Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics

G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …

Petuum: A new platform for distributed machine learning on big data

EP Xing, Q Ho, W Dai, JK Kim, J Wei, S Lee… - Proceedings of the 21th …, 2015 - dl.acm.org
How can one build a distributed framework that allows efficient deployment of a wide
spectrum of modern advanced machine learning (ML) programs for industrial-scale …

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers

G Ateniese, LV Mancini, A Spognardi… - … Journal of Security …, 2015 - inderscienceonline.com
Machine-learning (ML) enables computers to learn how to recognise patterns, make
unintended decisions, or react to a dynamic environment. The effectiveness of trained …

Coinparty: Secure multi-party mixing of bitcoins

JH Ziegeldorf, F Grossmann, M Henze… - Proceedings of the 5th …, 2015 - dl.acm.org
Bitcoin is a digital currency that uses anonymous cryptographic identities to achieve
financial privacy. However, Bitcoin's promise of anonymity is broken as recent work shows …

Towards a modern approach to privacy-aware government data releases

M Altman, A Wood, DR O'Brien, S Vadhan… - … Technology Law Journal, 2015 - JSTOR
Governments are under increasing pressure to publicly release collected data in order to
promote transparency, accountability, and innovation. Because much of the data they …

A comprehensive comparison of multiparty secure additions with differential privacy

S Goryczka, L Xiong - IEEE transactions on dependable and …, 2015 - ieeexplore.ieee.org
This paper considers the problem of secure data aggregation (mainly summation) in a
distributed setting, while ensuring differential privacy of the result. We study secure …

SMC: A practical schema for privacy-preserved data sharing over distributed data streams

S Liu, Q Qu, L Chen, LM Ni - IEEE Transactions on Big Data, 2015 - ieeexplore.ieee.org
Data collection is required to be safe and efficient considering both data privacy and system
performance. In this paper, we study a new problem: distributed data sharing with privacy …

Privacy‐preserving record linkage

R Schnell - Methodological developments in data linkage, 2015 - Wiley Online Library
Privacy‐preserving analysis techniques in general and specifically privacy‐preserving
record linkage (PPRL) have become active fields of research in computer science, statistics …

Quantum private comparison with a malicious third party

Z Sun, J Yu, P Wang, L Xu, C Wu - Quantum Information Processing, 2015 - Springer
In this paper, we will show that quantum private comparison protocol is secure when a
malicious third party is presented. The security of the protocol is considered in a cheat …

A new feature selection model based on ID3 and bees algorithm for intrusion detection system

AS Eesa, Z Orman… - Turkish Journal of Electrical …, 2015 - journals.tubitak.gov.tr
Intrusion detection systems (IDSs) have become a necessary component of computers and
information security framework. IDSs commonly deal with a large amount of data traffic and …