Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Big privacy: Challenges and opportunities of privacy study in the age of big data
S Yu - IEEE access, 2016 - ieeexplore.ieee.org
One of the biggest concerns of big data is privacy. However, the study on big data privacy is
still at a very early stage. We believe the forthcoming solutions and theories of big data …
still at a very early stage. We believe the forthcoming solutions and theories of big data …
[HTML][HTML] A roadmap for security challenges in the Internet of Things
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …
context are playing an active role in human activities, systems and processes. The high …
Utility-privacy tradeoffs in databases: An information-theoretic approach
L Sankar, SR Rajagopalan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an analytical …
guarantees is an important unsolved problem. This problem drives the need for an analytical …
Context-aware generative adversarial privacy
Preserving the utility of published datasets while simultaneously providing provable privacy
guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such …
guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such …
From the information bottleneck to the privacy funnel
We focus on the privacy-utility trade-off encountered by users who wish to disclose some
information to an analyst, that is correlated with their private data, in the hope of receiving …
information to an analyst, that is correlated with their private data, in the hope of receiving …
On the relation between identifiability, differential privacy, and mutual-information privacy
This paper investigates the relation between three different notions of privacy: identifiability,
differential privacy, and mutual-information privacy. Under a unified privacydistortion …
differential privacy, and mutual-information privacy. Under a unified privacydistortion …
Data-driven privacy-preserving communication
(57) ABSTRACT A communication system including a receiver to receive training data. An
input interface to receive input data coupled to a hardware processor and a memory. The …
input interface to receive input data coupled to a hardware processor and a memory. The …
Deep private-feature extraction
We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is
trained and evaluated based on information theoretic constraints. Using the selective …
trained and evaluated based on information theoretic constraints. Using the selective …
Optimal utility-privacy trade-off with total variation distance as a privacy measure
The total variation distance is proposed as a privacy measure in an information disclosure
scenario when the goal is to reveal some information about available data in return of utility …
scenario when the goal is to reveal some information about available data in return of utility …