Skip to Content

8,142 Results Found

  • Article
  • Open Access
7 Citations
5,959 Views
32 Pages

Privacy-Preserving Monotonicity of Differential Privacy Mechanisms

  • Hai Liu,
  • Zhenqiang Wu,
  • Yihui Zhou,
  • Changgen Peng,
  • Feng Tian and
  • Laifeng Lu

28 October 2018

Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and...

  • Article
  • Open Access
20 Citations
6,141 Views
19 Pages

27 September 2022

Powerful rising trends of mobile media platforms have also resulted in the escalation of users’ privacy concerns. However, there is a paradox between users’ attitudes towards privacy and their actual privacy disclosure behaviors. This stu...

  • Article
  • Open Access
7 Citations
7,651 Views
28 Pages

The Role of Privacy Obstacles in Privacy Paradox: A System Dynamics Analysis

  • Ektor Arzoglou,
  • Yki Kortesniemi,
  • Sampsa Ruutu and
  • Tommi Elo

19 April 2023

People use social media to achieve particular gratifications despite expressing concerns about the related privacy risks that may lead to negative consequences. This inconsistency between privacy concerns and actual behaviour has been referred to as...

  • Article
  • Open Access
1 Citations
3,484 Views
29 Pages

7 February 2024

Multiple studies have demonstrated that the conventional method of learning is suboptimal when our goal is to enhance individuals’ genuine privacy behavior. This study introduces a framework for transforming privacy behavior, with the objective...

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,686 Views
33 Pages

Privacy Essentials

  • James Taylor,
  • Jane Henriksen-Bulmer and
  • Cagatay Yucel

Following a series of legislative changes around privacy over the past 25 years, this study highlights data protection regulations and the complexities of applying these frameworks. To address this, we created a privacy framework to guide organisatio...

  • Article
  • Open Access
3 Citations
2,712 Views
30 Pages

5 June 2025

The increasing complexity of data ecosystems demands advanced methodologies for systematic privacy risk assessment. This work introduces two complementary metrics—the privacy risk expansion factor (PREF) and the privacy exposure index (PEI)&mda...

  • Article
  • Open Access
2 Citations
2,506 Views
25 Pages

19 February 2025

More and more users openly share their information on online websites, with the resulting privacy issues being under scrutiny. Content such as a user’s personal data and location information is often asked for before posting to enforce the user...

  • Article
  • Open Access
14 Citations
2,474 Views
24 Pages

18 April 2023

This paper investigates lift, the likelihood ratio between the posterior and prior belief about sensitive features in a dataset. Maximum and minimum lifts over sensitive features quantify the adversary’s knowledge gain and should be bounded to...

  • Article
  • Open Access
3 Citations
2,875 Views
14 Pages

Privacy: An Axiomatic Approach

  • Alexander Ziller,
  • Tamara T. Mueller,
  • Rickmer Braren,
  • Daniel Rueckert and
  • Georgios Kaissis

16 May 2022

The increasing prevalence of large-scale data collection in modern society represents a potential threat to individual privacy. Addressing this threat, for example through privacy-enhancing technologies (PETs), requires a rigorous definition of what...

  • Article
  • Open Access
23 Views
40 Pages

20 March 2026

As widely adopted privacy models in privacy-preserving data publishing (PPDP), k-anonymity and -diversity have been extensively studied by researchers to enable the release of useful information while preserving data privacy. However, existing...

  • Article
  • Open Access
796 Views
26 Pages

29 August 2025

Determining how to balance data utilities and data privacy when datasets are released to be utilized outside the scope of data-collecting organizations constitutes a major challenge. To achieve this aim in data collection (datasets), several privacy...

  • Article
  • Open Access
2 Citations
2,039 Views
17 Pages

4 September 2024

Mobile Edge Computing (MEC) has been widely applied in various Internet of Things (IoT) scenarios due to its advantages of low latency and low energy consumption. However, the offloading of tasks generated by terminal devices to edge servers inevitab...

  • Article
  • Open Access
6 Citations
3,313 Views
17 Pages

As one of the promising paradigms of decentralized machine learning, multi-party learning has attracted increasing attention, owing to its capability of preventing the privacy of participants from being directly exposed to adversaries. Multi-party le...

  • Article
  • Open Access
14 Citations
7,806 Views
15 Pages

14 January 2023

This study aimed to examine the effects of perceived privacy risks and benefits on the online privacy protection behaviors of Chinese teens, with information privacy concerns treated as a mediator variable. The questionnaire survey data (N = 1538) we...

  • Article
  • Open Access
1 Citations
3,233 Views
25 Pages

A Novel Privacy Paradigm for Improving Serial Data Privacy

  • Ayesha Shaukat,
  • Adeel Anjum,
  • Saif U. R. Malik,
  • Munam Ali Shah and
  • Carsten Maple

6 April 2022

Protecting the privacy of individuals is of utmost concern in today’s society, as inscribed and governed by the prevailing privacy laws, such as GDPR. In serial data, bits of data are continuously released, but their combined effect may result...

  • Article
  • Open Access
30 Citations
7,336 Views
27 Pages

Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

  • Hao Ren,
  • Hongwei Li,
  • Xiaohui Liang,
  • Shibo He,
  • Yuanshun Dai and
  • Lian Zhao

10 September 2016

With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has...

  • Article
  • Open Access
3 Citations
4,044 Views
16 Pages

With the development of the mobile internet, service providers obtain data and resources through a large number of terminal user devices. They use private data for business empowerment, which improves the user experience while causing users’ pr...

  • Article
  • Open Access
8 Citations
1,266 Views
12 Pages

Developing an approach to manage privacy risk is critical to the success of e-marketing. Understanding the antecedents of privacy risk is therefore essential for the success of e-business. Because governments, businesses, and consumers are economic a...

  • Article
  • Open Access
14 Citations
3,417 Views
19 Pages

23 August 2022

The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability. Differential privacy is a promising privacy protection technol...

  • Article
  • Open Access
10 Citations
6,228 Views
14 Pages

The digital era introduces significant challenges for privacy protection, which grow constantly as technology advances. Privacy is a personal trait, and individuals may desire a different level of privacy, which is known as their “privacy conce...

  • Article
  • Open Access
113 Citations
11,593 Views
35 Pages

Context-Aware Generative Adversarial Privacy

  • Chong Huang,
  • Peter Kairouz,
  • Xiao Chen,
  • Lalitha Sankar and
  • Ram Rajagopal

1 December 2017

Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but o...

  • Article
  • Open Access
20 Citations
4,735 Views
22 Pages

With the popularity of location-aware devices (e.g., smart phones), a large number of trajectory data were collected. The trajectory dataset can be used in many fields including traffic monitoring, market analysis, city management, etc. The collectio...

  • Article
  • Open Access
12 Citations
7,139 Views
28 Pages

The collection and processing of personal data offers great opportunities for technological advances, but the accumulation of vast amounts of personal data also increases the risk of misuse for malicious intentions, especially in health care. Therefo...

  • Article
  • Open Access
15 Citations
6,199 Views
18 Pages

31 May 2023

Location-based services (LBS) are widely used due to the rapid development of mobile devices and location technology. Users usually provide precise location information to LBS to access the corresponding services. However, this convenience comes with...

  • Article
  • Open Access
6 Citations
5,283 Views
18 Pages

22 November 2021

Privacy policies play an important part in informing users about their privacy concerns by operating as memorandums of understanding (MOUs) between them and online services providers. Research suggests that these policies are infrequently read becaus...

  • Article
  • Open Access
19 Citations
3,841 Views
17 Pages

1 October 2018

Vehicle-to-grid (V2G) is an important component of smart grids and plays a significant role in improving grid stability, reducing energy consumption and generating cost. However, while electric vehicles are being charged, it is possible to expose the...

  • Article
  • Open Access
7 Citations
4,831 Views
25 Pages

21 January 2021

Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services. Aiming at safeguarding users’ privacy more effectively within SNs, self-adaptive privacy preserving sche...

  • Article
  • Open Access
5 Citations
1,773 Views
18 Pages

Privacy-Preserving and Interpretable Grade Prediction: A Differential Privacy Integrated TabNet Framework

  • Yuqi Zhao,
  • Jinheng Wang,
  • Xiaoqing Tan,
  • Linyan Wen,
  • Qingru Gao and
  • Wenjing Wang

The increasing digitization of educational data poses critical challenges in balancing predictive accuracy with privacy protection for sensitive student information. This study introduces DP-TabNet, a pioneering framework that integrates the interpre...

  • Article
  • Open Access
3 Citations
2,573 Views
19 Pages

21 April 2023

With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcin...

  • Article
  • Open Access
63 Citations
7,384 Views
37 Pages

Information Extraction Under Privacy Constraints

  • Shahab Asoodeh,
  • Mario Diaz,
  • Fady Alajaji and
  • Tamás Linder

10 March 2016

A privacy-constrained information extraction problem is considered where for a pair of correlated discrete random variables (X,Y) governed by a given joint distribution, an agent observes Y and wants to convey to a potentially publi...

  • Article
  • Open Access
2 Citations
3,172 Views
21 Pages

Edge computing has emerged as an innovative paradigm that decentralizes computation to the network’s periphery, empowering edge servers to manage user-initiated complex tasks. This strategy alleviates the computational load on end-user devices...

  • Article
  • Open Access
11 Citations
11,399 Views
30 Pages

24 October 2024

Federated learning (FL), a decentralized approach to machine learning, facilitates model training across multiple devices, ensuring data privacy. However, achieving a delicate privacy preservation–model convergence balance remains a major probl...

  • Article
  • Open Access
3 Citations
2,282 Views
39 Pages

17 October 2024

Federated learning is a widely applied distributed machine learning method that effectively protects client privacy by sharing and computing model parameters on the server side, thus avoiding the transfer of data to third parties. However, informatio...

  • Article
  • Open Access
13 Citations
4,504 Views
15 Pages

Consideration of FedProx in Privacy Protection

  • Tianbo An,
  • Leyu Ma,
  • Wei Wang,
  • Yunfan Yang,
  • Jingrui Wang and
  • Yueren Chen

20 October 2023

As federated learning continues to increase in scale, the impact caused by device and data heterogeneity is becoming more severe. FedProx, as a comparison algorithm, is widely used as a solution to deal with system heterogeneity and statistical heter...

  • Article
  • Open Access
3 Citations
3,178 Views
21 Pages

IoT Privacy Risks Revealed

  • Kai-Chih Chang,
  • Haoran Niu,
  • Brian Kim and
  • Suzanne Barber

29 June 2024

A user’s devices such as their phone and computer are constantly bombarded by IoT devices and associated applications seeking connection to the user’s devices. These IoT devices may or may not seek explicit user consent, thus leaving the...

  • Article
  • Open Access
567 Views
29 Pages

With the rapid expansion of the Internet, it is crucial to be aware of the different aspects of privacy, especially in light of rising global cybersecurity threats and data breaches. While previous research has identified various factors when studyin...

  • Article
  • Open Access
9 Citations
2,850 Views
21 Pages

26 April 2023

Over time, the many different ways in which we collect and use data have become more complex as we communicate and interact with an ever-increasing variety of modern technologies. Although people often say they care about their privacy, they do not h...

  • Article
  • Open Access
3 Citations
2,677 Views
18 Pages

20 July 2022

After the enactment of the GDPR in 2018, many companies were forced to rethink their privacy management in order to comply with the new legal framework. These changes mostly affect the Controller to achieve GDPR-compliant privacy policies and managem...

  • Article
  • Open Access
1 Citations
1,688 Views
14 Pages

1 October 2025

In response to the growing relevance of shared housing models such as co-living and co-housing, this study investigates how spatial configuration affects the experience and negotiation of privacy in shared domestic environments. While privacy is ofte...

  • Article
  • Open Access
2,139 Views
18 Pages

28 February 2025

As traditional federated learning algorithms often fall short in providing privacy protection, a growing body of research integrates local differential privacy methods into federated learning to strengthen privacy guarantees. However, under a fixed p...

  • Article
  • Open Access
709 Views
35 Pages

6 November 2025

In web-based services, users are often required to submit personal data, which may be shared with third parties. Although privacy regulations mandate the disclosure of intended recipients in privacy policies, this does not fully alleviate users&rsquo...

  • Article
  • Open Access
9 Citations
3,028 Views
20 Pages

Privacy-Preserving Task Offloading Strategies in MEC

  • Haijian Yu,
  • Jing Liu,
  • Chunjie Hu and
  • Ziqi Zhu

22 December 2022

In mobile edge computing (MEC), mobile devices can choose to offload their tasks to edge servers for execution, thereby effectively reducing the completion time of tasks and energy consumption of mobile devices. However, most of the data transfer bro...

  • Article
  • Open Access
12 Citations
5,586 Views
28 Pages

An individual’s location data is very sensitive geoinformation. While its disclosure is necessary, e.g., to provide location-based services (LBS), it also facilitates deep insights into the lives of LBS users as well as various attacks on these...

  • Article
  • Open Access
5 Citations
3,486 Views
25 Pages

Privacy Goals for the Data Lifecycle

  • Jane Henriksen-Bulmer,
  • Cagatay Yucel,
  • Shamal Faily and
  • Ioannis Chalkias

31 October 2022

The introduction of Data Protection by Default and Design (DPbDD) brought in as part of the General Data Protection Regulation (GDPR) in 2018, has necessitated that businesses review how best to incorporate privacy into their processes in a transpare...

  • Article
  • Open Access
74 Citations
8,939 Views
28 Pages

Privacy-Preserving Process Mining in Healthcare

  • Anastasiia Pika,
  • Moe T. Wynn,
  • Stephanus Budiono,
  • Arthur H.M. ter Hofstede,
  • Wil M.P. van der Aalst and
  • Hajo A. Reijers

Process mining has been successfully applied in the healthcare domain and has helped to uncover various insights for improving healthcare processes. While the benefits of process mining are widely acknowledged, many people rightfully have concerns ab...

  • Article
  • Open Access
6 Citations
5,015 Views
24 Pages

9 December 2020

Mobile cloud computing (MCC) is a domain that stemmed from advances in mobile technology and cloud computing. Although debate continues about the best strategies to preserve privacy and personal data protection in MCC, it is essential to explore the...

  • Article
  • Open Access
7 Citations
2,742 Views
24 Pages

The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the diffic...

  • Article
  • Open Access
1 Citations
5,390 Views
21 Pages

As data becomes a core driver of modern business innovation, mobile applications increasingly collect and process users’ personal information, posing significant challenges to the effectiveness of informed consent and the legitimacy of user aut...

  • Article
  • Open Access
11 Citations
4,631 Views
9 Pages

With the development of the mobile Internet, location-based services are playing an important role in everyday life. As a new location-based service, Spatial Crowdsourcing (SC) involves collecting and analyzing environmental, social, and other spatio...

of 163