Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2844158
Abstract: Social networking and cloud services will collect a large number of high-dimensional and complex data for third party statistical analysis and data mining. Although data analysis is beneficial to users and external parties, they constitute…
read more here.
Keywords:
preference classification;
sensitive information;
analysis;
information retrieval ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2897475
Abstract: The mining of network sensitive information is of great significance for understanding the social stability of the network. Obtaining the network public opinion of sensitive information is helpful to master Internet users’ attitudes toward important…
read more here.
Keywords:
topic;
model;
sensitive information;
recognition ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3021415
Abstract: In the cloud environment, owing to the large-scale sharing of the upper application instance and the underlying virtual machine resources, the tenants’ information flow boundary in the shared virtual machine is fuzzy and difficult to…
read more here.
Keywords:
control;
virtual boundary;
sensitive information;
information flow ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3107601
Abstract: Sensitive information leakages from applications are a critical issue in the Android ecosystem. Despite the advance of techniques to secure applications such as packing and obfuscation, a lot of applications are still under the threat…
read more here.
Keywords:
information leaks;
information;
sensitive information;
preventing sensitive ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3121678
Abstract: Remote data integrity auditing ensures the integrity of cloud storage. In practice, cloud users may not want their sensitive data to be exposed to others. Thus, it is meaningful to investigate how to realize data…
read more here.
Keywords:
sensitive information;
access;
storage auditing;
cloud storage ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2018.2850312
Abstract: With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in…
read more here.
Keywords:
integrity auditing;
data sharing;
file;
sensitive information ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Knowledge and Data Engineering"
DOI: 10.1109/tkde.2018.2878698
Abstract: We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider,…
read more here.
Keywords:
dpfe;
sensitive information;
deep private;
private feature ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Mobile Computing"
DOI: 10.1109/tmc.2021.3078086
Abstract: Ubiquitous mobile sensors on human activity recognition pose the threat of leaking personal information that is implicitly contained within the time-series sensor signals and can be extracted by attackers. Existing protective methods only support specific…
read more here.
Keywords:
information;
sensitive information;
tex math;
inline formula ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Studies in health technology and informatics"
DOI: 10.3233/shti190185
Abstract: Unstructured electronic health records are valuable resources for research. Before they are shared with researchers, protected health information needs to be removed from these unstructured documents to protect patient privacy. The main steps involved in…
read more here.
Keywords:
health;
electronic health;
sensitive information;
generation surrogates ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Entropy"
DOI: 10.3390/e22020192
Abstract: With the advent of the information age, the effective identification of sensitive information and the leakage of sensitive information during the transmission process are becoming increasingly serious issues. We designed a sensitive information recognition and…
read more here.
Keywords:
transmission system;
information;
decision tree;
sensitive information ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Games"
DOI: 10.3390/g10030028
Abstract: We investigate whether individuals’ self-stated privacy behavior is correlated with their reservation price for the disclosure of personal and potentially sensitive information. Our incentivized experiment has a unique setting: Information about choices with real implications…
read more here.
Keywords:
experiment;
willingness;
sensitive information;
privacy sale ... See more keywords