Showing 1 - 20 results of 71 for search '"privacy"', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    How much noise suffices for privacy of multi-agent systems? by Zhang, Wentao, Zuo, Zhiqiang, Wang, Yijing, Hu, Guoqiang

    Published 2023
    “…As multi-agent systems always involve a large number of nodes and connections, it is crucial to study the privacy preserving problem with minimal “corrupted” noise in the framework of differential privacy or noise-perturbation schemes. …”
    Get full text
    Journal Article
  10. 10

    Data privacy protection domain adaptation by roughing and finishing stage by Yuan, Liqiang, Erdt, Marius, Li, Ruilin, Siyal, Mohammed Yakoob

    Published 2023
    “…However, in medical imaging, source domain data from a hospital is usually restricted due to patient data privacy regulations. Therefore, it is crucial to perform privacy-preserving domain adaptation, which simultaneously improves the model’s performance on target domain data and preserves the privacy of source domain data. …”
    Get full text
    Journal Article
  11. 11
  12. 12

    Enabling efficient and privacy-preserving health query over outsourced cloud by Wang, Guoming, Lu, Rongxing, Guan, Yong Liang

    Published 2019
    “…In this paper, we propose an efficient and privacy-preserving health query scheme over outsourced cloud named HeOC. …”
    Get full text
    Get full text
    Journal Article
  13. 13
  14. 14
  15. 15

    Achieving privacy-preserving and verifiable data sharing in vehicular fog with blockchain by Kong, Qinglei, Su, Le, Ma, Maode

    Published 2022
    “…Security analysis demonstrates the security properties of the proposed scheme, in terms of location privacy preservation, verifiability and immutability. …”
    Get full text
    Journal Article
  16. 16

    Privacy-preserving co-synthesis against sensor–actuator eavesdropping intruder by Tai, Ruochen, Lin, Liyong, Zhu, Yuting, Su, Rong

    Published 2023
    “…In this work, we investigate the problem of privacy-preserving supervisory control against an external passive intruder via co-synthesis of a dynamic mask, an edit function, and a supervisor. …”
    Get full text
    Journal Article
  17. 17

    Security and privacy in vehicular ad hoc network and vehicle cloud computing : a survey by Muhammad Sameer Sheikh, Liang, Jun, Wang, Wensong

    Published 2021
    “…In sum, this survey comprehensively covers the location privacy and trust management models of the VANETs and discusses the security and privacy issues in the VCC, which fills the gap of existing surveys. …”
    Get full text
    Journal Article
  18. 18
  19. 19

    Achieve privacy-preserving priority classification on patient health data in remote eHealthcare system by Wang, Guoming, Lu, Rongxing, Guan, Yong Liang

    Published 2019
    “…For this reason, many privacy-preserving schemes have been proposed in recent years. …”
    Get full text
    Get full text
    Get full text
    Journal Article
  20. 20

    Security and privacy for reconfigurable intelligent surface in 6G: a review of prospective applications and challenges by Naeem, Faisal, Ali, Mansoor, Kaddoum, Georges, Huang, Chongwen, Yuen, Chau

    Published 2023
    “…To this end, we review the attributes of RISs that distinguish them from other relevant technologies, such as multiple-input-multiple-output (MIMO), conventional relaying, backscatter communication (BackCom), as well as outline security and privacy attacks in RIS-assisted 6G applications. Our specific focus is on security and privacy threats associated with the use of RISs with different vital 6G technologies, including millimeter wave (mmWave), terahertz (THz), device-to-device communication, IoT networks, multiaccess edge computing, integrated sensing and communication (ISAC), simultaneous wireless information and power transfer (SWIPT), and non-terrestrial network. …”
    Get full text
    Journal Article