Machine learning for synthetic data generation: a review

Y Lu, M Shen, H Wang, X Wang, C van Rechem… - arxiv preprint arxiv …, 2023 - arxiv.org
Machine learning heavily relies on data, but real-world applications often encounter various
data-related issues. These include data of poor quality, insufficient data points leading to …

Differential privacy for deep and federated learning: A survey

A El Ouadrhiri, A Abdelhadi - IEEE access, 2022 - ieeexplore.ieee.org
Users' privacy is vulnerable at all stages of the deep learning process. Sensitive information
of users may be disclosed during data collection, during training, or even after releasing the …

Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z **ao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

Vector-indistinguishability: location dependency based privacy protection for successive location data

Y Zhao, J Chen - IEEE Transactions on Computers, 2023 - ieeexplore.ieee.org
With the wide use of GPS enabled devices and Location-Based Services, location privacy
has become an increasingly worrying challenge to our community. Existing approaches …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

Applications of differential privacy in social network analysis: A survey

H Jiang, J Pei, D Yu, J Yu, B Gong… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Differential privacy provides strong privacy preservation guarantee in information sharing.
As social network analysis has been enjoying many applications, it opens a new arena for …

Synthesizing plausible privacy-preserving location traces

V Bindschaedler, R Shokri - 2016 IEEE symposium on security …, 2016 - ieeexplore.ieee.org
Camouflaging user's actual location with fakes is a prevalent obfuscation technique for
protecting location privacy. We show that the protection mechanisms based on the existing …

DPT: differentially private trajectory synthesis using hierarchical reference systems

X He, G Cormode, A Machanavajjhala… - Proceedings of the …, 2015 - wrap.warwick.ac.uk
GPS-enabled devices are now ubiquitous, from airplanes and cars to smartphones and
wearable technology. This has resulted in a wealth of data about the movements of …

Sok: Privacy-preserving data synthesis

Y Hu, F Wu, Q Li, Y Long, GM Garrido… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
As the prevalence of data analysis grows, safeguarding data privacy has become a
paramount concern. Consequently, there has been an upsurge in the development of …