作者:
Domingo-Ferrer, JosepUniversitat Rovira i Virgili
Dept. of Computer Engineering and Mathematics UNESCO Chair in Data Privacy CYBERCAT-Center for Cybersecurity Research of Catalonia Tarragona Catalonia Spain
In our days, decentralized computing is a marked trend. Beyond its advantages in terms of scalability and fault tolerance, it is better adapted to ethical constraints than centralized computation (where a single party...
详细信息
Human facial data hold vast potential for a variety of tasks. However, privacy regulations such as the EU General data Protection Regulation have motivated the removal or limited the publication of facial data sets fr...
详细信息
Longitudinal data are data collected over time on a set of individuals. The fact that information items are accumulated on each individual over time makes longitudinal data particularly privacy-sensitive. Existing ano...
详细信息
Human facial data hold tremendous potential to address a variety of classification problems, including face recognition, age estimation, gender identification, emotion analysis, and race classification. However, recen...
详细信息
Federated learning (FL) enables learning a global machine learning model from local data distributed among a set of participating workers. This makes it possible i) to train more accurate models due to learning from r...
详细信息
In federated learning (FL), a set of participants share updates computed on their local data with an aggregator server that combines updates into a global model. However, reconciling accuracy with privacy and security...
The Wasserstein distance, also known in computer science as the Earth Mover’s Distance (EMD) is a distance metric between two probability distributions. EMD has often been used as a distance metric to compare images ...
详细信息
In our data world, a host of not necessarily trusted controllers gather data on individual subjects. To preserve her privacy and, more generally, her informational self-determination, the individual has to be empowere...
详细信息
作者:
Domingo-Ferrer, JosepUniversitat Rovira i Virgili
Department of Computer Science and Mathematics CYBERCAT-Center for Cybersecurity Research of Catalonia UNESCO Chair in Data Privacy Av. Països Catalans 26 Tarragona Catalonia43007 Spain
The big data explosion opens unprecedented analysis and inference possibilities that may even enable modeling the world and forecasting its evolution with great accuracy. The dark side of such a data bounty is that it...
详细信息
Peer-to-peer scenarios are increasingly important in globalized information societies. To guide the interaction between (rational) agents in these P2P settings, self-enforcing collaborative protocols are desirable, so...
Peer-to-peer scenarios are increasingly important in globalized information societies. To guide the interaction between (rational) agents in these P2P settings, self-enforcing collaborative protocols are desirable, so that agents have no motivation to deviate from them. Moreover, to increase social welfare and ensure the success of protocols, it would be desirable to make the collaboration between agents mutually beneficial. In this paper, we present the notion of co-utility, which refers to protocols in which mutual help is the best rational option to take, even for purely selfish agents. This concept is illustrated through several P2P scenarios, framed both in the information society and in the physical world, for which we present and discuss co-utile self-enforcing protocols.
暂无评论