Showing 1 - 20 results of 92 for search '"privacy"', query time: 0.08s Refine Results
  1. 1

    Review of Differential Privacy Research by ZHAO Yuqi, YANG Min

    Published 2023-04-01
    Subjects: “…differential privacy|privacy preserving|statistical query|shuffle model|randomization mechanism|error bound…”
    Get full text
    Article
  2. 2

    Protecting Face Privacy via Beautification by WANG Tao, ZHANG Yushu, ZHAO Ruoyu, WEN Wenying, ZHU Youwen

    Published 2024-01-01
    Subjects: “…beautification; face privacy; identity; generative adversarial networks (gan)…”
    Get full text
    Article
  3. 3

    Review of Privacy-preserving Mechanisms in Crowdsensing by LI Li, HE Xin, HAN Zhi-jie

    Published 2022-05-01
    Subjects: “…crowdsensing|crowdcomputing|privacy-preserving|encryption|anonymization…”
    Get full text
    Article
  4. 4

    Review of Privacy-Preserving Research in Recommendation Systems by FENG Han, YI Huawei, LI Xiaohui, LI Rui

    Published 2023-08-01
    Subjects: “…recommendation system; privacy-preserving; recommendation method; privacy technology…”
    Get full text
    Article
  5. 5

    Distributed Privacy Protection Data Search Scheme by LIU Ming-da, SHI Yi-juan, RAO Xiang, FAN Lei

    Published 2022-10-01
    “…Aiming at the problem of data island caused by high-sensitivity data in the cloud,which makes the data unable to search,discover and share with each other,a distributed privacy protection data search scheme is proposed to realize the two-way confidentiality of data and search conditions in distributed scenarios,and a trusted search certificate could be established.Firstly,the data model,the objectives and application scenarios of scheme protection are defined.Next,the design framework and protocol flow of the scheme are proposed,focusing on the overall flow of three parts:trusted data interaction channel based on blockchain,trusted key sharing module and ciphertext search engine.Then,a full-text search engine tantivy SGX in ciphertext state based on trusted execution environment is proposed,and the principle and implementation method are analyzed in detail.Finally,the overall process and core methods are implemented and verified.Experiments show that the scheme is efficient and feasible,and can effectively enhance the security of data discovery and search in distributed environment.…”
    Get full text
    Article
  6. 6
  7. 7

    Investigation into and Reflection of User Privacy Policies of Reading Apps by ZHANG Bin, ZHOU Yonghong

    Published 2021-07-01
    Subjects: “…information users|personal information|privacy policy|reading apps…”
    Get full text
    Article
  8. 8

    Privacy-preserving Linear Regression Scheme and Its Application by LYU You, WU Wen-yuan

    Published 2022-09-01
    Subjects: “…privacy-preserving|linear regression|hybrid iterative method|homomorphic encryption…”
    Get full text
    Article
  9. 9

    Privacy-preserving Hamming and Edit Distance Computation and Applications by DOU Jia-wei

    Published 2022-09-01
    “…With the rapid development of information technology,privacy-preserving multiparty cooperative computation is becoming more and more popular.Secure multiparty computation is a key technology to address such problems.In scientific research and practical applications,people measure the similarity of two strings with Hamming(edit) distance.It is of great significance to study privacy-preserving Hamming(edit) distance computation.This paper studies privacy-preserving Hamming(edit) distance computation.First,we transform Hamming distance computation to inner product computation of vectors,and then use Okamoto-Uchiyama(OU) cryptosystem and encryption-and-choose technique to design protocol for Hamming distance.Second,we give each alphabet of a string a number,transform edit distance to determine whether the difference of the number of two alphabets is 0,and use OU cryptosystem to design a privacy-preserving edit distance computation protocol.The security of the protocol is strictly proved,the computational complexity of the protocol is analyzed,the actual implementation efficiency of the protocol is tested and compared with the existing results.Theoretical analysis and experimental results show that our protocols are efficient.…”
    Get full text
    Article
  10. 10

    Frequency Feature Extraction Based on Localized Differential Privacy by HUANG Jue, ZHOU Chun-lai

    Published 2022-07-01
    Subjects: “…localized differential privacy|rappor|frequency characteristics|random response…”
    Get full text
    Article
  11. 11

    The Practice and Enlightenment on Privacy Protection Service of Cornell University Library by YU Defeng

    Published 2021-11-01
    Subjects: “…user privacy|privacy protection|cornell university library|case study…”
    Get full text
    Article
  12. 12

    Study on Privacy-preserving Nonlinear Federated Support Vector Machines by YANG Hong-jian, HU Xue-xian, LI Ke-jia, XU Yang, WEI Jiang-hong

    Published 2022-12-01
    Subjects: “…federated learning|privacy preserving|homomorphic encryption|support vector machines|multi-party secure random seed negotiation|random fourier features…”
    Get full text
    Article
  13. 13

    LBS Mobile Privacy Protection Scheme Based on Random Onion Routing by WANG Lei, LI Xiao-yu

    Published 2022-09-01
    Subjects: “…mobile location privacy|onion routing|hybrid encryption|cyber security…”
    Get full text
    Article
  14. 14

    Research on the Impact of Personal Information Protection Law on APP Privacy Policy by Han Shuo

    Published 2022-12-01
    “…[Purpose/Significance] Comparing the changes of APP privacy policy before and after the implementation of the Personal Information Protection Law can effectively evaluate its impact and limitations, and provide reference for subsequent relevant laws, regulations and policies. …”
    Get full text
    Article
  15. 15

    Privacy-preserving Scheme of Energy Trading Data Based on Consortium Blockchain by SHI Kun, ZHOU Yong, ZHANG Qi-liang, JIANG Shun-rong

    Published 2022-11-01
    Subjects: “…energy trading systerm|blockchain|local differential privacy|account mapping|exponential smoothing prediction…”
    Get full text
    Article
  16. 16

    RCP:Mean Value Protection Technology Under Local Differential Privacy by LIU Likang, ZHOU Chunlai

    Published 2023-02-01
    Subjects: “…local differential privacy|mean estimation|random response|random censoring|utility optimization…”
    Get full text
    Article
  17. 17

    Differential Privacy Based Fingerprinting Obfuscation Mechanism Towards NetworkReconnaissance Deception by HE Yuan, XING Chang-you, ZHANG Guo-min, SONG Li-hua, YU Hang

    Published 2022-11-01
    Subjects: “…fingerprinting obfuscation|differential privacy|network reconnaissance|cyber deception defense…”
    Get full text
    Article
  18. 18

    Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy by TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun

    Published 2022-09-01
    Subjects: “…federated learning|secure multi-party computation|differential privacy|privacy preserving|deep learning…”
    Get full text
    Article
  19. 19

    Paillier Homomorphic Encryption Based Location Privacy Protection Scheme for Crowdsensing Task Distribution by TIAN Jing, DU Yunming, LI Shuai, LIU Yi

    Published 2022-06-01
    Subjects: “…|crowdsensing|homomorphic encryption|location privacy|privacy protection|task distribution…”
    Get full text
    Article
  20. 20

    Is the Privacy Waybill Really Invisible? A Study of Courier Industry's Personal Information Protection by CUI Yilin, LI Zhuozhuo

    Published 2022-08-01
    Subjects: “…personal information protection|anonymization|express information|privacy waybill…”
    Get full text
    Article