A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing

F Skopik, G Settanni, R Fiedler - Computers & Security, 2016 - Elsevier
The Internet threat landscape is fundamentally changing. A major shift away from hobby
hacking toward well-organized cyber crime can be observed. These attacks are typically …

Privacy-preserving data publishing: A survey of recent developments

BCM Fung, K Wang, R Chen, PS Yu - ACM Computing Surveys (Csur), 2010 - dl.acm.org
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …

Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing

J Chan, D Foster, S Gollakota, E Horvitz… - arXiv preprint arXiv …, 2020 - arxiv.org
The global health threat from COVID-19 has been controlled in a number of instances by
large-scale testing and contact tracing efforts. We created this document to suggest three …

[图书][B] The data matching process

P Christen, P Christen - 2012 - Springer
This chapter provides an overview of the data matching process, and describes the five
major steps involved in this process: data pre-processing (cleaning and standardisation) …

Sample-level data selection for federated learning

A Li, L Zhang, J Tan, Y Qin, J Wang… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
Federated learning (FL) enables participants to collaboratively construct a global machine
learning model without sharing their local training data to the remote server. In FL systems …

Phasing: Private set intersection using permutation-based hashing

B Pinkas, T Schneider, G Segev, M Zohner - 24th USENIX Security …, 2015 - usenix.org
Private Set Intersection (PSI) allows two parties to compute the intersection of private sets
while revealing nothing more than the intersection itself. PSI needs to be applied to large …

L-diversity: Privacy beyond k-anonymity

A Machanavajjhala, D Kifer, J Gehrke… - Acm transactions on …, 2007 - dl.acm.org
Publishing data about individuals without revealing sensitive information about them is an
important problem. In recent years, a new definition of privacy called k-anonymity has …

Data-Centric Systems and Applications

MJ Carey, S Ceri, P Bernstein, U Dayal, C Faloutsos… - Italy: Springer, 2006 - Springer
The rapid growth of the Web in the past two decades has made it the largest publicly
accessible data source in the world. Web mining aims to discover useful information or …

[PDF][PDF] The new casper: Query processing for location services without compromising privacy

MF Mokbel, CY Chow, WG Aref - VLDB, 2006 - www-users.cse.umn.edu
This paper tackles a major privacy concern in current location-based services where users
have to continuously report their locations to the database server in order to obtain the …

Privacy-preserving set operations

L Kissner, D Song - Annual International Cryptology Conference, 2005 - Springer
In many important applications, a collection of mutually distrustful parties must perform
private computation over multisets. Each party's input to the function is his private input …