Differential privacy for deep and federated learning: A survey

A El Ouadrhiri, A Abdelhadi - IEEE access, 2022 - ieeexplore.ieee.org
Users' privacy is vulnerable at all stages of the deep learning process. Sensitive information
of users may be disclosed during data collection, during training, or even after releasing the …

Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

Privacy and security concerns in the smart city

BFG Fabrègue, A Bogoni - Smart Cities, 2023 - mdpi.com
This article will highlight negative personal privacy and informational security outcomes that
may arise from development programs currently pursued in smart cities. It aims to illustrate …

On mobile edge caching

J Yao, T Han, N Ansari - IEEE Communications Surveys & …, 2019 - ieeexplore.ieee.org
With the widespread adoption of various mobile applications, the amount of traffic in wireless
networks is growing at an exponential rate, which exerts a great burden on mobile core …

Differential privacy for industrial internet of things: Opportunities, applications, and challenges

B Jiang, J Li, G Yue, H Song - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The development of Internet of Things (IoT) brings new changes to various fields.
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …

Graph theory: A comprehensive survey about graph theory applications in computer science and social networks

A Majeed, I Rauf - Inventions, 2020 - mdpi.com
Graph theory (GT) concepts are potentially applicable in the field of computer science (CS)
for many purposes. The unique applications of GT in the CS field such as clustering of web …

Applications of differential privacy in social network analysis: A survey

H Jiang, J Pei, D Yu, J Yu, B Gong… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …

[HTML][HTML] The application of blockchain in social media: a systematic literature review

MA Hisseine, D Chen, X Yang - Applied Sciences, 2022 - mdpi.com
Social media has transformed the mode of communication globally by providing an
extensive system for exchanging ideas, initiating business contracts, and proposing new …

A survey on privacy in social media: Identification, mitigation, and applications

G Beigi, H Liu - ACM Transactions on Data Science, 2020 - dl.acm.org
The increasing popularity of social media has attracted a huge number of people to
participate in numerous activities on a daily basis. This results in tremendous amounts of …

[HTML][HTML] Context-aware recommender system: A review of recent developmental process and future research direction

K Haruna, M Akmar Ismail, S Suhendroyono… - Applied Sciences, 2017 - mdpi.com
Intelligent data handling techniques are beneficial for users; to store, process, analyze and
access the vast amount of information produced by electronic and automated devices. The …