Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,260,813 papers from all fields of science
Search
Sign In
Create Free Account
Differential privacy
In cryptography, differential privacy aims to provide means to maximize the accuracy of queries from statistical databases while minimizing the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Boolean algebra
Computer and network surveillance
Cryptography
Cynthia Dwork
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Differentially-private distributed fault diagnosis for large-scale nonlinear uncertain systems
V. Rostampour
,
Riccardo M. G. Ferrari
,
André M. H. Teixeira
,
T. Keviczky
2018
Corpus ID: 53648566
2018
2018
Towards Differential Privacy for Symbolic Systems
Austin M. Jones
,
Kevin J. Leahy
,
M. Hale
American Control Conference
2018
Corpus ID: 52811575
In this paper, we develop a privacy implementation for symbolic control systems. Such systems generate sequences of non-numerical…
Expand
2017
2017
Data-driven Anonymization Process Applied to Time Series
V. Thouvenot
,
D. Nogues
,
C. Gouttas
Symposium on Information Management and Big Data
2017
Corpus ID: 4654499
Digital transformation and Big Data allow the use of highly valuable data. However, these data can be individual or sensitive…
Expand
2016
2016
Implementing Informed Consent as Information-Flow Policies for Secure Analytics on eHealth Data: Principles and Practices
A. Gjerdrum
,
H. Johansen
,
D. Johansen
IEEE/ACM International Conference on Connected…
2016
Corpus ID: 5038642
Wearable and ambient cyber-physical systems coupled with big-data health analytics promise continuous individual health…
Expand
2016
2016
Differential privacy in networked data collection
O. Javidbakht
,
P. Venkitasubramaniam
Annual Conference on Information Sciences and…
2016
Corpus ID: 18683062
The problem of destination privacy in networked data collection is investigated under constraints on routing overhead. Using…
Expand
2016
2016
An End-to-End Privacy Preserving Design of a Map-Reduce Framework
N. Kumar
,
R. Shyamasundar
IEEE 18th International Conference on High…
2016
Corpus ID: 18165832
We present a secure design for a map-reduce framework that guarantees preservation of privacy of the original data. We use Hadoop…
Expand
2016
2016
Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model
Yingpeng Sang
,
Hong Shen
,
Hui Tian
,
Zonghua Zhang
IEEE Transactions on Information Forensics and…
2016
Corpus ID: 18238932
The randomization methods that are applied for privacy-preserving data mining are commonly subject to reconstruction, linkage…
Expand
Review
2015
Review
2015
Protecting Privacy in Data Release
S. Vimercati
,
S. Foresti
,
G. Livraga
,
P. Samarati
Advances in Information Security
2015
Corpus ID: 17321163
The evolution of the Information and Communication Technology has radically changed our electronic lives, making information the…
Expand
2012
2012
Set Difference Attacks in Wireless Sensor Networks
Tulio de Souza
,
Joss Wright
,
P. O'Hanlon
,
I. Brown
Security and Privacy in Communication Networks
2012
Corpus ID: 6878676
We show that existing proposed mechanisms for preserving the privacy of reported data values in wireless sensor networks are…
Expand
2011
2011
Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks
K. Das
,
Kanishka Bhaduri
,
H. Kargupta
Peer-to-Peer Networking and Applications
2011
Corpus ID: 2852626
This paper proposes a scalable, local privacy-preserving algorithm for distributed Peer-to-Peer (P2P) data aggregation useful for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE