Evaluation of noise distributions for additive and multiplicative smart meter data obfuscation
In this paper, we compare and analyze light-weight approaches for instantaneous smart
meter (SM) data obfuscation from a group of consumers. In the literature, the common …
meter (SM) data obfuscation from a group of consumers. In the literature, the common …
[PDF][PDF] Statistical Information Recovery from Multivariate Noise-Multiplied Data, a Computational Approach.
This paper proposes a computational statistical method for multivariate confidential
numerical microdata. The method can be employed for recovering some commonly …
numerical microdata. The method can be employed for recovering some commonly …
A computational Bayesian approach for estimating density functions based on noise-multiplied data
YX Lin - International Journal of Big Data Intelligence, 2019 - inderscienceonline.com
In this big data era, an enormous amount of personal and company information can be
easily collected by third parties. Sharing the data with the public and allowing data users to …
easily collected by third parties. Sharing the data with the public and allowing data users to …
Mining the statistical information of confidential data from noise-multiplied data
YX Lin - 2017 IEEE 15th Intl Conf on Dependable, Autonomic …, 2017 - ieeexplore.ieee.org
Protecting data privacy and mining statistical information from protected data are the
essential issues in big data. Protecting data privacy through noise-multiplied data is one of …
essential issues in big data. Protecting data privacy through noise-multiplied data is one of …
Quantifying the protection level of a noise candidate for noise multiplication masking scheme
Y Ma, YX Lin, PN Krivitsky, B Wakefield - Privacy in Statistical Databases …, 2018 - Springer
When multiplicative noises are used to perturb a set of original data, the data provider needs
to ensure that the original values are not likely to be learned by data intruders from the noise …
to ensure that the original values are not likely to be learned by data intruders from the noise …
Reviewing the Methods of Estimating the Density Function Based on Masked Data
YX Lin, PN Krivitsky - Privacy in Statistical Databases: UNESCO Chair in …, 2018 - Springer
Data privacy is an issue of increasing importance for big data mining, especially for micro-
level data. A popular approach to protecting the such is perturbation. Therefore, techniques …
level data. A popular approach to protecting the such is perturbation. Therefore, techniques …
Efficiency and Sample Size Determination of Protected Data
B Wakefield, YX Lin - Privacy in Statistical Databases: UNESCO Chair in …, 2018 - Springer
This paper assesses the usefulness of a proposed multiplicative perturbation method by
contrasting the statistical efficiency achieved in point hypothesis testing of simple …
contrasting the statistical efficiency achieved in point hypothesis testing of simple …
Protecting values close to zero under the multiplicative noise method
YX Lin - Privacy in Statistical Databases: UNESCO Chair in …, 2018 - Springer
Perturbing sensitive data is one of the standard ways of protecting confidential data. The
multiplicative noise method is one of these data perturbation methods and this method has …
multiplicative noise method is one of these data perturbation methods and this method has …
Evaluation of Noise Distributions for Additive and Multiplicative Smart Meter Data Obfuscation
A Shaharyar Khwaja, S Erküçük, A Anpalagan… - rshare.library.torontomu.ca
In this paper, we compare and analyze light-weight approaches for instantaneous smart
meter (SM) data obfuscation from a group of consumers. In the literature, the common …
meter (SM) data obfuscation from a group of consumers. In the literature, the common …
[PDF][PDF] Protecting the privacy of smart meter data: the differential privacy approach and the multiplicative noise approach
J Brackenbury… - Working Paper 01-19 …, 2019 - documents.uow.edu.au
Smart meter electricity data presents a risk of malicious agents gaining insight of private
information, including residents' lifestyle and daily habits. In this paper, we consider two …
information, including residents' lifestyle and daily habits. In this paper, we consider two …