Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics
G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arXiv preprint arXiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …
Petuum: A new platform for distributed machine learning on big data
How can one build a distributed framework that allows efficient deployment of a wide
spectrum of modern advanced machine learning (ML) programs for industrial-scale …
spectrum of modern advanced machine learning (ML) programs for industrial-scale …
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
Machine-learning (ML) enables computers to learn how to recognise patterns, make
unintended decisions, or react to a dynamic environment. The effectiveness of trained …
unintended decisions, or react to a dynamic environment. The effectiveness of trained …
Coinparty: Secure multi-party mixing of bitcoins
JH Ziegeldorf, F Grossmann, M Henze… - Proceedings of the 5th …, 2015 - dl.acm.org
Bitcoin is a digital currency that uses anonymous cryptographic identities to achieve
financial privacy. However, Bitcoin's promise of anonymity is broken as recent work shows …
financial privacy. However, Bitcoin's promise of anonymity is broken as recent work shows …
Towards a modern approach to privacy-aware government data releases
Governments are under increasing pressure to publicly release collected data in order to
promote transparency, accountability, and innovation. Because much of the data they …
promote transparency, accountability, and innovation. Because much of the data they …
A comprehensive comparison of multiparty secure additions with differential privacy
S Goryczka, L Xiong - IEEE transactions on dependable and …, 2015 - ieeexplore.ieee.org
This paper considers the problem of secure data aggregation (mainly summation) in a
distributed setting, while ensuring differential privacy of the result. We study secure …
distributed setting, while ensuring differential privacy of the result. We study secure …
SMC: A practical schema for privacy-preserved data sharing over distributed data streams
Data collection is required to be safe and efficient considering both data privacy and system
performance. In this paper, we study a new problem: distributed data sharing with privacy …
performance. In this paper, we study a new problem: distributed data sharing with privacy …
Privacy‐preserving record linkage
R Schnell - Methodological developments in data linkage, 2015 - Wiley Online Library
Privacy‐preserving analysis techniques in general and specifically privacy‐preserving
record linkage (PPRL) have become active fields of research in computer science, statistics …
record linkage (PPRL) have become active fields of research in computer science, statistics …
Quantum private comparison with a malicious third party
Z Sun, J Yu, P Wang, L Xu, C Wu - Quantum Information Processing, 2015 - Springer
In this paper, we will show that quantum private comparison protocol is secure when a
malicious third party is presented. The security of the protocol is considered in a cheat …
malicious third party is presented. The security of the protocol is considered in a cheat …
A new feature selection model based on ID3 and bees algorithm for intrusion detection system
Intrusion detection systems (IDSs) have become a necessary component of computers and
information security framework. IDSs commonly deal with a large amount of data traffic and …
information security framework. IDSs commonly deal with a large amount of data traffic and …