Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

Sketch-flip-merge: Mergeable sketches for private distinct counting

J Hehir, D Ting, G Cormode - International Conference on …, 2023 - proceedings.mlr.press
Data sketching is a critical tool for distinct counting, enabling multisets to be represented by
compact summaries that admit fast cardinality estimates. Because sketches may be merged …

Differentially-private multi-party sketching for large-scale statistics

SG Choi, D Dachman-Soled, M Kulkarni… - Proceedings on …, 2020 - petsymposium.org
We consider a scenario where multiple organizations holding large amounts of sensitive
data from their users wish to compute aggregate statistics on this data while protecting the …

Sequence data matching and beyond: New privacy-preserving primitives based on bloom filters

W Xue, D Vatsalan, W Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Bloom filter encoding has widely been used as an efficient masking technique for privacy-
preserving matching functions. The existing matching techniques, however, are limited to …

Privacy-preserving high-dimensional data collection with federated generative autoencoder

X Jiang, X Zhou, J Grossklags - Proceedings on Privacy …, 2022 - petsymposium.org
Business intelligence and AI services often involve the collection of copious amounts of
multidimensional personal data. Since these data usually contain sensitive information of …

Inference attacks based on GAN in federated learning

T Ha, TK Dang - International Journal of Web Information Systems, 2022 - emerald.com
Purpose In the digital age, organizations want to build a more powerful machine learning
model that can serve the increasing needs of people. However, enhancing privacy and data …

Multiparty reach and frequency histogram: Private, secure, and practical

B Ghazi, B Kreuter, R Kumar… - Proceedings on …, 2022 - petsymposium.org
Consider the setting where multiple parties each hold a multiset of users and the task is to
estimate the reach (ie, the number of distinct users appearing across all parties) and the …

Privacy-preserving crowd-monitoring using bloom filters and homomorphic encryption

VD Stanciu, M Steen, C Dobre, A Peter - Proceedings of the 4th …, 2021 - dl.acm.org
This paper introduces an architecture for crowd-monitoring which allows statistical counting
for pedestrian dynamics while considering privacy-preservation for the individuals being …

[HTML][HTML] Privacy-friendly statistical counting for pedestrian dynamics

VD Stanciu, M van Steen, C Dobre, A Peter - Computer communications, 2023 - Elsevier
Abstract Relying on Wi-Fi signals broadcasted by smartphones became the de-facto
standard in the domain of pedestrian crowd monitoring. This method got the edge over other …

Anonymized counting of nonstationary Wi-Fi devices when monitoring crowds

VD Stanciu, M Van Steen, C Dobre… - Proceedings of the 25th …, 2022 - dl.acm.org
Pedestrian dynamics are nowadays commonly analyzed by leveraging Wi-Fi signals sent by
devices that people carry with them and captured by an infrastructure of Wi-Fi scanners …