2019
DOI: 10.1007/978-981-13-2279-2
|View full text |Cite
|
Sign up to set email alerts
|

Compressed Sensing for Privacy-Preserving Data Processing

Abstract: of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…Here, > 0 plays the role of a privacy level: smaller implies a stronger privacy guarantee. In words, (49) says that, when is small, the densities of s(X ) and s(X ) are almost indistinguishable, as depicted in Figure 14.…”
Section: Sketchingmentioning
confidence: 97%
See 2 more Smart Citations
“…Here, > 0 plays the role of a privacy level: smaller implies a stronger privacy guarantee. In words, (49) says that, when is small, the densities of s(X ) and s(X ) are almost indistinguishable, as depicted in Figure 14.…”
Section: Sketchingmentioning
confidence: 97%
“…where we find it helpful to explicitly denote the dependence of the dataset X . We will assume that the realization Φ(•) of the random feature map is fixed and publicly known, in contrast to other approaches like [49,50] that use linear mixing matrices as encryption keys to ensure privacy preservation. As a result, when we treat s(X ) as random, this is due to the randomness in v, not the randomness in Φ(•) or X .…”
Section: Sketchingmentioning
confidence: 99%
See 1 more Smart Citation
“…The adversary is non-interactive, in that they have full access to the sketch of the dataset, or to sketches of disjoint subsets of the dataset if the latter is distributed across multiple devices (Figure 2), but cannot query the curator(s) for more data. Whereas there exist some approaches that use random projection matrices as encryption keys [51], we here assume that the feature map and the matrix of frequencies Ω are publicly known (similarly to, e.g., [32]). This is essential for analysts, who need to know the feature map in order to learn from the sketch.…”
Section: Attack Modelmentioning
confidence: 99%
“…e decomposition of the coefficient vector can be seen as a superposition of dictionary elements with a remaining term [2]. Compressed sensing was an emerging field that spans many applications in science and engineering, e.g., imaging and vision [3], photonic mixer device [4], electronic defense [5], security and cryptosystem [6], radar [7,8], earth observation [9], wireless networks [10,11], biometric watermarking [12], and healthcare [13].…”
mentioning
confidence: 99%