The emergence of Bitcoin as a disruptive force in the business and finance space, starting an extensive examination of its origin, technology foundations, effects on trade, and where it will go from here, has set off ...
详细信息
Mobile image photography is continuously emerging as an area of interest, yet achieving professional-level camera quality remains a challenge due to hardware limitations. In order to improve the images taken from mobi...
详细信息
In recent years,the research field of data collection under local differential privacy(LDP)has expanded its focus fromelementary data types to includemore complex structural data,such as set-value and graph ***,our co...
详细信息
In recent years,the research field of data collection under local differential privacy(LDP)has expanded its focus fromelementary data types to includemore complex structural data,such as set-value and graph ***,our comprehensive review of existing literature reveals that there needs to be more studies that engage with key-value data *** studies would simultaneously collect the frequencies of keys and the mean of values associated with each ***,the allocation of the privacy budget between the frequencies of keys and the means of values for each key does not yield an optimal utility *** the importance of obtaining accurate key frequencies and mean estimations for key-value data collection,this paper presents a novel framework:the Key-Strategy Framework forKey-ValueDataCollection under ***,theKey-StrategyUnary Encoding(KS-UE)strategy is proposed within non-interactive frameworks for the purpose of privacy budget allocation to achieve precise key frequencies;subsequently,the Key-Strategy Generalized Randomized Response(KS-GRR)strategy is introduced for interactive frameworks to enhance the efficiency of collecting frequent keys through group-anditeration *** strategies are adapted for scenarios in which users possess either a single or multiple key-value ***,we demonstrate that the variance of KS-UE is lower than that of existing *** claims are substantiated through extensive experimental evaluation on real-world datasets,confirming the effectiveness and efficiency of the KS-UE and KS-GRR strategies.
Diabetic retinopathy, a commonly observed disorder associated with diabetes mellitus, is distinguished by the emergence of irregularities in the retina that adversely affect visual capabilities. In the absence of time...
详细信息
The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs ...
详细信息
The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs share health data that contain sensitive ***,the data exchange process raises privacy concerns,especially when the integration of health data from multiple sources(linkage attack)results in further *** attack is a type of dominant attack in the privacy domain,which can leverage various data sources for private data ***,adversaries launch poisoning attacks to falsify the health data,which leads to misdiagnosing or even physical *** protect private health data,we propose a personalized differential privacy model based on the trust levels among *** trust is evaluated by a defined community density,while the corresponding privacy protection level is mapped to controllable randomized noise constrained by differential *** avoid linkage attacks in personalized differential privacy,we design a noise correlation decoupling mechanism using a Markov stochastic *** addition,we build the community model on a blockchain,which can mitigate the risk of poisoning attacks during differentially private data transmission over *** experiments and analysis on real-world datasets have testified the proposed model,and achieved better performance compared with existing research from perspectives of privacy protection and effectiveness.
Recently, graph data has received a lot of attention as it is used to represent other data types including social networks, banking, security, financial, medical, and textual data. Therefore, anomaly detection in such...
详细信息
WiFi-based technology is appealing for indoor localization due to the widely deployed infrastructures. Recently, path separation solutions have been proposed to address the multipath effects and achieve decimeter-leve...
详细信息
Fisheye lens cameras offer a significantly wider field of view compared to conventional cameras. However, they also introduce geometric distortions and distorted shapes in captured images. This paper presents a self-s...
详细信息
When a brain tumor is in its most advanced stages, it is considered a highly malignant medical condition with an adverse outcome. To improve patient survival rates and ensure proper medical attention, accurate diagnos...
详细信息
Video anomaly detection (VAD) aims to use computertechnology to automatically detect and recognize abnormal patterns in videos. Based on multi-instance learning, a weakly supervised anomaly detection method treats tr...
详细信息
暂无评论