209 results on '"Domingo-Ferrer, Josep"'
Search Results
2. Fair detection of poisoning attacks in federated learning on non-i.i.d. data
3. Explaining predictions and attacks in federated learning via random forests
4. Secure, accurate and privacy-aware fully decentralized learning via co-utility
5. FL-Defender: Combating targeted attacks in federated learning
6. Differentially private publication of database streams via hybrid video coding
7. Decentralized [formula omitted]-anonymization of trajectories via privacy-preserving tit-for-tat
8. Give more data, awareness and control to individual citizens, and they will help COVID-19 containment
9. Achieving security and privacy in federated learning systems: Survey, research challenges and future directions
10. Supplementary Materials for 'How to Avoid Reidentification with Proper Anonymization'- Comment on 'Unique in the shopping mall: on the reidentifiability of credit card metadata'
11. Machine learning explainability via microaggregation and shallow decision trees
12. Differentially private data publishing via cross-moment microaggregation
13. Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds
14. Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph
15. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
16. Efficient privacy-preserving implicit authentication
17. Co-utile disclosure of private data in social networks
18. Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds
19. Co-utile P2P ridesharing via decentralization and reputation management
20. Self-enforcing protocols via co-utile reputation management
21. Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges
22. Dynamic group size accreditation and group discounts preserving anonymity
23. Utility-preserving differentially private data releases via individual ranking microaggregation
24. Privacy-aware loyalty programs
25. New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users
26. Practical secure and privacy-preserving scheme for value-added applications in VANETs
27. Database Reconstruction Is Not So Easy and Is Different from Reidentification.
28. A Rejoinder to Garfinkel (2023) – Legacy Statistical Disclosure Limitation Techniques for Protecting 2020 Decennial US Census: Still a Viable Option.
29. A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning.
30. From t-closeness to differential privacy and vice versa in data anonymization
31. A co-utility approach to the mesh economy: the crowd-based business model
32. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
33. FRR: Fair remote retrieval of outsourced private medical records in electronic health networks
34. Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security
35. Optimal data-independent noise for differential privacy
36. Co-utility: Self-enforcing collaborative protocols with mutual help
37. Big Data Privacy: Challenges to Privacy Principles and Models
38. Discrimination- and privacy-aware patterns
39. Flexible attribute-based encryption applicable to secure e-healthcare records
40. Anonymization of nominal data based on semantic marginality
41. On the privacy offered by (k, δ)-anonymity
42. Distributed multicast of fingerprinted content based on a rational peer-to-peer community
43. Provably secure threshold public-key encryption with adaptive security and short ciphertexts
44. Microaggregation- and permutation-based anonymization of movement data
45. Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios
46. Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search: The multi-hop scenario
47. Predictive protocol for the scalable identification of RFID tags through collaborative readers
48. Enhancing data utility in differential privacy via microaggregation-based k -anonymity
49. Risk-Utility Paradigms for Statistical Disclosure Limitation: How to Think, But Not How to Act [with Discussions]
50. A bibliometric index based on the collaboration distance between cited and citing authors
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.