-
1
Review of Differential Privacy Research
Published 2023-04-01Subjects: “…differential privacy|privacy preserving|statistical query|shuffle model|randomization mechanism|error bound…”
Get full text
Article -
2
Protecting Face Privacy via Beautification
Published 2024-01-01Subjects: “…beautification; face privacy; identity; generative adversarial networks (gan)…”
Get full text
Article -
3
Review of Privacy-preserving Mechanisms in Crowdsensing
Published 2022-05-01Subjects: “…crowdsensing|crowdcomputing|privacy-preserving|encryption|anonymization…”
Get full text
Article -
4
Review of Privacy-Preserving Research in Recommendation Systems
Published 2023-08-01Subjects: “…recommendation system; privacy-preserving; recommendation method; privacy technology…”
Get full text
Article -
5
Distributed Privacy Protection Data Search Scheme
Published 2022-10-01“…Aiming at the problem of data island caused by high-sensitivity data in the cloud,which makes the data unable to search,discover and share with each other,a distributed privacy protection data search scheme is proposed to realize the two-way confidentiality of data and search conditions in distributed scenarios,and a trusted search certificate could be established.Firstly,the data model,the objectives and application scenarios of scheme protection are defined.Next,the design framework and protocol flow of the scheme are proposed,focusing on the overall flow of three parts:trusted data interaction channel based on blockchain,trusted key sharing module and ciphertext search engine.Then,a full-text search engine tantivy SGX in ciphertext state based on trusted execution environment is proposed,and the principle and implementation method are analyzed in detail.Finally,the overall process and core methods are implemented and verified.Experiments show that the scheme is efficient and feasible,and can effectively enhance the security of data discovery and search in distributed environment.…”
Get full text
Article -
6
Privacy Protection of Sensitive Bioinformation Based on Event Cameras
Published 2024-02-01Subjects: Get full text
Article -
7
Investigation into and Reflection of User Privacy Policies of Reading Apps
Published 2021-07-01Subjects: “…information users|personal information|privacy policy|reading apps…”
Get full text
Article -
8
Privacy-preserving Linear Regression Scheme and Its Application
Published 2022-09-01Subjects: “…privacy-preserving|linear regression|hybrid iterative method|homomorphic encryption…”
Get full text
Article -
9
Privacy-preserving Hamming and Edit Distance Computation and Applications
Published 2022-09-01“…With the rapid development of information technology,privacy-preserving multiparty cooperative computation is becoming more and more popular.Secure multiparty computation is a key technology to address such problems.In scientific research and practical applications,people measure the similarity of two strings with Hamming(edit) distance.It is of great significance to study privacy-preserving Hamming(edit) distance computation.This paper studies privacy-preserving Hamming(edit) distance computation.First,we transform Hamming distance computation to inner product computation of vectors,and then use Okamoto-Uchiyama(OU) cryptosystem and encryption-and-choose technique to design protocol for Hamming distance.Second,we give each alphabet of a string a number,transform edit distance to determine whether the difference of the number of two alphabets is 0,and use OU cryptosystem to design a privacy-preserving edit distance computation protocol.The security of the protocol is strictly proved,the computational complexity of the protocol is analyzed,the actual implementation efficiency of the protocol is tested and compared with the existing results.Theoretical analysis and experimental results show that our protocols are efficient.…”
Get full text
Article -
10
Frequency Feature Extraction Based on Localized Differential Privacy
Published 2022-07-01Subjects: “…localized differential privacy|rappor|frequency characteristics|random response…”
Get full text
Article -
11
The Practice and Enlightenment on Privacy Protection Service of Cornell University Library
Published 2021-11-01Subjects: “…user privacy|privacy protection|cornell university library|case study…”
Get full text
Article -
12
Study on Privacy-preserving Nonlinear Federated Support Vector Machines
Published 2022-12-01Subjects: “…federated learning|privacy preserving|homomorphic encryption|support vector machines|multi-party secure random seed negotiation|random fourier features…”
Get full text
Article -
13
LBS Mobile Privacy Protection Scheme Based on Random Onion Routing
Published 2022-09-01Subjects: “…mobile location privacy|onion routing|hybrid encryption|cyber security…”
Get full text
Article -
14
Research on the Impact of Personal Information Protection Law on APP Privacy Policy
Published 2022-12-01“…[Purpose/Significance] Comparing the changes of APP privacy policy before and after the implementation of the Personal Information Protection Law can effectively evaluate its impact and limitations, and provide reference for subsequent relevant laws, regulations and policies. …”
Get full text
Article -
15
Privacy-preserving Scheme of Energy Trading Data Based on Consortium Blockchain
Published 2022-11-01Subjects: “…energy trading systerm|blockchain|local differential privacy|account mapping|exponential smoothing prediction…”
Get full text
Article -
16
RCP:Mean Value Protection Technology Under Local Differential Privacy
Published 2023-02-01Subjects: “…local differential privacy|mean estimation|random response|random censoring|utility optimization…”
Get full text
Article -
17
Differential Privacy Based Fingerprinting Obfuscation Mechanism Towards NetworkReconnaissance Deception
Published 2022-11-01Subjects: “…fingerprinting obfuscation|differential privacy|network reconnaissance|cyber deception defense…”
Get full text
Article -
18
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
Published 2022-09-01Subjects: “…federated learning|secure multi-party computation|differential privacy|privacy preserving|deep learning…”
Get full text
Article -
19
Paillier Homomorphic Encryption Based Location Privacy Protection Scheme for Crowdsensing Task Distribution
Published 2022-06-01Subjects: “…|crowdsensing|homomorphic encryption|location privacy|privacy protection|task distribution…”
Get full text
Article -
20
Is the Privacy Waybill Really Invisible? A Study of Courier Industry's Personal Information Protection
Published 2022-08-01Subjects: “…personal information protection|anonymization|express information|privacy waybill…”
Get full text
Article