Lyapunov central limit theorem: Theoretical properties and applications in big-data-populated smart city settings

A Cuzzocrea, E Fadda, A Baldo - … Conference on Cloud and Big Data …, 2021 - dl.acm.org
Central Limit Theorems have a fundamental role in statistics and in a wide range of practical
applications. The most famous formulation was proposed by Lindeberg–Lévy and it requires …

Frequency Estimation Mechanisms Under ϵδ-Utility-Optimized Local Differential Privacy

Y Zhang, Y Zhu, Y Zhou, J Yuan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Frequency estimation mechanisms are widely applied in domains such as machine learning
and cloud computing, where it is desirable to provide statistical information. As a …

Randomized response mechanisms for differential privacy data analysis: Bounds and applications

F Ma, P Wang - arXiv preprint arXiv:2112.07397, 2021 - arxiv.org
Randomized response, as a basic building-block for differentially private mechanism, has
given rise to great interest and found various potential applications in science communities …

Making the pedigree to your big data repository: Innovative methods, solutions, and algorithms for supporting big data privacy in distributed settings via data-driven …

A Cuzzocrea, E Damiani - 2019 IEEE 43rd Annual Computer …, 2019 - ieeexplore.ieee.org
Starting from our previous research where we in-troduced a general framework for
supporting data-driven privacy-preserving big data management in distributed …

A general overview of privacy-preserving big data management and analytics models, methods and techniques in specific domains: Static and dynamic distributed …

A Cuzzocrea, C Mastroianni - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Privacy-preserving big data management and analytics is gaining the momentum within the
research community, and several current research efforts aim to provide solutions to the …

An intelligent framework for malware detection in Internet of things (IoT) ecosystem

O Eboya, JB Juremi… - 2020 IEEE 8th R10 …, 2020 - ieeexplore.ieee.org
The Heuristic-Based Analysis method, which is otherwise known as Behavioural-Based
Analysis technique applied by several Anti-Virus and Anti-Malware vendors of computer …

Approach to Privacy Preserved Data Mining in Distributed Systems

I Anikin, R Gazimov - 2019 International Russian Automation …, 2019 - ieeexplore.ieee.org
Nowadays using data mining techniques is very important for many modern industrial
systems. They could help to decide different tasks in these systems related with decision …

An applied research on big data analysis and mining technology in education

Y Wang, C Mu, X Li, Y Yang - 2019 international conference on …, 2019 - ieeexplore.ieee.org
With the development of modern industry and information technology, data resources have
become more and more important factors of production. Big Data thinking is the product of …

Scalable privacy-preserving big data management and analytics: Where we are and where we are going

A Cuzzocrea - Proceedings of the 2018 2nd International Conference …, 2018 - dl.acm.org
While several research efforts have been developed in the context of privacy-preserving big
data management and analytics re-cently, relevant challenges arise when such models …

PRIVACY-PRESERVING IN MULTI-PARTY DATA RELEASE ON CLOUD FOR BIG DATA USING FUSION LEARNING

D Dangi - INFORMATION TECHNOLOGY IN INDUSTRY, 2021 - it-in-industry.org
The data volume increases every day and the next wave of apps cannot be envisaged
without the created and executed data-driven algorithms. In this post, we undertook an …