Privacy preservation in big data from the communication perspective—A survey

T Wang, Z Zheng, MH Rehmani… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The advancement of data communication technologies promotes widespread data collection
and transmission in various application domains, thereby expanding big data significantly …

Winning the nist contest: A scalable and general approach to differentially private synthetic data

R McKenna, G Miklau, D Sheldon - arxiv preprint arxiv:2108.04978, 2021 - arxiv.org
We propose a general approach for differentially private synthetic data generation, that
consists of three steps:(1) select a collection of low-dimensional marginals,(2) measure …

GANobfuscator: Mitigating information leakage under GAN via differential privacy

C Xu, J Ren, D Zhang, Y Zhang, Z Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
By learning generative models of semantic-rich data distributions from samples, generative
adversarial network (GAN) has recently attracted intensive research interests due to its …

Applications of differential privacy in social network analysis: A survey

H Jiang, J Pei, D Yu, J Yu, B Gong… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …

Learning-based privacy-aware offloading for healthcare IoT with energy harvesting

M Min, X Wan, L **ao, Y Chen, M **a… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Mobile edge computing helps healthcare Internet of Things (IoT) devices with energy
harvesting provide satisfactory quality of experiences for computation intensive applications …

Aim: An adaptive and iterative mechanism for differentially private synthetic data

R McKenna, B Mullins, D Sheldon, G Miklau - arxiv preprint arxiv …, 2022 - arxiv.org
We propose AIM, a new algorithm for differentially private synthetic data generation. AIM is a
workload-adaptive algorithm within the paradigm of algorithms that first selects a set of …

Sok: Privacy-preserving data synthesis

Y Hu, F Wu, Q Li, Y Long, GM Garrido… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
As the prevalence of data analysis grows, safeguarding data privacy has become a
paramount concern. Consequently, there has been an upsurge in the development of …

Secure data aggregation of lightweight E-healthcare IoT devices with fair incentives

W Tang, J Ren, K Deng, Y Zhang - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
With rapid development of e-healthcare systems, patients that are equipped with resource-
limited e-healthcare devices (Internet of Things) generate huge amount of health data for …

CALM: Consistent adaptive local marginal for marginal release under local differential privacy

Z Zhang, T Wang, N Li, S He, J Chen - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Marginal tables are the workhorse of capturing the correlations among a set of attributes. We
consider the problem of constructing marginal tables given a set of user's multi-dimensional …

A survey of unsupervised learning methods for high-dimensional uncertainty quantification in black-box-type problems

K Kontolati, D Loukrezis, DG Giovanis… - Journal of …, 2022 - Elsevier
Constructing surrogate models for uncertainty quantification (UQ) on complex partial
differential equations (PDEs) having inherently high-dimensional O (10 n), n≥ 2, stochastic …