Trustworthy AI: From principles to practices
The rapid development of Artificial Intelligence (AI) technology has enabled the deployment
of various systems based on it. However, many current AI systems are found vulnerable to …
of various systems based on it. However, many current AI systems are found vulnerable to …
Differential privacy for industrial internet of things: Opportunities, applications, and challenges
The development of Internet of Things (IoT) brings new changes to various fields.
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …
Towards automated log parsing for large-scale log data analysis
Logs are widely used in system management for dependability assurance because they are
often the only data available that record detailed system runtime behaviors in production …
often the only data available that record detailed system runtime behaviors in production …
Private spatial data aggregation in the local setting
With the deep penetration of the Internet and mobile devices, privacy preservation in the
local setting has become increasingly relevant. The local setting refers to the scenario where …
local setting has become increasingly relevant. The local setting refers to the scenario where …
Online evaluation for information retrieval
Online evaluation is one of the most common approaches to measure the effectiveness of an
information retrieval system. It involves fielding the information retrieval system to real users …
information retrieval system. It involves fielding the information retrieval system to real users …
Differential privacy preserving of training model in wireless big data with edge computing
With the popularity of smart devices and the widespread use of machine learning methods,
smart edges have become the mainstream of dealing with wireless big data. When smart …
smart edges have become the mainstream of dealing with wireless big data. When smart …
[KIRJA][B] Differential privacy and applications
Corporations, organizations, and governments have collected, digitized, and stored
information in digital forms since the invention of computers, and the speed of such data …
information in digital forms since the invention of computers, and the speed of such data …
Dpi: Ensuring strict differential privacy for infinite data streaming
Streaming data, crucial for applications like crowd-sourcing analytics, behavior studies, and
real-time monitoring, faces significant privacy risks due to the large and diverse data linked …
real-time monitoring, faces significant privacy risks due to the large and diverse data linked …
Privacy preserving smart meter streaming against information leakage of appliance status
The smart grid frequently collects consumers' fine-grained power usage data through smart
meters to facilitate various applications, such as billing, load monitoring, regional statistics …
meters to facilitate various applications, such as billing, load monitoring, regional statistics …
Universally harmonizing differential privacy mechanisms for federated learning: Boosting accuracy and convergence
Differentially private federated learning (DP-FL) is a promising technique for collaborative
model training while ensuring provable privacy for clients. However, optimizing the tradeoff …
model training while ensuring provable privacy for clients. However, optimizing the tradeoff …