Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Privacy-preserving data publishing: A survey of recent developments
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …
created tremendous opportunities for knowledge-and information-based decision making …
Fair algorithms for clustering
We study the problem of finding low-cost {\em fair clusterings} in data where each data point
may belong to many protected groups. Our work significantly generalizes the seminal work …
may belong to many protected groups. Our work significantly generalizes the seminal work …
Orchestra: Unsupervised federated learning via globally consistent clustering
Federated learning is generally used in tasks where labels are readily available (eg, next
word prediction). Relaxing this constraint requires design of unsupervised learning …
word prediction). Relaxing this constraint requires design of unsupervised learning …
Fair k-center clustering for data summarization
In data summarization we want to choose $ k $ prototypes in order to summarize a data set.
We study a setting where the data set comprises several demographic groups and we are …
We study a setting where the data set comprises several demographic groups and we are …
[Књига][B] A general survey of privacy-preserving data mining models and algorithms
CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …
the wide proliferation of sensitive information on the internet. A number of algorithmic …
A statistical framework for differential privacy
One goal of statistical privacy research is to construct a data release mechanism that
protects individual privacy while preserving information content. An example is a random …
protects individual privacy while preserving information content. An example is a random …
Never walk alone: Uncertainty for anonymity in moving objects databases
Preserving individual privacy when publishing data is a problem that is receiving increasing
attention. According to the fc-anonymity principle, each release of data must be such that …
attention. According to the fc-anonymity principle, each release of data must be such that …
M-invariance: towards privacy preserving re-publication of dynamic datasets
The previous literature of privacy preserving data publication has focused on performing"
one-time" releases. Specifically, none of the existing solutions supports re-publication of the …
one-time" releases. Specifically, none of the existing solutions supports re-publication of the …
Towards trajectory anonymization: a generalization-based approach
Trajectory datasets are becoming more and more popular due to the massive usage of GPS
and other location-based devices and services. In this paper, we address privacy issues …
and other location-based devices and services. In this paper, we address privacy issues …