Privacy preservation in big data from the communication perspective—A survey
T Wang, Z Zheng, MH Rehmani… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The advancement of data communication technologies promotes widespread data collection
and transmission in various application domains, thereby expanding big data significantly …
and transmission in various application domains, thereby expanding big data significantly …
Utilizing noise addition for data privacy, an overview
K Mivule - arXiv preprint arXiv:1309.3958, 2013 - arxiv.org
The internet is increasingly becoming a standard for both the production and consumption of
data while at the same time cyber-crime involving the theft of private data is growing …
data while at the same time cyber-crime involving the theft of private data is growing …
Neither private nor fair: Impact of data imbalance on utility and fairness in differential privacy
T Farrand, F Mireshghallah, S Singh… - Proceedings of the 2020 …, 2020 - dl.acm.org
Deployment of deep learning in different fields and industries is growing day by day due to
its performance, which relies on the availability of data and compute. Data is often crowd …
its performance, which relies on the availability of data and compute. Data is often crowd …
Differential privacy as a mutual information constraint
P Cuff, L Yu - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016 - dl.acm.org
Differential privacy is a precise mathematical constraint meant to ensure privacy of individual
pieces of information in a database even while queries are being answered about the …
pieces of information in a database even while queries are being answered about the …
A pragmatic approach to membership inferences on machine learning models
Membership Inference Attacks (MIAs) aim to determine the presence of a record in a
machine learning model's training data by querying the model. Recent work has …
machine learning model's training data by querying the model. Recent work has …
On the relation between identifiability, differential privacy, and mutual-information privacy
This paper investigates the relation between three different notions of privacy: identifiability,
differential privacy, and mutual-information privacy. Under a unified privacydistortion …
differential privacy, and mutual-information privacy. Under a unified privacydistortion …
Towards a theory of maximal extractable value i: Constant function market makers
Maximal Extractable Value (MEV) refers to excess value captured by miners (or validators)
from users in a cryptocurrency network. This excess value often comes from reordering …
from users in a cryptocurrency network. This excess value often comes from reordering …
Privacy games: Optimal user-centric data obfuscation
R Shokri - arXiv preprint arXiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
The users' perspective on the privacy-utility trade-offs in health recommender systems
Privacy is a major good for users of personalized services such as recommender systems.
When applied to the field of health informatics, privacy concerns of users may be amplified …
When applied to the field of health informatics, privacy concerns of users may be amplified …
Minimax filter: Learning to preserve privacy from inference attacks
J Hamm - Journal of Machine Learning Research, 2017 - jmlr.org
Preserving privacy of continuous and/or high-dimensional data such as images, videos and
audios, can be challenging with syntactic anonymization methods which are designed for …
audios, can be challenging with syntactic anonymization methods which are designed for …