2018
DOI: 10.1109/access.2018.2803129
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Identification Mechanism for Mobile Sensing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Because anonymizing the data set several times is not enough to protect the data from a solid and well-prepared attacker, for example, in an n-element database, a specific feature knower of n−1 objects can easily infer the value of the individual attribute that remains, and in this research, we use differential privacy, which is an interactive method that protects data, even from attackers with prior knowledge of it [ 31 ].…”
Section: Methodsmentioning
confidence: 99%
“…Because anonymizing the data set several times is not enough to protect the data from a solid and well-prepared attacker, for example, in an n-element database, a specific feature knower of n−1 objects can easily infer the value of the individual attribute that remains, and in this research, we use differential privacy, which is an interactive method that protects data, even from attackers with prior knowledge of it [ 31 ].…”
Section: Methodsmentioning
confidence: 99%
“…By avoiding the need to store data in a single location, we can harness multiple data sources, safeguard individual privacy, and reduce data storage expenses while achieving high accuracy levels [72,73]. Access to a large network of data from sources scattered over multiple data centers benefits the deep learning models [74,75]. Manoj et al [76] apply federated learning to predict agriculture production using weather data, soil data, and crop management data collected from numerous data silos.…”
Section: Deep Imbalanced Learningmentioning
confidence: 99%
“…The identification part is given by training a two-layered neural network and learning the user behavior in order to generate an identity for it. In [19] an efficient and privacy-preserving identification system for fingerprint data was presented using cloud systems. Within this context, the cloud has the duty of exploiting the computation power for extensive mathematical computations.…”
Section: Related Workmentioning
confidence: 99%