Collaborative search log sanitization: Toward differential privacy and boosted utility

Y Hong, J Vaidya, H Lu, P Karras… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Severe privacy leakage in the AOL search log incident has attracted considerable worldwide
attention. However, all the web users' daily search intents and behavior are collected in such …

Highly efficient linear regression outsourcing to a cloud

F Chen, T **ang, X Lei, J Chen - IEEE transactions on cloud …, 2014 - ieeexplore.ieee.org
With cloud computing and mobile computing becoming more and more popular, there are a
lot potential applications for computation outsourcing to the cloud. This paper investigates …

Privacy preserving smart meter streaming against information leakage of appliance status

Y Hong, WM Liu, L Wang - IEEE transactions on information …, 2017 - ieeexplore.ieee.org
The smart grid frequently collects consumers' fine-grained power usage data through smart
meters to facilitate various applications, such as billing, load monitoring, regional statistics …

Decentralized coordination of a building manager and an electric vehicle aggregator

JE Contreras-Ocaña, MR Sarker… - … on Smart Grid, 2016 - ieeexplore.ieee.org
The ability to control commercial buildings and electric vehicles (EVs) is a promising source
of demand flexibility. In some cases, buildings and EVs share common infrastructure (eg, a …

An efficient and privacy‐preserving scheme for P2P energy exchange among smart microgrids

Y Hong, S Goel, WM Liu - International Journal of Energy …, 2016 - Wiley Online Library
To date, increasing number of entities on the smart grid begin to establish their local energy
generator for ensuring reliability and resilience of power supply. These 'microgrids' can …

A transformation-based multi-area dynamic economic dispatch approach for preserving information privacy of individual areas

L Wu - IEEE Transactions on Smart Grid, 2017 - ieeexplore.ieee.org
As the growing interconnection of regional electricity grids and the large-scale integration of
renewable energy demand for effective coordination among multiple areas, the multi-area …

US-UK PETs prize challenge: Anomaly detection via privacy-enhanced federated learning

H Asif, S Min, X Wang, J Vaidya - IEEE transactions on privacy, 2024 - ieeexplore.ieee.org
Privacy Enhancing Technologies (PETs) have the potential to enable collaborative analytics
without compromising privacy. This is extremely important for collaborative analytics can …

Distributed load management scheme to increase PV hosting capacity in LV feeders

R Mahroo‐Bakhtiari, M Izadi… - IET Renewable …, 2020 - Wiley Online Library
Proliferation of photovoltaic (PV) panels may cause voltage increases in low voltage (LV)
distribution feeders. This issue confines PV hosting capacity of the feeders. To overcome this …

A survey of privacy-aware supply chain collaboration: From theory to applications

Y Hong, J Vaidya, S Wang - Journal of Information Systems, 2014 - publications.aaahq.org
In the contemporary information era, the ubiquitous collection of data from different parties
frequently accommodates significant mutual benefits to the involved participants. However …

Privacy preserving driving style recognition

N Rizzo, E Sprissler, Y Hong… - … Conference on Connected …, 2015 - ieeexplore.ieee.org
In order to better manage the premiums and encourage safe driving, many commercial
insurance companies (eg, Geico, Progressive) are providing options for their customers to …