Top results
powerpoint 簡報 mobishare: flexible privacy-preserving location sharing in mobile online social networks wei wei, fengyuan xu, qun li the college of william and mary in…
world wide web https:doiorg101007s11280-018-0620-z towards privacy preserving social recommendation under personalized privacy settings xuying meng1 ·suhang wang2 ·kai…
1. privacy-preserving sharing of sensitive information is (really) practicalemiliano de cristofaro, yanbin lu, gene tsudikuniversity of california, irvineabstract the need…
privynet: a flexible framework for privacy- preserving deep neural network training meng li university of texas at austin austin tx 78712 meng_li@utexasedu liangzhen lai…
privacy-preserving data mining rebecca wright computer science department stevens institute of technology www.cs.stevens.edu~rwright portia site visit 12 may, 2005 the data…
data integrity proofs in document management system under cloud with multiple storage “privacy preserving repository for social networking application across cloud” p.…
01 polat.pmdinternational journal of electronic commerce / summer 2005, vol. 9, no. 4, pp. 9–35. copyright © 2005 m.e. sharpe, inc. all rights reserved. 1086-4415/2005
privacy preserving data mining lecture 3 non-cryptographic approaches for preserving privacy (based on slides of kobbi nissim) benny pinkas hp labs, israel 10th estonian…
wwsciencedirectcom c om p u t e r s s e c u r i t y 4 2 2 0 1 4 1 5 1e1 6 4 available online at w sciencedirect journal homepage: wwwelsevier comlocatecose achieving an effective…
globecom 2013 - communication and information system security symposium p2e: privacy-preserving and effective cloud data sharing service xin dongt, jiadi yut, yuan luot,…
privacy-preserving distributed mining of association rules on horizontally partitioned data murat kantarcioglu and chris clifton, senior member, ieee abstract—data mining…
www.scads.de scalable and privacy-preserving data integration - part 2 - erhard rahm ziad sehili university of leipzig scads dresdenleipzig big data integration …
collusion-tolerable and efficient privacy-preserving time-series data aggregation protocol yongkai li, shubo liu ?, jun wang, and mengjun liu school of computer, key laboratory…
towards a practical deployment of privacy-preserving crowd-sensing tasks nicolas haderer, vincent primault, patrice raveneau, christophe ribeiro, romain rouvoy, sonia ben…
efficient privacy-preserving face recognition full version? ahmad-reza sadeghi, thomas schneider, and immo wehrenberg horst görtz institute for it-security, ruhr-university…
privacy preserving market basket data analysis ling guo, songtao guo, and xintao wu university of north carolina at charlotte, {lguo2,sguo,xwu}@uncc.edu abstract. randomized…
1. privacy-preserving schema reusenguyen quoc viet hung, do son thanh, nguyen thanh tam, and karl abererepfl, switzerland 2. schema reusequeryoutputcontributequeryoutputcontributeschema.orgfactual.comtraditional…
1. systematic thought leadership for innovative business privacy-preserving outsourced profiling debmalya biswas, florian kerschbaum sap research, karlsruhe, germany stephan…
1. accuracy-constrained privacy-preserving access control mechanism for relational data zahid pervaiz, walid g. aref, senior member, ieee, arif ghafoor, fellow, ieee, and…
privacy preserving data mining yehuda lindell benny pinkas presenter: justin brickell mining joint databases parties p1 and p2 own databases d1 and d2 f is a data mining…