نتایج جستجو برای: privacy preservation

تعداد نتایج: 116916  

Journal: :IEEE Transactions on Industrial Informatics 2022

In recent years, Internet of Things (IoT)-enabled health monitoring wearable devices have become a trend in healthcare systems, regularly collecting vital sign data from patients and uploading them to the cloud. Through on-demand search queries, are shared with third-party service providers monitor patients' status provide timely diagnoses. To ensure privacy security, patient should be encrypte...

2004
Jaideep Vaidya Chris Clifton

Privacy-Preserving Data Mining – developing models without seeing the data – is receiving growing attention. This paper assumes a privacy-preserving distributed data mining scenario: data sources collaborate to develop a global model, but must not disclose their data to others. Näıve Bayes is often used as a baseline classifier, consistently providing reasonable classification performance. This...

Journal: :JNW 2014
Xingjun Shi Huibin Xu

Location privacy is an important concern in VANETs(Vehicular Ad hoc Networks). Anonymity is one of commonly adopted solution to protect location privacy. In this paper, we present a mechanism based on an ID-based cryptosystem in order to ensure vehicles’ anonymity by pseudonyms. In this mechanism, we adopt Pseudonyms Synchronously Change ( PSC ) scheme, which improves anonymity. In the schemes,...

2008
Jaideep Vaidya Chris Clifton

Privacy-Preserving Data Mining – developing models without seeing the data – is receiving growing attention. This paper assumes a privacy-preserving distributed data mining scenario: data sources collaborate to develop a global model, but must not disclose their data to others. Näıve Bayes is often used as a baseline classifier, consistently providing reasonable classification performance. This...

2011
Pengpeng Lin Nirmal Thapa Jun Zhang

As a major concern in designing various data mining applications, privacy preservation has become a critical component seeking a trade-off between mining performances and protecting sensitive information. Data perturbation or distortion is a widely used approach for privacy protection. Many privacy preservation approaches were developed, either by adding noises or by matrix decomposition method...

2001
Lucila Ishitani Gustavo Machado Campagnani Gama Virgílio A. F. Almeida Dorgival Olavo Guedes Neto Wagner Meira

Concerns about users' privacy are currently attracting signi cant attention. Users usually do not approve of someone mining their actions and habits while they use the Web. On the other hand, having some information about the user's behavior is essential for providing personalized services. Thus, there is a clear demand for mechanisms that allow users to control their privacy without relying on...

2011
Josep Domingo-Ferrer

We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in preserving his privacy. Coprivacy makes an individual’s privacy preservation a goal that rationally interests other individuals: it is a matter of helping oneself by helping someo...

2014
Xiaoying Zhang Lei Dong Hui Peng Hong Chen Suyun Zhao Cuiping Li

Wireless sensor networks (WSNs) are indispensable building blocks for the Internet of Things (IoT). With the development of WSNs, privacy issues have drawn more attention. Existing work on the privacy-preserving range query mainly focuses on privacy preservation and integrity verification in two-tiered WSNs in the case of compromisedmaster nodes, but neglects the damage of node collusion. In th...

Journal: :IJERTCS 2013
Mohamed Amine Ferrag Mehdi Nafa Salim Ghanemi

The recent rise and widespread adoption of wireless networked embedded systems for mobile communication applications has sparked numerous visions of an ever more networked and interactive world. One such vision proposed in the past years are wireless ad hoc social networks, where wireless ad hoc communication and mobile devices are combined with integrated social characteristics to exchange dat...

2013
Samir Patel

Maintain confidentiality, privacy and security research in data mining (PPDM) is one of the biggest trends. Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of research where existing data mining algorithms should be reconsidered from a different point of view, this of privacy preservation. We propose a simple PCA based transformation ap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید