Review of privacy computing techniques for multi-party data fusion analysis
In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. The need for multi-party privacy computing for cros...
Saved in:
Main Authors: | LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2024-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024078 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A privacy budget adaptive optimization scheme for federated computing power Internet of things
by: MA Wenyu, et al.
Published: (2024-12-01) -
IoT and Cloud Computing Issues, Challenges and Opportunities: A Review
by: Mohammed Mohammed Sadeeq, et al.
Published: (2021-03-01) -
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
by: Tiansheng Yang, et al.
Published: (2024-12-01) -
Privacy in the Internet: Myth or reality
by: Mikarić Bratislav, et al.
Published: (2016-01-01) -
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
by: Renwu Yan, et al.
Published: (2024-03-01)