Joint detection and identification feature learning for person search

T **ao, S Li, B Wang, L Lin… - Proceedings of the IEEE …, 2017 - openaccess.thecvf.com
Existing person re-identification benchmarks and methods mainly focus on matching
cropped pedestrian images between queries and candidates. However, it is different from …

[HTML][HTML] Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions

A Yao, G Li, X Li, F Jiang, J Xu, X Liu - Array, 2023 - Elsevier
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …

Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics

G D'Acquisto, J Domingo-Ferrer, P Kikiras… - arxiv preprint arxiv …, 2015 - arxiv.org
The extensive collection and processing of personal information in big data analytics has
given rise to serious privacy concerns, related to wide scale electronic surveillance, profiling …

Heavy hitter estimation over set-valued data with local differential privacy

Z Qin, Y Yang, T Yu, I Khalil, X **ao, K Ren - Proceedings of the 2016 …, 2016 - dl.acm.org
In local differential privacy (LDP), each user perturbs her data locally before sending the
noisy data to a data collector. The latter then analyzes the data to obtain useful statistics …

Differentially private data publishing and analysis: A survey

T Zhu, G Li, W Zhou, SY Philip - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Differential privacy is an essential and prevalent privacy model that has been widely
explored in recent decades. This survey provides a comprehensive and structured overview …

Winning the NIST Contest: A scalable and general approach to differentially private synthetic data

R McKenna, G Miklau, D Sheldon - arxiv preprint arxiv:2108.04978, 2021 - arxiv.org
We propose a general approach for differentially private synthetic data generation, that
consists of three steps:(1) select a collection of low-dimensional marginals,(2) measure …

Functional mechanism: Regression analysis under differential privacy

J Zhang, Z Zhang, X **ao, Y Yang… - arxiv preprint arxiv …, 2012 - arxiv.org
\epsilon-differential privacy is the state-of-the-art model for releasing sensitive information
while protecting privacy. Numerous methods have been proposed to enforce epsilon …

Differentially private machine learning using a random forest classifier

I Nerurkar, C Hockenbrocht, L Damewood… - US Patent …, 2020 - Google Patents
A request from a client is received to generate a differentially private random forest classifier
trained using a set of restricted data. The differentially private random forest classifier is …

Llm-pbe: Assessing data privacy in large language models

Q Li, J Hong, C **e, J Tan, R **n, J Hou, X Yin… - arxiv preprint arxiv …, 2024 - arxiv.org
Large Language Models (LLMs) have become integral to numerous domains, significantly
advancing applications in data management, mining, and analysis. Their profound …

Synthesizing plausible privacy-preserving location traces

V Bindschaedler, R Shokri - 2016 IEEE Symposium on Security …, 2016 - ieeexplore.ieee.org
Camouflaging user's actual location with fakes is a prevalent obfuscation technique for
protecting location privacy. We show that the protection mechanisms based on the existing …