Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Differentially private consensus and distributed optimization in multi-agent systems: A review
In the past few decades, distributed multi-agent system (MAS) control has received growing
attention due to its numerous advantages. Nonetheless, the substantial reliance on local …
attention due to its numerous advantages. Nonetheless, the substantial reliance on local …
On differentially private federated linear contextual bandits
We consider cross-silo federated linear contextual bandit (LCB) problem under differential
privacy, where multiple silos (agents) interact with the local users and communicate via a …
privacy, where multiple silos (agents) interact with the local users and communicate via a …
Differentially private distributed resource allocation via deviation tracking
This paper studies the distributed resource allocation problem where all the agents
cooperatively minimize the sum of their cost functions. To prevent private information from …
cooperatively minimize the sum of their cost functions. To prevent private information from …
Differentially private reward functions for markov decision processes
Markov decision processes often seek to maximize a reward function, but onlookers may
infer reward functions by observing agents, which can reveal sensitive information …
infer reward functions by observing agents, which can reveal sensitive information …
Guaranteed feasibility in differentially private linearly constrained convex optimization
Convex programming with linear constraints plays an important role in the operation of a
number of everyday systems. However, absent any additional protections, revealing or …
number of everyday systems. However, absent any additional protections, revealing or …
[کتاب][B] Guide to differential privacy modifications: a taxonomy of variants and extensions
B Pejó, D Desfontaines - 2022 - books.google.com
Shortly after it was first introduced in 2006, differential privacy became the flagship data
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …
Privacy-preserving set-based estimation using partially homomorphic encryption
The set-based estimation has gained a lot of attention due to its ability to guarantee state
enclosures for safety-critical systems. However, collecting measurements from distributed …
enclosures for safety-critical systems. However, collecting measurements from distributed …
Lowering the cost of anonymization
D Desfontaines - 2020 - research-collection.ethz.ch
The objective of this thesis is to make it easier to understand, use, and deploy strong
anonymization practices. We make progress towards this goal in three ways. First, we make …
anonymization practices. We make progress towards this goal in three ways. First, we make …
Local differential privacy for multi-agent distributed optimal power flow
Real-time data-driven optimization and control problems over networks, such as in traffic or
energy systems, may require sensitive information of participating agents to calculate …
energy systems, may require sensitive information of participating agents to calculate …
Private computing offloading in edge cloud via collaborative online learning
L Wang, L Yang, M Zhang, J Zhang… - Wireless …, 2022 - Wiley Online Library
Computing offloading based on mobile edge computing (MEC) for mobile devices (MDs)
has received great attentions in recent years. Strategy selection is an extremely important …
has received great attentions in recent years. Strategy selection is an extremely important …