Anonymization: The imperfect science of using data while preserving privacy

A Gadotti, L Rocher, F Houssiau, AM Creţu… - Science …, 2024 - science.org
Information about us, our actions, and our preferences is created at scale through surveys or
scientific studies or as a result of our interaction with digital devices such as smartphones …

Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives

Y Himeur, SS Sohail, F Bensaali, A Amira… - Computers & Security, 2022 - Elsevier
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …

Prochlo: Strong privacy for analytics in the crowd

A Bittau, Ú Erlingsson, P Maniatis, I Mironov… - Proceedings of the 26th …, 2017 - dl.acm.org
The large-scale monitoring of computer users' software activities has become commonplace,
eg, for application telemetry, error reporting, or demographic profiling. This paper describes …

Security and privacy challenges in smart cities

T Braun, BCM Fung, F Iqbal, B Shah - Sustainable cities and society, 2018 - Elsevier
The construction of smart cities will bring about a higher quality of life to the masses through
digital interconnectivity, leading to increased efficiency and accessibility in cities. Smart …

Local differential privacy for deep learning

PCM Arachchige, P Bertok, I Khalil… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is transforming major industries, including but not limited to
healthcare, agriculture, finance, energy, and transportation. IoT platforms are continually …

Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing

M Fredrikson, E Lantz, S Jha, S Lin, D Page… - 23rd USENIX security …, 2014 - usenix.org
We initiate the study of privacy in pharmacogenetics, wherein machine learning models are
used to guide medical treatments based on a patient's genotype and background …

Minimax optimal procedures for locally private estimation

JC Duchi, MI Jordan, MJ Wainwright - Journal of the American …, 2018 - Taylor & Francis
Working under a model of privacy in which data remain private even from the statistician, we
study the tradeoff between privacy guarantees and the risk of the resulting statistical …

A survey on trustworthy recommender systems

Y Ge, S Liu, Z Fu, J Tan, Z Li, S Xu, Y Li, Y Xian… - ACM Transactions on …, 2022 - dl.acm.org
Recommender systems (RS), serving at the forefront of Human-centered AI, are widely
deployed in almost every corner of the web and facilitate the human decision-making …

Tumblebit: An untrusted bitcoin-compatible anonymous payment hub

E Heilman, L Alshenibr, F Baldimtsi… - … and distributed system …, 2017 - open.bu.edu
This paper presents TumbleBit, a new unidirectional unlinkable payment hub that is fully
compatible with today s Bitcoin protocol. TumbleBit allows parties to make fast, anonymous …

[PDF][PDF] Differentially private empirical risk minimization.

K Chaudhuri, C Monteleoni, AD Sarwate - Journal of Machine Learning …, 2011 - jmlr.org
Privacy-preserving machine learning algorithms are crucial for the increasingly common
setting in which personal data, such as medical or financial records, are analyzed. We …