Articles with "sensitive information" as a keyword



Educational Sensitive Information Retrieval: Analysis, Application, and Optimization

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2844158

Abstract: Social networking and cloud services will collect a large number of high-dimensional and complex data for third party statistical analysis and data mining. Although data analysis is beneficial to users and external parties, they constitute… read more here.

Keywords: preference classification; sensitive information; analysis; information retrieval ... See more keywords
Photo by thinkmagically from unsplash

Research on Topic Recognition of Network Sensitive Information Based on SW-LDA Model

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2897475

Abstract: The mining of network sensitive information is of great significance for understanding the social stability of the network. Obtaining the network public opinion of sensitive information is helpful to master Internet users’ attitudes toward important… read more here.

Keywords: topic; model; sensitive information; recognition ... See more keywords
Photo by alterego_swiss from unsplash

Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3021415

Abstract: In the cloud environment, owing to the large-scale sharing of the upper application instance and the underlying virtual machine resources, the tenants’ information flow boundary in the shared virtual machine is fuzzy and difficult to… read more here.

Keywords: control; virtual boundary; sensitive information; information flow ... See more keywords
Photo by alterego_swiss from unsplash

Automated Multi-Layered Bytecode Generation for Preventing Sensitive Information Leaks From Android Applications

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3107601

Abstract: Sensitive information leakages from applications are a critical issue in the Android ecosystem. Despite the advance of techniques to secure applications such as packing and obfuscation, a lot of applications are still under the threat… read more here.

Keywords: information leaks; information; sensitive information; preventing sensitive ... See more keywords
Photo by alterego_swiss from unsplash

Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3121678

Abstract: Remote data integrity auditing ensures the integrity of cloud storage. In practice, cloud users may not want their sensitive data to be exposed to others. Thus, it is meaningful to investigate how to realize data… read more here.

Keywords: sensitive information; access; storage auditing; cloud storage ... See more keywords

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2018.2850312

Abstract: With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in… read more here.

Keywords: integrity auditing; data sharing; file; sensitive information ... See more keywords
Photo by anniespratt from unsplash

Deep Private-Feature Extraction

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Knowledge and Data Engineering"

DOI: 10.1109/tkde.2018.2878698

Abstract: We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider,… read more here.

Keywords: dpfe; sensitive information; deep private; private feature ... See more keywords
Photo from wikipedia

Preventing Sensitive Information Leakage From Mobile Sensor Signals via Integrative Transformation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Mobile Computing"

DOI: 10.1109/tmc.2021.3078086

Abstract: Ubiquitous mobile sensors on human activity recognition pose the threat of leaking personal information that is implicitly contained within the time-series sensor signals and can be extracted by attackers. Existing protective methods only support specific… read more here.

Keywords: information; sensitive information; tex math; inline formula ... See more keywords
Photo from wikipedia

Generation of Surrogates for De-Identification of Electronic Health Records

Sign Up to like & get
recommendations!
Published in 2019 at "Studies in health technology and informatics"

DOI: 10.3233/shti190185

Abstract: Unstructured electronic health records are valuable resources for research. Before they are shared with researchers, protected health information needs to be removed from these unstructured documents to protect patient privacy. The main steps involved in… read more here.

Keywords: health; electronic health; sensitive information; generation surrogates ... See more keywords
Photo from wikipedia

Decision Tree-Based Sensitive Information Identification and Encrypted Transmission System

Sign Up to like & get
recommendations!
Published in 2020 at "Entropy"

DOI: 10.3390/e22020192

Abstract: With the advent of the information age, the effective identification of sensitive information and the leakage of sensitive information during the transmission process are becoming increasingly serious issues. We designed a sensitive information recognition and… read more here.

Keywords: transmission system; information; decision tree; sensitive information ... See more keywords
Photo by alterego_swiss from unsplash

Is Your Privacy for Sale? An Experiment on the Willingness to Reveal Sensitive Information

Sign Up to like & get
recommendations!
Published in 2019 at "Games"

DOI: 10.3390/g10030028

Abstract: We investigate whether individuals’ self-stated privacy behavior is correlated with their reservation price for the disclosure of personal and potentially sensitive information. Our incentivized experiment has a unique setting: Information about choices with real implications… read more here.

Keywords: experiment; willingness; sensitive information; privacy sale ... See more keywords