C Heinze-Deml, B McWilliams… - arXiv preprint arXiv …, 2017 - arxiv.org
Privacy is crucial in many applications of machine learning. Legal, ethical and societal issues restrict the sharing of sensitive data making it difficult to learn from datasets that are …
Y ZHU, K WANG, Y ZHOU - 电子与信息学报, 2024 - jeit.ac.cn
In today's era, with the rapid development of big data technology and the continuous increase in data volume, large amounts of data are constantly collected by different …
Mobility data is the cornerstone of crucial applications, including traffic monitoring, crowdsourcing, and social networks. However, research shows that publishing accurate …
Context: Data Mining (DM) method has been evolving year by year and as of today there is also the enhancement of DM technique that can be run several times faster than the …
Given the sheer size of the consumer credit market and the huge number of consumer credit users, credit risk modeling, or predicting delinquent (or default) probabilities of borrowers to …
X Wang, B Yang, Z Xia, H Hou - Frontiers of Information Technology & …, 2019 - Springer
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have …
B Zeng - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Oblivious transfer (OT) is a fundamental primitive in cryptography. Halevi-Kalai OT (Halevi, S. and Y. Kalai (2012), Journal of Cryptology 25 (1)), which is based on smooth projective …
H Liu, Z Wu, C Peng, F Tian, L Lu - The International Arab Journal of …, 2020 - ccis2k.org
Considering the untrusted server, differential privacy and local differential privacy has been used for privacypreserving in data aggregation. Through our analysis, differential privacy …