Artykuły w czasopismach na temat „Utility-privacy trade-off”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Utility-privacy trade-off”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Liu, Hai, Zhenqiang Wu, Yihui Zhou, Changgen Peng, Feng Tian i Laifeng Lu. "Privacy-Preserving Monotonicity of Differential Privacy Mechanisms". Applied Sciences 8, nr 11 (28.10.2018): 2081. http://dx.doi.org/10.3390/app8112081.
Pełny tekst źródłaAvent, Brendan, Javier González, Tom Diethe, Andrei Paleyes i Borja Balle. "Automatic Discovery of Privacy–Utility Pareto Fronts". Proceedings on Privacy Enhancing Technologies 2020, nr 4 (1.10.2020): 5–23. http://dx.doi.org/10.2478/popets-2020-0060.
Pełny tekst źródłaGobinathan, B., M. A. Mukunthan, S. Surendran, K. Somasundaram, Syed Abdul Moeed, P. Niranjan, V. Gouthami i in. "A Novel Method to Solve Real Time Security Issues in Software Industry Using Advanced Cryptographic Techniques". Scientific Programming 2021 (28.12.2021): 1–9. http://dx.doi.org/10.1155/2021/3611182.
Pełny tekst źródłaZeng, Xia, Chuanchuan Yang i Bin Dai. "Utility–Privacy Trade-Off in Distributed Machine Learning Systems". Entropy 24, nr 9 (14.09.2022): 1299. http://dx.doi.org/10.3390/e24091299.
Pełny tekst źródłaSrivastava, Saurabh, Vinay P. Namboodiri i T. V. Prabhakar. "Achieving Privacy-Utility Trade-off in existing Software Systems". Journal of Physics: Conference Series 1454 (luty 2020): 012004. http://dx.doi.org/10.1088/1742-6596/1454/1/012004.
Pełny tekst źródłaWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau i Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification". Applied Sciences 12, nr 21 (4.11.2022): 11177. http://dx.doi.org/10.3390/app122111177.
Pełny tekst źródłaMohammed, Kabiru, Aladdin Ayesh i Eerke Boiten. "Complementing Privacy and Utility Trade-Off with Self-Organising Maps". Cryptography 5, nr 3 (17.08.2021): 20. http://dx.doi.org/10.3390/cryptography5030020.
Pełny tekst źródłaKiranagi, Manasi, Devika Dhoble, Madeeha Tahoor i Dr Rekha Patil. "Finding Optimal Path and Privacy Preserving for Wireless Network". International Journal for Research in Applied Science and Engineering Technology 10, nr 10 (31.10.2022): 360–65. http://dx.doi.org/10.22214/ijraset.2022.46949.
Pełny tekst źródłaCai, Lin, Jinchuan Tang, Shuping Dang i Gaojie Chen. "Privacy protection and utility trade-off for social graph embedding". Information Sciences 676 (sierpień 2024): 120866. http://dx.doi.org/10.1016/j.ins.2024.120866.
Pełny tekst źródłaRassouli, Borzoo, i Deniz Gunduz. "Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure". IEEE Transactions on Information Forensics and Security 15 (2020): 594–603. http://dx.doi.org/10.1109/tifs.2019.2903658.
Pełny tekst źródłaFranzen, Daniel, Claudia Müller-Birn i Odette Wegwarth. "Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential Privacy". Proceedings of the ACM on Human-Computer Interaction 8, CSCW1 (17.04.2024): 1–56. http://dx.doi.org/10.1145/3637309.
Pełny tekst źródłaTasnim, Naima, Jafar Mohammadi, Anand D. Sarwate i Hafiz Imtiaz. "Approximating Functions with Approximate Privacy for Applications in Signal Estimation and Learning". Entropy 25, nr 5 (22.05.2023): 825. http://dx.doi.org/10.3390/e25050825.
Pełny tekst źródłaKremer, Steve. "Security and Privacy Column". ACM SIGLOG News 10, nr 1 (styczeń 2023): 3. http://dx.doi.org/10.1145/3584676.3584679.
Pełny tekst źródłaDe, Abir, i Soumen Chakrabarti. "Differentially Private Link Prediction with Protected Connections". Proceedings of the AAAI Conference on Artificial Intelligence 35, nr 1 (18.05.2021): 63–71. http://dx.doi.org/10.1609/aaai.v35i1.16078.
Pełny tekst źródłaMiller, Jim. "Who Are You? The Trade-Off between Information Utility and Privacy". IEEE Internet Computing 12, nr 4 (lipiec 2008): 93–96. http://dx.doi.org/10.1109/mic.2008.91.
Pełny tekst źródłaZhan, Yuting, Hamed Haddadi i Afra Mashhadi. "Privacy-Aware Adversarial Network in Human Mobility Prediction". Proceedings on Privacy Enhancing Technologies 2023, nr 1 (styczeń 2023): 556–70. http://dx.doi.org/10.56553/popets-2023-0032.
Pełny tekst źródłaChen, Youqin, Zhengquan Xu, Jianzhang Chen i Shan Jia. "B-DP: Dynamic Collection and Publishing of Continuous Check-In Data with Best-Effort Differential Privacy". Entropy 24, nr 3 (14.03.2022): 404. http://dx.doi.org/10.3390/e24030404.
Pełny tekst źródłaChandrasekaran, Varun, Chuhan Gao, Brian Tang, Kassem Fawaz, Somesh Jha i Suman Banerjee. "Face-Off: Adversarial Face Obfuscation". Proceedings on Privacy Enhancing Technologies 2021, nr 2 (29.01.2021): 369–90. http://dx.doi.org/10.2478/popets-2021-0032.
Pełny tekst źródłaWu, Qihong, Jinchuan Tang, Shuping Dang i Gaojie Chen. "Data privacy and utility trade-off based on mutual information neural estimator". Expert Systems with Applications 207 (listopad 2022): 118012. http://dx.doi.org/10.1016/j.eswa.2022.118012.
Pełny tekst źródłaYao, Xin, Juan Yu, Jianmin Han, Jianfeng Lu, Hao Peng, Yijia Wu i Xiaoqian Cao. "DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism". ISPRS International Journal of Geo-Information 11, nr 12 (5.12.2022): 607. http://dx.doi.org/10.3390/ijgi11120607.
Pełny tekst źródłaZhang, Xiao-Yu, Stefanie Kuenzel, José-Rodrigo Córdoba-Pachón i Chris Watkins. "Privacy-Functionality Trade-Off: A Privacy-Preserving Multi-Channel Smart Metering System". Energies 13, nr 12 (21.06.2020): 3221. http://dx.doi.org/10.3390/en13123221.
Pełny tekst źródłaZhao, Jianzhe, Keming Mao, Chenxi Huang i Yuyang Zeng. "Utility Optimization of Federated Learning with Differential Privacy". Discrete Dynamics in Nature and Society 2021 (8.10.2021): 1–14. http://dx.doi.org/10.1155/2021/3344862.
Pełny tekst źródłaXue, Lulu, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun i Dezhong Yao. "Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 6 (24.03.2024): 6404–12. http://dx.doi.org/10.1609/aaai.v38i6.28460.
Pełny tekst źródłaZhou, Xingcai, i Yu Xiang. "ADMM-Based Differential Privacy Learning for Penalized Quantile Regression on Distributed Functional Data". Mathematics 10, nr 16 (16.08.2022): 2954. http://dx.doi.org/10.3390/math10162954.
Pełny tekst źródłaLi, Qiyu, Chunlai Zhou, Biao Qin i Zhiqiang Xu. "Local Differential Privacy for Belief Functions". Proceedings of the AAAI Conference on Artificial Intelligence 36, nr 9 (28.06.2022): 10025–33. http://dx.doi.org/10.1609/aaai.v36i9.21241.
Pełny tekst źródłaCao, Hui, Shubo Liu, Renfang Zhao i Xingxing Xiong. "IFed: A novel federated learning framework for local differential privacy in Power Internet of Things". International Journal of Distributed Sensor Networks 16, nr 5 (maj 2020): 155014772091969. http://dx.doi.org/10.1177/1550147720919698.
Pełny tekst źródłaBoenisch, Franziska, Christopher Mühl, Roy Rinberg, Jannis Ihrig i Adam Dziedzic. "Individualized PATE: Differentially Private Machine Learning with Individual Privacy Guarantees". Proceedings on Privacy Enhancing Technologies 2023, nr 1 (styczeń 2023): 158–76. http://dx.doi.org/10.56553/popets-2023-0010.
Pełny tekst źródłaShibata, Hisaichi, Shouhei Hanaoka, Saori Koshino, Soichiro Miki, Yuki Sonoda i Osamu Abe. "Identity Diffuser: Preserving Abnormal Region of Interests While Diffusing Identity". Applied Sciences 14, nr 18 (20.09.2024): 8489. http://dx.doi.org/10.3390/app14188489.
Pełny tekst źródłaGrigoraș, Alexandru, i Florin Leon. "Synthetic Time Series Generation for Decision Intelligence Using Large Language Models". Mathematics 12, nr 16 (13.08.2024): 2494. http://dx.doi.org/10.3390/math12162494.
Pełny tekst źródłaThantharate, Pratik, Shyam Bhojwani i Anurag Thantharate. "DPShield: Optimizing Differential Privacy for High-Utility Data Analysis in Sensitive Domains". Electronics 13, nr 12 (14.06.2024): 2333. http://dx.doi.org/10.3390/electronics13122333.
Pełny tekst źródłaTriastcyn, Aleksei, i Boi Faltings. "Generating Higher-Fidelity Synthetic Datasets with Privacy Guarantees". Algorithms 15, nr 7 (1.07.2022): 232. http://dx.doi.org/10.3390/a15070232.
Pełny tekst źródłaVijayan, Naveen Edapurath. "Privacy-Preserving Analytics in HR Tech- Federated Learning and Differential Privacy Techniques for Sensitive Data". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 11 (10.11.2024): 1–6. http://dx.doi.org/10.55041/ijsrem11473.
Pełny tekst źródłaPuaschunder, Julia. "Towards a Utility Theory of Privacy and Information Sharing". International Journal of Strategic Information Technology and Applications 10, nr 1 (styczeń 2019): 1–22. http://dx.doi.org/10.4018/ijsita.2019010101.
Pełny tekst źródłaBuchholz, Erik, Alsharif Abuadbba, Shuo Wang, Surya Nepal i Salil S. Kanhere. "SoK: Can Trajectory Generation Combine Privacy and Utility?" Proceedings on Privacy Enhancing Technologies 2024, nr 3 (lipiec 2024): 75–93. http://dx.doi.org/10.56553/popets-2024-0068.
Pełny tekst źródłaKaplan, Caelin, Chuan Xu, Othmane Marfoq, Giovanni Neglia i Anderson Santana de Oliveira. "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses". Proceedings on Privacy Enhancing Technologies 2024, nr 1 (styczeń 2024): 525–48. http://dx.doi.org/10.56553/popets-2024-0031.
Pełny tekst źródłaXiao, Taihong, Yi-Hsuan Tsai, Kihyuk Sohn, Manmohan Chandraker i Ming-Hsuan Yang. "Adversarial Learning of Privacy-Preserving and Task-Oriented Representations". Proceedings of the AAAI Conference on Artificial Intelligence 34, nr 07 (3.04.2020): 12434–41. http://dx.doi.org/10.1609/aaai.v34i07.6930.
Pełny tekst źródłaVepakomma, Praneeth, Julia Balla i Ramesh Raskar. "PrivateMail: Supervised Manifold Learning of Deep Features with Privacy for Image Retrieval". Proceedings of the AAAI Conference on Artificial Intelligence 36, nr 8 (28.06.2022): 8503–11. http://dx.doi.org/10.1609/aaai.v36i8.20827.
Pełny tekst źródłaTakagi, Shun, Li Xiong, Fumiyuki Kato, Yang Cao i Masatoshi Yoshikawa. "HRNet: Differentially Private Hierarchical and Multi-Resolution Network for Human Mobility Data Synthesization". Proceedings of the VLDB Endowment 17, nr 11 (lipiec 2024): 3058–71. http://dx.doi.org/10.14778/3681954.3681983.
Pełny tekst źródłaMiller, Jim. "Who Are You, Part II: More on the Trade-Off between Information Utility and Privacy". IEEE Internet Computing 12, nr 6 (listopad 2008): 91–93. http://dx.doi.org/10.1109/mic.2008.135.
Pełny tekst źródłaChen, E., Yang Cao i Yifei Ge. "A Generalized Shuffle Framework for Privacy Amplification: Strengthening Privacy Guarantees and Enhancing Utility". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 10 (24.03.2024): 11267–75. http://dx.doi.org/10.1609/aaai.v38i10.29005.
Pełny tekst źródłaSohail, Syeda Amna, Faiza Allah Bukhsh i Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata". Applied Sciences 11, nr 22 (12.11.2021): 10686. http://dx.doi.org/10.3390/app112210686.
Pełny tekst źródłaVerma, Kishore S., A. Rajesh i Adeline J. S. Johnsana. "An Improved Classification Analysis on Utility Aware K-Anonymized Dataset". Journal of Computational and Theoretical Nanoscience 16, nr 2 (1.02.2019): 445–52. http://dx.doi.org/10.1166/jctn.2019.7748.
Pełny tekst źródłaMohammady, Meisam, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi i Mourad Debbabi. "A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization". ACM Transactions on Privacy and Security 24, nr 3 (31.08.2021): 1–36. http://dx.doi.org/10.1145/3439732.
Pełny tekst źródłaLiu, Xuan, Genlang Chen, Shiting Wen i Guanghui Song. "An Improved Sanitization Algorithm in Privacy-Preserving Utility Mining". Mathematical Problems in Engineering 2020 (25.04.2020): 1–14. http://dx.doi.org/10.1155/2020/7489045.
Pełny tekst źródłaHirschprung, Ron S., i Shani Alkoby. "A Game Theory Approach for Assisting Humans in Online Information-Sharing". Information 13, nr 4 (2.04.2022): 183. http://dx.doi.org/10.3390/info13040183.
Pełny tekst źródłaKamalaruban, Parameswaran, Victor Perrier, Hassan Jameel Asghar i Mohamed Ali Kaafar. "Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries". Proceedings on Privacy Enhancing Technologies 2020, nr 1 (1.01.2020): 103–25. http://dx.doi.org/10.2478/popets-2020-0007.
Pełny tekst źródłaEt. al., Waleed M. Ead,. "A General Framework Information Loss of Utility-Based Anonymization in Data Publishing". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 5 (11.04.2021): 1450–56. http://dx.doi.org/10.17762/turcomat.v12i5.2102.
Pełny tekst źródłaPilgram, Lisa, Thierry Meurers, Bradley Malin, Elke Schaeffner, Kai-Uwe Eckardt i Fabian Prasser. "The Costs of Anonymization: Case Study Using Clinical Data". Journal of Medical Internet Research 26 (24.04.2024): e49445. http://dx.doi.org/10.2196/49445.
Pełny tekst źródłaSong, Yi, Xuesong Lu, Sadegh Nobari, Stéphane Bressan i Panagiotis Karras. "On the Privacy and Utility of Anonymized Social Networks". International Journal of Adaptive, Resilient and Autonomic Systems 4, nr 2 (kwiecień 2013): 1–34. http://dx.doi.org/10.4018/jaras.2013040101.
Pełny tekst źródłaHemmatazad, Nolan, Robin Gandhi, Qiuming Zhu i Sanjukta Bhowmick. "The Intelligent Data Brokerage". International Journal of Privacy and Health Information Management 2, nr 1 (styczeń 2014): 22–33. http://dx.doi.org/10.4018/ijphim.2014010102.
Pełny tekst źródła