Big privacy: Challenges and opportunities of privacy study in the age of big data

S Yu - IEEE access, 2016 - ieeexplore.ieee.org
One of the biggest concerns of big data is privacy. However, the study on big data privacy is
still at a very early stage. We believe the forthcoming solutions and theories of big data …

An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

[HTML][HTML] A roadmap for security challenges in the Internet of Things

AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …

Utility-privacy tradeoffs in databases: An information-theoretic approach

L Sankar, SR Rajagopalan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an analytical …

Context-aware generative adversarial privacy

C Huang, P Kairouz, X Chen, L Sankar, R Rajagopal - Entropy, 2017 - mdpi.com
Preserving the utility of published datasets while simultaneously providing provable privacy
guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such …

On the relation between identifiability, differential privacy, and mutual-information privacy

W Wang, L Ying, J Zhang - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
This paper investigates the relation between three different notions of privacy: identifiability,
differential privacy, and mutual-information privacy. Under a unified privacydistortion …

Data-driven privacy-preserving communication

Y Wang, P Ishwar, A Tripathy - US Patent 11,132,453, 2021 - Google Patents
A communication system including a receiver to receive training data. An input interface to
receive input data coupled to a hardware processor and a memory. The hardware processor …

From the information bottleneck to the privacy funnel

A Makhdoumi, S Salamatian, N Fawaz… - … Workshop (ITW 2014 …, 2014 - ieeexplore.ieee.org
We focus on the privacy-utility trade-off encountered by users who wish to disclose some
information to an analyst, that is correlated with their private data, in the hope of receiving …

Deep private-feature extraction

SA Osia, A Taheri, AS Shamsabadi… - … on Knowledge and …, 2018 - ieeexplore.ieee.org
We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is
trained and evaluated based on information theoretic constraints. Using the selective …

t-closeness through microaggregation: Strict privacy with enhanced utility preservation

J Soria-Comas, J Domingo-Ferrer… - … on Knowledge and …, 2015 - ieeexplore.ieee.org
Microaggregation is a technique for disclosure limitation aimed at protecting the privacy of
data subjects in microdata releases. It has been used as an alternative to generalization and …