacy in empirical defenses. We proposed a baseline defense method, Weighted Empirical Risk Minimization (WERM), which allows for a clearer understanding of the trade-offs between model utility, training data privacy, and reference data privacy. In addition to offering theoretical guarantees on model utility and the relative privacy of training and reference data, WERM consistently outperforms state-of-the-art empirical privacy defenses in nearly all relative privacy regimes.The third study addresses the convergence-related trade-offs in Collaborative Inference Systems (CISs), which are increasingly used in the Internet of Things (IoT) to enable smaller nodes in a network to offload part of their inference tasks to more powerful nodes. While Federated Learning (FL) is often used to jointly train models within CISs, traditional methods have overlooked the operational dynamics of these systems, such as heterogeneity in serving rates across nodes. We propose a novel FL approach explicitly designed for CISs, which accounts for varying serving rates and uneven data availability. Our framework provides theoretical guarantees and consistently outperforms state-of-the-art algorithms, particularly in scenarios where end devices handle high inference request rates.In conclusion, this thesis advances the field of privacy-preserving ML by addressing key trade-offs in differential privacy, empirical privacy defenses, and federated learning. The proposed methods provide new insights into balancing privacy with utility and other critical factors, offering practical solutions for integrating privacy-preserving techniques into real-world applications. These contributions aim to support the responsible and ethical deployment of AI technologies that prioritize data privacy and protection
Części książek na temat "Utility-privacy trade-off"
Alvim, Mário S., Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano i Catuscia Palamidessi. "Differential Privacy: On the Trade-Off between Utility and Information Leakage". W Lecture Notes in Computer Science, 39–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29420-4_3.
Pełny tekst źródłaTang, Jingye, Tianqing Zhu, Ping Xiong, Yu Wang i Wei Ren. "Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations". W Network and System Security, 342–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65745-1_20.
Pełny tekst źródłaRafiei, Majid, Frederik Wangelik i Wil M. P. van der Aalst. "TraVaS: Differentially Private Trace Variant Selection for Process Mining". W Lecture Notes in Business Information Processing, 114–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27815-0_9.
Pełny tekst źródłaThouvenot, Maxime, Olivier Curé, Lynda Temal, Sarra Ben Abbès i Philippe Calvez. "Knowledge Graph Publishing with Anatomy, Toward a New Privacy and Utility Trade-Off". W Advances in Knowledge Discovery and Management, 55–79. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-40403-0_3.
Pełny tekst źródłaPeng, Lian, i Meikang Qiu. "AI in Healthcare Data Privacy-Preserving: Enhanced Trade-Off Between Security and Utility". W Knowledge Science, Engineering and Management, 349–60. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5498-4_27.
Pełny tekst źródłaLiu, Yang, i Andrew Simpson. "On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study". W Computer Security, 261–78. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_17.
Pełny tekst źródłaGhatak, Debolina, i Kouichi Sakurai. "A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem". W Communications in Computer and Information Science, 167–80. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7769-5_13.
Pełny tekst źródłaDemir, Mehmet Özgün, Ali Emre Pusane, Guido Dartmann i Güneş Karabulut Kurt. "Utility privacy trade-off in communication systems". W Big Data Analytics for Cyber-Physical Systems, 293–314. Elsevier, 2019. http://dx.doi.org/10.1016/b978-0-12-816637-6.00014-2.
Pełny tekst źródłaKaabachi, Bayrem, Jérémie Despraz, Thierry Meurers, Fabian Prasser i Jean Louis Raisaro. "Generation and Evaluation of Synthetic Data in a University Hospital Setting". W Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti220420.
Pełny tekst źródłaCorbucci, Luca, Mikko A. Heikkilä, David Solans Noguero, Anna Monreale i Nicolas Kourtellis. "PUFFLE: Balancing Privacy, Utility, and Fairness in Federated Learning". W Frontiers in Artificial Intelligence and Applications. IOS Press, 2024. http://dx.doi.org/10.3233/faia240671.
Pełny tekst źródłaStreszczenia konferencji na temat "Utility-privacy trade-off"
Pohlhausen, Jule, Francesco Nespoli i Joerg Bitzer. "Long-Term Conversation Analysis: Privacy-Utility Trade-Off Under Noise and Reverberation". W 2024 18th International Workshop on Acoustic Signal Enhancement (IWAENC), 404–8. IEEE, 2024. http://dx.doi.org/10.1109/iwaenc61483.2024.10694640.
Pełny tekst źródłaNam, Seung-Hyun, Hyun-Young Park i Si-Hyeon Lee. "Achieving the Exactly Optimal Privacy-Utility Trade-Off with Low Communication Cost via Shared Randomness". W 2024 IEEE International Symposium on Information Theory (ISIT), 3065–70. IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619385.
Pełny tekst źródłaBaselizadeh, Adel, Diana Saplacan Lindblom, Weria Khaksar, Md Zia Uddin i Jim Torresen. "Comparative Analysis of Vision-Based Sensors for Human Monitoring in Care Robots: Exploring the Utility-Privacy Trade-off". W 2024 33rd IEEE International Conference on Robot and Human Interactive Communication (ROMAN), 1794–801. IEEE, 2024. http://dx.doi.org/10.1109/ro-man60168.2024.10731223.
Pełny tekst źródłaErdogdu, Murat A., i Nadia Fawaz. "Privacy-utility trade-off under continual observation". W 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282766.
Pełny tekst źródłaZhou, Yihui, Guangchen Song, Hai Liu i Laifeng Lu. "Privacy-Utility Trade-Off of K-Subset Mechanism". W 2018 International Conference on Networking and Network Applications (NaNA). IEEE, 2018. http://dx.doi.org/10.1109/nana.2018.8648741.
Pełny tekst źródłaLi, Mengqian, Youliang Tian, Junpeng Zhang, Dandan Fan i Dongmei Zhao. "The Trade-off Between Privacy and Utility in Local Differential Privacy". W 2021 International Conference on Networking and Network Applications (NaNA). IEEE, 2021. http://dx.doi.org/10.1109/nana53684.2021.00071.
Pełny tekst źródłaSreekumar, Sreejith, i Deniz Gunduz. "Optimal Privacy-Utility Trade-off under a Rate Constraint". W 2019 IEEE International Symposium on Information Theory (ISIT). IEEE, 2019. http://dx.doi.org/10.1109/isit.2019.8849330.
Pełny tekst źródłaAlvim, Mário S., Natasha Fernandes, Annabelle McIver i Gabriel H. Nunes. "The Privacy-Utility Trade-off in the Topics API". W CCS '24: ACM SIGSAC Conference on Computer and Communications Security, 1106–20. New York, NY, USA: ACM, 2024. https://doi.org/10.1145/3658644.3670368.
Pełny tekst źródłaZhou, Jinhao, Zhou Su, Jianbing Ni, Yuntao Wang, Yanghe Pan i Rui Xing. "Personalized Privacy-Preserving Federated Learning: Optimized Trade-off Between Utility and Privacy". W GLOBECOM 2022 - 2022 IEEE Global Communications Conference. IEEE, 2022. http://dx.doi.org/10.1109/globecom48099.2022.10000793.
Pełny tekst źródłaDemir, Mehmet Oezguen, Selahattin Goekceli, Guido Dartmann, Volker Luecken, Gerd Ascheid i Guenes Karabulut Kurt. "Utility Privacy Trade-Off for Noisy Channels in OFDM Systems". W 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). IEEE, 2017. http://dx.doi.org/10.1109/vtcfall.2017.8288194.
Pełny tekst źródła