Privacy-preserving machine learning: Methods, challenges and directions

R Xu, N Baracaldo, J Joshi - arxiv preprint arxiv:2108.04417, 2021 - arxiv.org
Machine learning (ML) is increasingly being adopted in a wide variety of application
domains. Usually, a well-performing ML model relies on a large volume of training data and …

A comprehensive overview of large language models (llms) for cyber defences: Opportunities and directions

M Hassanin, N Moustafa - arxiv preprint arxiv:2405.14487, 2024 - arxiv.org
The recent progression of Large Language Models (LLMs) has witnessed great success in
the fields of data-centric applications. LLMs trained on massive textual datasets showed …

[PDF][PDF] Big data analysis and perturbation using data mining algorithm

W Haoxiang, S Smys - Journal of Soft Computing Paradigm …, 2021 - scholar.archive.org
The advancement and introduction of computing technologies has proven to be highly
effective and has resulted in the production of large amount of data that is to be analyzed …

Utility-privacy tradeoffs in databases: An information-theoretic approach

L Sankar, SR Rajagopalan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an analytical …

Privacy-preserving record linkage for big data: Current approaches and research challenges

D Vatsalan, Z Sehili, P Christen, E Rahm - Handbook of big data …, 2017 - Springer
Abstract The growth of Big Data, especially personal data dispersed in multiple data
sources, presents enormous opportunities and insights for businesses to explore and …

Towards algorithm auditing: managing legal, ethical and technological risks of AI, ML and associated algorithms

A Koshiyama, E Kazim, P Treleaven… - Royal Society …, 2024 - royalsocietypublishing.org
Business reliance on algorithms is becoming ubiquitous, and companies are increasingly
concerned about their algorithms causing major financial or reputational damage. High …

Big-data for building energy performance: Lessons from assembling a very large national database of building energy use

PA Mathew, LN Dunn, MD Sohn, A Mercado… - Applied Energy, 2015 - Elsevier
Building energy data has been used for decades to understand energy flows in buildings
and plan for future energy demand. Recent market, technology and policy drivers have …

Web service QoS prediction via collaborative filtering: A survey

Z Zheng, X Li, M Tang, F **e… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the growing number of competing Web services that provide similar functionality,
Quality-of-Service (QoS) prediction is becoming increasingly important for various QoS …

On syntactic anonymity and differential privacy

C Clifton, T Tassa - 2013 IEEE 29th International Conference on …, 2013 - ieeexplore.ieee.org
Recently, there has been a growing debate over approaches for handling and analyzing
private data. Research has identified issues with syntactic anonymity models. Differential …

POD-based background removal for particle image velocimetry

MA Mendez, M Raiola, A Masullo, S Discetti… - … Thermal and Fluid …, 2017 - Elsevier
State-of-art preprocessing methods for Particle Image Velocimetry (PIV) are severely
challenged by time-dependent light reflections and strongly non-uniform background. In this …