[HTML][HTML] Asynchronous federated learning on heterogeneous devices: A survey

C Xu, Y Qu, Y Xiang, L Gao - Computer Science Review, 2023 - Elsevier
Federated learning (FL) is a kind of distributed machine learning framework, where the
global model is generated on the centralized aggregation server based on the parameters of …

Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

Medical imaging deep learning with differential privacy

A Ziller, D Usynin, R Braren, M Makowski… - Scientific Reports, 2021 - nature.com
The successful training of deep learning models for diagnostic deployment in medical
imaging applications requires large volumes of data. Such data cannot be procured without …

Smart contract privacy protection using AI in cyber-physical systems: tools, techniques and challenges

R Gupta, S Tanwar, F Al-Turjman, P Italiya… - IEEE …, 2020 - ieeexplore.ieee.org
Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are
increasing exponentially. However, framing resilient and correct smart contracts (SCs) for …

Differential privacy for industrial internet of things: Opportunities, applications, and challenges

B Jiang, J Li, G Yue, H Song - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The development of Internet of Things (IoT) brings new changes to various fields.
Particularly, industrial IoT (IIoT) is promoting a new round of industrial revolution. With more …

Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining

D Dhinakaran, PMJ Prathap - The Journal of Supercomputing, 2022 - Springer
The confidential data is mainly managed by creating passwords, tokens, and unique
identifiers in an authorized manner. These records must be kept in a safe location away from …

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

Sok: differential privacies

D Desfontaines, B Pejó - arXiv preprint arXiv:1906.01337, 2019 - arxiv.org
Shortly after it was first introduced in 2006, differential privacy became the flagship data
privacy definition. Since then, numerous variants and extensions were proposed to adapt it …