Is privacy privacy?

K Nissim, A Wood - … Transactions of the Royal Society A …, 2018 - royalsocietypublishing.org
This position paper observes how different technical and normative conceptions of privacy
have evolved in parallel and describes the practical challenges that these divergent …

Distributed learning without distress: Privacy-preserving empirical risk minimization

B Jayaraman, L Wang, D Evans… - Advances in Neural …, 2018 - proceedings.neurips.cc
Distributed learning allows a group of independent data owners to collaboratively learn a
model over their data sets without exposing their private data. We present a distributed …

Privacy preserving distributed optimization using homomorphic encryption

Y Lu, M Zhu - Automatica, 2018 - Elsevier
This paper studies how a system operator and a set of agents securely execute a distributed
projected gradient-based algorithm. In particular, each participant holds a set of problem …

Data sanitization in association rule mining: An analytical review

A Telikani, A Shahbahrami - Expert Systems with Applications, 2018 - Elsevier
Association rule hiding is the process of transforming a transaction database into a sanitized
version to protect sensitive knowledge and patterns. The challenge is to minimize the side …

Secure and anonymous decentralized Bitcoin mixing

JH Ziegeldorf, R Matzutt, M Henze, F Grossmann… - Future Generation …, 2018 - Elsevier
The decentralized digital currency Bitcoin presents an anonymous alternative to the
centralized banking system and indeed enjoys widespread and increasing adoption. Recent …

Differentially private distributed online learning

C Li, P Zhou, L Xiong, Q Wang… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
In the big data era, the generation of data presents some new characteristics, including wide
distribution, high velocity, high dimensionality, and privacy concern. To address these …

Privacy preserving utility mining: a survey

W Gan, J Chun-Wei, HC Chao… - … Conference on Big …, 2018 - ieeexplore.ieee.org
In big data era, the collected data usually contains rich information and hidden knowledge.
Utility-oriented pattern mining and analytics have shown a powerful ability to explore these …

Precise and fast cryptanalysis for Bloom filter based privacy-preserving record linkage

P Christen, T Ranbaduge, D Vatsalan… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Being able to identify records that correspond to the same entity across diverse databases is
an increasingly important step in many data analytics projects. Research into privacy …

The development of large-scale de-identified biomedical databases in the age of genomics—principles and challenges

FK Dankar, A Ptitsyn, SK Dankar - Human genomics, 2018 - Springer
Contemporary biomedical databases include a wide range of information types from various
observational and instrumental sources. Among the most important features that unite …

iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity

DB Rawat, L Njilla, K Kwiat… - 2018 International …, 2018 - ieeexplore.ieee.org
In this paper, we design, develop, and evaluate a novel information sharing (iShare)
framework for cybersecurity with the goal of protecting confidential information and …