• Aucun résultat trouvé

[PDF] Top 20 Privacy-Preserving Distributed Collaborative Filtering

Has 2997 "Privacy-Preserving Distributed Collaborative Filtering" found on our website. Below are the top 20 most common "Privacy-Preserving Distributed Collaborative Filtering".

Privacy-Preserving Distributed Collaborative Filtering

Privacy-Preserving Distributed Collaborative Filtering

... reducing the bandwidth consumption of decentralized collaborative filtering. The cost associated with our obfuscated solution is about one third of that of the solution based on cleartext profiles. 7.8 ... Voir le document complet

24

Privacy-Preserving Distributed Collaborative Filtering

Privacy-Preserving Distributed Collaborative Filtering

... Privacy Threats. While decentralization removes the prying eyes of Big-Brother companies, it leaves those of curious users who might want to discover the per- sonal tastes of others. In the decentralized item ... Voir le document complet

20

PROPS: A PRivacy-Preserving Location Proof System

PROPS: A PRivacy-Preserving Location Proof System

... a collaborative and private ...for PRivacy-preserving lOcation Proof System, which allows users to generate proofs of location in a private and distributed way using neighboring nodes as ... Voir le document complet

11

Collaborative Filtering Under a Sybil Attack: Analysis of a Privacy Threat

Collaborative Filtering Under a Sybil Attack: Analysis of a Privacy Threat

... Within the domain of passive attacks, [13] analyzes how auxiliary information, obtained from the system itself or from external sources, makes it possible to extract individ- ual user preferences from otherwise aggregate ... Voir le document complet

7

From Collaborative to Privacy Preserving Sequential Pattern Mining

From Collaborative to Privacy Preserving Sequential Pattern Mining

... of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent ...the privacy legislations that are ... Voir le document complet

23

Scale And Translation Invariant Collaborative Filtering Systems

Scale And Translation Invariant Collaborative Filtering Systems

... reference collaborative filtering systems for benchmarking ...while preserving and even increasing slightly the ...are privacy issues [4] and a memory-based system cannot run conveniently on ... Voir le document complet

15

Intrusion Detections in Collaborative Organizations by Preserving Privacy

Intrusion Detections in Collaborative Organizations by Preserving Privacy

... ever, one key security aspect of not leaking any information to PS is achieved by randomizing the inputs before transmitting them to the Processing Site. Due to the randomization performed during the initial step, it ... Voir le document complet

13

Scale and Translation Invariant Collaborative Filtering Systems

Scale and Translation Invariant Collaborative Filtering Systems

... reference collaborative filtering systems for benchmarking ...while preserving and even increasing slightly the ...are privacy issues [4] and a memory-based system cannot run conveniently on ... Voir le document complet

17

Distributed Privacy Preserving Platform for Ridesharing Services

Distributed Privacy Preserving Platform for Ridesharing Services

... of collaborative economy allows people to directly interact with each other, it is also at the source of the advent of eminently centralized platforms and marketplaces, such as Uber and ...data privacy and ... Voir le document complet

7

A Survey of Privacy Preserving Reputation Systems

A Survey of Privacy Preserving Reputation Systems

... a distributed application ac- countable for their ...retaliation. Privacy preserving reputation systems enable users to provide feedback in a private and thus unin- hibited ...and privacy ... Voir le document complet

54

Data Visualization Via Collaborative Filtering

Data Visualization Via Collaborative Filtering

... Collaborative Filtering (CF) is the most successful approach to Recommender Systems (RS). In this paper, we suggest methods for global and personalized visualization of CF data. Users and items are first ... Voir le document complet

24

Task-Tuning in Privacy-Preserving Crowdsourcing Platforms

Task-Tuning in Privacy-Preserving Crowdsourcing Platforms

... sound privacy-preserving crowdsourcing processes is of utmost ...a privacy-preserving space partitioning algo- rithm dedicated to enabling a wide range of secondary usages of worker profiles ... Voir le document complet

5

Towards a Privacy-preserving National Identity Card

Towards a Privacy-preserving National Identity Card

... a Privacy-preserving Identity Card In this paper, we adopt a notation inspired from the work of Camenisch and Lysyanskaya on anonymous credentials [7] (see Section ...the privacy-preserving ... Voir le document complet

21

Capturing Privacy-preserving User Contexts with IndoorHash

Capturing Privacy-preserving User Contexts with IndoorHash

... localization accuracy. Li et al. [15] introduce a privacy-preserving WiFi indoor lo- calization system. However, they argue that the localization query can inevitably leak the client location and lead to ... Voir le document complet

18

Collaborative filtering with low regret

Collaborative filtering with low regret

... As the first main result, we show that a simple algorithm following item-item paradigm achieves a regret (which captures the number of poor recommendations over T time[r] ... Voir le document complet

72

Preserving privacy in speaker and speech characterisation

Preserving privacy in speaker and speech characterisation

... of privacy in speaker characterisation applications presents a formidable challenge, for privacy must be preserved throughout the full processing chains illustrated in ...on privacy preserva- tion ... Voir le document complet

41

Homomorphic Cryptography-based Privacy-Preserving Network Communications

Homomorphic Cryptography-based Privacy-Preserving Network Communications

... mod p). Elgamal also supports re-randomisation: a ciphertext c = (c[0], c[1]) for some message can be turned into a different looking, randomly distributed ciphertext for the same message: ReRand(pk, c) = (c[0].g ... Voir le document complet

28

Privacy in Distributed Electronic Commerce

Privacy in Distributed Electronic Commerce

... of distributed approaches for electronic ...for privacy in different ...user privacy and for protecting sensitive information for agent-based e-commerce? In this paper, we describe the issues that ... Voir le document complet

13

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase

... 1.1 Our Contribution The starting point of our project is a prototype implementation of the biometric setbase in the context of studying its suitability for the integration with the French national identity cards. There ... Voir le document complet

9

PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks

PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks

... data privacy during the arrhythmia classification phase, a dedicated neural network model should be ...data privacy is 2PC [23] whereby the client holds the input vector, and the server has the NN ... Voir le document complet

17

Show all 2997 documents...