Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (24)

Search Parameters:
Keywords = correlated differential privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 2282 KB  
Article
A Multimodal Deep Learning Approach for Analyzing Content Preferences on TikTok Across European Technical Universities Using Media Information Processing System
by Dragoş-Florin Sburlan and Marian Bucos
Electronics 2026, 15(6), 1288; https://doi.org/10.3390/electronics15061288 - 19 Mar 2026
Cited by 1 | Viewed by 604
Abstract
Social media platforms have become primary communication channels for technical European universities. However, the extent to which global platform algorithms homogenize individual preferences across cultures remains underexplored. Although the current literature offers insights into the topic, none of the works consider the cross-national [...] Read more.
Social media platforms have become primary communication channels for technical European universities. However, the extent to which global platform algorithms homogenize individual preferences across cultures remains underexplored. Although the current literature offers insights into the topic, none of the works consider the cross-national and multimodal nature of the phenomenon. In the current paper, we introduce the Media Information Processing System (MIPS), a privacy-preserving multimodal deep learning (DL) framework that incorporates large language models (LLMs), computer vision (CV), and knowledge graphs. We analyze data from 15,520 public videos shared by 2359 followers of six top technical universities from Romania, Germany, Italy, and Russia. The results of the study suggest that the degree of homogeneity of the followers’ interest profiles is markedly high. Statistical profiling of the data indicates that the interest profiles of the followers from different countries are positively correlated with a high degree of strength (mean Pearson r = 0.96; p > 0.90). Consensus clustering of the data reveals the existence of stable clusters of themes with high stability scores (>0.75), such as “Human Interaction Dynamics”. The results of the study contradict the traditional theory of regional cultural differentiation. Instead, the results suggest the existence of a new “digital student persona” that is characteristic of the academic lifestyle of students from different countries. Full article
(This article belongs to the Special Issue Feature Papers in "Computer Science & Engineering", 3rd Edition)
Show Figures

Figure 1

31 pages, 22634 KB  
Article
A Novel Image Encryption Scheme Based on Two-Dimensional Chaotic Map Constructed from Ackley Function and DNA Operations
by Chao Jiang, Xiong Zhang and Xiaoqin Zhang
Entropy 2026, 28(3), 322; https://doi.org/10.3390/e28030322 - 13 Mar 2026
Viewed by 469
Abstract
In contemporary communication systems, digital images occupy an irreplaceable role; however, the privacy-related risks attendant to their prevalent application have grown increasingly salient. This paper presents an image encryption scheme integrating a novel two-dimensional Ackley-Sine chaotic map (2D-ASM) with dynamic DNA operations. First, [...] Read more.
In contemporary communication systems, digital images occupy an irreplaceable role; however, the privacy-related risks attendant to their prevalent application have grown increasingly salient. This paper presents an image encryption scheme integrating a novel two-dimensional Ackley-Sine chaotic map (2D-ASM) with dynamic DNA operations. First, a two-dimensional Ackley-Sine chaotic map, constructed based on the Ackley function and sine function, is designed and validated through a series of chaotic indicators. Results demonstrate that 2D-ASM exhibits superior chaotic properties compared to several existing state-of-the-art chaotic maps, with its maximum Lyapunov exponent (LE) exceeding 23, Permutation Entropy (PE) close to 1 in the full parameter range, and correlation dimension (CD) significantly higher than comparative chaotic systems. The proposed 2D-ASM-based image encryption scheme leverages the SHA-256 hash value of the plaintext image and four external keys to jointly generate the initial conditions and parameters of the 2D-ASM chaotic system, thereby ensuring a sufficiently large key space of 2256. Subsequently, chaotic sequences generated by 2D-ASM are employed to permute and diffuse the plaintext image, followed by dynamic DNA coding, operations, and decoding to obtain the encrypted image. Security analyses and comparisons with several existing representative algorithms confirm that the proposed encryption scheme achieves excellent encryption performance: the Number of Pixels Change Rate (NPCR) is above 99.6%, the Unified Average Changing Intensity (UACI) approaches 33.4%, and the information entropy of ciphertext images reaches 7.999 or higher. The scheme can effectively resist various potential attacks, including statistical and differential attacks, and outperforms representative algorithms in pixel correlation reduction and anti-interference performance. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

23 pages, 760 KB  
Article
Trajectory Data Publishing Scheme Based on Transformer Decoder and Differential Privacy
by Haiyong Wang and Wei Huang
ISPRS Int. J. Geo-Inf. 2026, 15(3), 106; https://doi.org/10.3390/ijgi15030106 - 3 Mar 2026
Viewed by 485
Abstract
The proliferation of Location-Based Services (LBSs) has generated vast trajectory datasets that offer immense analytical value but pose critical privacy risks. Achieving an optimal balance between data utility and privacy preservation remains a challenge, a difficulty compounded by the limitations of existing methods [...] Read more.
The proliferation of Location-Based Services (LBSs) has generated vast trajectory datasets that offer immense analytical value but pose critical privacy risks. Achieving an optimal balance between data utility and privacy preservation remains a challenge, a difficulty compounded by the limitations of existing methods in modeling complex, long-term spatiotemporal dependencies. To address this, this paper proposes a trajectory data publishing scheme combining a Transformer decoder with differential privacy. Unlike traditional single-layer approaches, the proposed method establishes a systematic generation–generalization framework. First, a Transformer decoder is integrated into a Generative Adversarial Network (GAN). This architecture mitigates the gradient vanishing issues common in RNN-based models, generating high-fidelity synthetic trajectories that capture long-range correlations while decoupling them from sensitive source data. Second, to provide rigorous privacy guarantees, a clustering-based generalization strategy is implemented, utilizing Exponential and Laplace mechanisms to ensure ϵ-differential privacy. Experiments on the Geolife and Foursquare NYC datasets demonstrate that the scheme significantly outperforms leading baselines, achieving a superior trade-off between privacy protection and data utility. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

59 pages, 5629 KB  
Article
Adaptive Neural Network Method for Detecting Crimes in the Digital Environment to Ensure Human Rights and Support Forensic Investigations
by Serhii Vladov, Oksana Mulesa, Petro Horvat, Yevhen Kobko, Victoria Vysotska, Vasyl Kikinchuk, Serhii Khursenko, Kostiantyn Karaman and Oksana Kochan
Data 2026, 11(3), 49; https://doi.org/10.3390/data11030049 - 2 Mar 2026
Viewed by 870
Abstract
This article presents an adaptive neural network method for the automated detection, reconstruction, and prioritisation of multi-stage criminal operations in the digital environment, aiming to protect human rights and ensure the legal security of digital evidence. The developed method combines multimodal temporal encoders, [...] Read more.
This article presents an adaptive neural network method for the automated detection, reconstruction, and prioritisation of multi-stage criminal operations in the digital environment, aiming to protect human rights and ensure the legal security of digital evidence. The developed method combines multimodal temporal encoders, a graph module based on GNN for entity correlation, and a correlation head with a link-prediction mechanism and differentiable path recovery. Sliding time windows, logarithmic transformation of volumetric features, and pseudonymization of identifiers with the ability to utilise privacy-preserving procedures (federated learning, differential privacy) are used for data aggregation and normalisation. Unique features of the developed method include an integrated risk function combining an anomaly component and graph significance, a module for automated forensic packet generation with chain of custody recording, and a mechanism for incremental model updates. Experimental results demonstrate high diagnostic metric values (AUC ≈ 0.97, F1 ≈ 0.99 on the test dataset after balancing), robust recovery of priority paths (“path_probability” > 0.7 for top operations), and pipeline performance in PII leak prioritisation and human trafficking reconstruction scenarios. The study’s contribution lies in a practice-oriented neural network method that integrates detection, correlation, and the collection of legally applicable evidence. Full article
Show Figures

Figure 1

34 pages, 7022 KB  
Article
Quantitative Perceptual Analysis of Feature-Space Scenarios in Network Media Evaluation Using Transformer-Based Deep Learning: A Case Study of Fuwen Township Primary School in China
by Yixin Liu, Zhimin Li, Lin Luo, Simin Wang, Ruqin Wang, Ruonan Wu, Dingchang Xia, Sirui Cheng, Zejing Zou, Xuanlin Li, Yujia Liu and Yingtao Qi
Buildings 2026, 16(4), 714; https://doi.org/10.3390/buildings16040714 - 9 Feb 2026
Cited by 1 | Viewed by 692
Abstract
Against the dual backdrop of the rural revitalization strategy and the pursuit of high-quality, balanced urban–rural education, optimizing rural campus spaces has emerged as an important lever for addressing educational resource disparities and improving pedagogical quality. However, conventional evaluation of campus space optimization [...] Read more.
Against the dual backdrop of the rural revitalization strategy and the pursuit of high-quality, balanced urban–rural education, optimizing rural campus spaces has emerged as an important lever for addressing educational resource disparities and improving pedagogical quality. However, conventional evaluation of campus space optimization faces two systemic dilemmas. First, top-down decision-making often neglects the authentic needs of diverse stakeholders and place-based knowledge, resulting in spatial interventions that lose regional distinctiveness. Second, routine public participation is constrained by geographical barriers, time costs, and sample-size limitations, which can amplify professional cognitive bias and impede comprehensive feedback formation. The compounded effect of these challenges contributes to a disconnect between spatial optimization outcomes and perceived needs, thereby constraining the distinctive development of rural educational spaces. To address these constraints, this study proposes a novel method that integrates regional spatial feature recognition with digital media-based public perception assessment. At the data collection and ethical governance level, the study strictly adheres to platform compliance and academic ethics. A total of 12,800 preliminary comments were scraped from major social media platforms (e.g., Douyin, Dianping, and Xiaohongshu) and processed through a three-stage screening workflow—keyword screening–rule-based filtering–manual verification—to yield 8616 valid records covering diverse public groups across China. All user-identifying information was fully anonymized to ensure lawful use and privacy protection. At the analytical modeling level, we develop a Transformer-based deep learning system that leverages multi-head attention mechanisms to capture implicit spatial-sentiment features and metaphorical expressions embedded in review texts. Evaluation on an independent test set indicates a classification accuracy of 89.2%, aligning with balanced and stable scoring performance. Robustness is further strengthened by introducing an equal-weight alternative strategy and conducting stability checks to indicate the consistency of model outputs across weighting assumptions. At the scenario interpretation level, we combine grounded-theory coding with semantic network analysis to establish a three-tier spatial analysis framework—macro (landscape pattern/hydro-topological patterns), meso (architectural interface), and micro (teaching scenes/pedagogical scenarios)—and incorporate an interpretive stakeholder typology (tourists, residents, parents, and professional groups) to systematically identify and quantify key features shaping public spatial perception. Findings show that, at the macro level, naturally integrated scenarios—such as “campus–farmland integration” and “mountain–water embeddedness”—exhibit high affective association, aligning with the “mountain-water-field-village” spatial sequence logic and suggesting broad public endorsement of ecological campus concepts, whereas vernacular settlement-pattern scenarios receive relatively low attention due to cognitive discontinuities. At the meso level, innovative corridor strategies (e.g., framed vistas and expanded corridor spaces) strengthen the building–nature interaction and suggest latent value in stimulating exploratory spatial experience. At the micro level, place-based practice-oriented teaching scenes (e.g., intangible cultural heritage handcraft and creative workshops) achieve higher scores, aligning with the compatibility of vernacular education’s “differential esthetics,” while urban convergence-oriented interdisciplinary curriculum scenes suggest an interpretive gap relative to public expectations. These results indicate an embedded relationship between public perception and regional spatial features, which is further shaped by a multi-actor governance process—characterized by “Government + Influencers + Field Study”—that mediates how rural educational spaces are produced, communicated, and interpreted in digital environments. The study’s innovative value lies in integrating sociological theories (e.g., embeddedness) with deep learning techniques to fill the regional and multi-actor perspective gap in rural campus POE and to promote a methodological shift from “experience-based induction” toward a “data-theory” dual-drive model. The findings provide inferential evidence for rural campus renewal and optimization; the methodological pipeline is transferable to small-scale rural primary schools with media exposure and salient regional ecological characteristics, and it offers a new pathway for incorporating digital media-driven public perception feedback into planning and design practice. The research methodology of this study consists of four sequential stages, which are implemented in a systematic and progressive manner: First, data collection was conducted: Python and the Octopus Collector were used to crawl online comment data related to Fuwen Township Central Primary School, strictly complying with the user agreements of the Douyin, Dianping, and Xiaohongshu platforms. Second, semantic preprocessing was performed: The evaluation content was segmented to generate word frequency statistics and semantic networks; qualitative analysis was conducted using Origin software, and quantitative translation was realized via Sankey diagrams. Third, spatial scene coding was carried out: Combined with a spatial characteristic identification system, a macro–meso–micro three-tier classification system for spatial scene characteristics was constructed to encode and quantitatively express the textual content. Finally, sentiment quantification and correlation analysis was implemented: A deep learning model based on the Transformer framework was employed to perform sentiment quantification scoring for each comment; Sankey diagrams were used to quantitatively correlate spatial scenes with sentiment tendencies, thereby exploring the public’s perceptual associations with the architectural spatial environment of rural campuses. Full article
(This article belongs to the Section Architectural Design, Urban Science, and Real Estate)
Show Figures

Figure 1

26 pages, 1644 KB  
Article
Improving Utility of Private Join Size Estimation via Shuffling
by Xin Liu, Yibin Mao, Meifan Zhang and Mohan Li
Mathematics 2025, 13(21), 3468; https://doi.org/10.3390/math13213468 - 30 Oct 2025
Viewed by 757
Abstract
Join size estimation plays a crucial role in query optimization, correlation computing, and dataset discovery. A recent study, LDPJoinSketch, has explored the application of local differential privacy (LDP) to protect the privacy of two data sources when estimating their join size. However, the [...] Read more.
Join size estimation plays a crucial role in query optimization, correlation computing, and dataset discovery. A recent study, LDPJoinSketch, has explored the application of local differential privacy (LDP) to protect the privacy of two data sources when estimating their join size. However, the utility of LDPJoinSketch remains unsatisfactory due to the significant noise introduced by perturbation under LDP. In contrast, the shuffle model of differential privacy (SDP) can offer higher utility than LDP, as it introduces randomness based on both shuffling and perturbation. Nevertheless, existing research on SDP primarily focuses on basic statistical tasks, such as frequency estimation and binary summation. There is a paucity of studies addressing queries that involve join aggregation of two private data sources. In this paper, we investigate the problem of private join size estimation in the context of the shuffle model. First, drawing inspiration from the success of sketches in summarizing data under LDP, we propose a sketch-based join size estimation algorithm, SDPJoinSketch, under SDP, which demonstrates greater utility than LDPJoinSketch. We present theoretical proofs of the privacy amplification and utility of our method. Second, we consider separating high- and low-frequency items to reduce the hash-collision error of the sketch and propose an enhanced method called SDPJoinSketch+. Unlike LDPJoinSketch, we utilize secure encryption techniques to preserve frequency properties rather than perturbing them, further enhancing utility. Extensive experiments on both real-world and synthetic datasets validate the superior utility of our methods. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

38 pages, 23830 KB  
Article
Improving Audio Steganography Transmission over Various Wireless Channels
by Azhar A. Hamdi, Asmaa A. Eyssa, Mahmoud I. Abdalla, Mohammed ElAffendi, Ali Abdullah S. AlQahtani, Abdelhamied A. Ateya and Rania A. Elsayed
J. Sens. Actuator Netw. 2025, 14(6), 106; https://doi.org/10.3390/jsan14060106 - 30 Oct 2025
Viewed by 2335
Abstract
Ensuring the security and privacy of confidential data during transmission is a critical challenge, necessitating advanced techniques to protect against unwarranted disclosures. Steganography, a concealment technique, enables secret information to be embedded in seemingly harmless carriers such as images, audio, and video. This [...] Read more.
Ensuring the security and privacy of confidential data during transmission is a critical challenge, necessitating advanced techniques to protect against unwarranted disclosures. Steganography, a concealment technique, enables secret information to be embedded in seemingly harmless carriers such as images, audio, and video. This work proposes two secure audio steganography models based on the least significant bit (LSB) and discrete wavelet transform (DWT) techniques for concealing different types of multimedia data (i.e., text, image, and audio) in audio files, representing an enhancement of current research that tends to focus on embedding a single type of multimedia data. The first model (secured model (1)) focuses on high embedding capacity, while the second model (secured model (2)) focuses on improved security. The performance of the two proposed secure models was tested under various conditions. The models’ robustness was greatly enhanced using convolutional encoding with binary phase shift keying (BPSK). Experimental results indicated that the correlation coefficient (Cr) of the extracted secret audio in secured model (1) increased by 18.88% and by 16.18% in secured model (2) compared to existing methods. In addition, the Cr of the extracted secret image in secured model (1) was improved by 0.1% compared to existing methods. The peak signal-to-noise ratio (PSNR) of the steganography audio of secured model (1) was improved by 49.95% and 14.44% compared to secured model (2) and previous work, respectively. Furthermore, both models were evaluated in an orthogonal frequency division multiplexing (OFDM) system over various wireless channels, i.e., Additive White Gaussian Noise (AWGN), fading, and SUI-6 channels. In order to enhance the system performance, OFDM was combined with differential phase shift keying (DPSK) modulation and convolutional coding. The results demonstrate that secured model (1) is highly immune to noise generated by wireless channels and is the optimum technique for secure audio steganography on noisy communication channels. Full article
Show Figures

Figure 1

35 pages, 17195 KB  
Review
Advanced MRI, Radiomics and Radiogenomics in Unravelling Incidental Glioma Grading and Genetic Status: Where Are We?
by Alessia Guarnera, Tamara Ius, Andrea Romano, Daniele Bagatto, Luca Denaro, Denis Aiudi, Maurizio Iacoangeli, Mauro Palmieri, Alessandro Frati, Antonio Santoro and Alessandro Bozzao
Medicina 2025, 61(8), 1453; https://doi.org/10.3390/medicina61081453 - 12 Aug 2025
Cited by 5 | Viewed by 4383
Abstract
The 2021 WHO classification of brain tumours revolutionised the oncological field by emphasising the role of molecular, genetic and pathogenetic advances in classifying brain tumours. In this context, incidental gliomas have been increasingly identified due to the widespread performance of standard and advanced [...] Read more.
The 2021 WHO classification of brain tumours revolutionised the oncological field by emphasising the role of molecular, genetic and pathogenetic advances in classifying brain tumours. In this context, incidental gliomas have been increasingly identified due to the widespread performance of standard and advanced MRI sequences and represent a diagnostic and therapeutic challenge. The impactful decision to perform a surgical procedure deeply relies on the non-invasive identification of features or parameters that may correlate with brain tumour genetic profile and grading. Therefore, it is paramount to reach an early and proper diagnosis through neuroradiological techniques, such as MRI. Standard MRI sequences are the cornerstone of diagnosis, while consolidated and emerging roles have been awarded to advanced sequences such as Diffusion-Weighted Imaging/Apparent Diffusion Coefficient (DWI/ADC), Perfusion-Weighted Imaging (PWI), Magnetic Resonance Spectroscopy (MRS), Diffusion Tensor Imaging (DTI) and functional MRI (fMRI). The current novelty relies on the application of AI in brain neuro-oncology, mainly based on radiomics and radiogenomics models, which enhance standard and advanced MRI sequences in predicting glioma genetic status by identifying the mutation of multiple key biomarkers deeply impacting patients’ diagnosis, prognosis and treatment, such as IDH, EGFR, TERT, MGMT promoter, p53, H3-K27M, ATRX, Ki67 and 1p19. AI-driven models demonstrated high accuracy in glioma detection, grading, prognostication, and pre-surgical planning and appear to be a promising frontier in the neuroradiological field. On the other hand, standardisation challenges in image acquisition, segmentation and feature extraction variability, data scarcity and single-omics analysis, model reproducibility and generalizability, the black box nature and interpretability concerns, as well as ethical and privacy challenges remain key issues to address. Future directions, rooted in enhanced standardisation and multi-institutional validation, advancements in multi-omics integration, and explainable AI and federated learning, may effectively overcome these challenges and promote efficient AI-based models in glioma management. The aims of our multidisciplinary review are to: (1) extensively present the role of standard and advanced MRI sequences in the differential diagnosis of iLGGs as compared to HGGs (High-Grade Gliomas); (2) give an overview of the current and main applications of AI tools in the differential diagnosis of iLGGs as compared to HGGs (High-Grade Gliomas); (3) show the role of MRI, radiomics and radiogenomics in unravelling glioma genetic profiles. Standard and advanced MRI, radiomics and radiogenomics are key to unveiling the grading and genetic profile of gliomas and supporting the pre-operative planning, with significant impact on patients’ differential diagnosis, prognosis prediction and treatment strategies. Today, neuroradiologists are called to efficiently use AI tools for the in vivo, non-invasive, and comprehensive assessment of gliomas in the path towards patients’ personalised medicine. Full article
(This article belongs to the Special Issue Early Diagnosis and Management of Glioma)
Show Figures

Figure 1

26 pages, 7744 KB  
Article
Integrating Fractional-Order Hopfield Neural Network with Differentiated Encryption: Achieving High-Performance Privacy Protection for Medical Images
by Wei Feng, Keyuan Zhang, Jing Zhang, Xiangyu Zhao, Yao Chen, Bo Cai, Zhengguo Zhu, Heping Wen and Conghuan Ye
Fractal Fract. 2025, 9(7), 426; https://doi.org/10.3390/fractalfract9070426 - 29 Jun 2025
Cited by 58 | Viewed by 2377
Abstract
Medical images demand robust privacy protection, driving research into advanced image encryption (IE) schemes. However, current IE schemes still encounter certain challenges in both security and efficiency. Fractional-order Hopfield neural networks (HNNs) demonstrate unique advantages in IE. The introduction of fractional-order calculus operators [...] Read more.
Medical images demand robust privacy protection, driving research into advanced image encryption (IE) schemes. However, current IE schemes still encounter certain challenges in both security and efficiency. Fractional-order Hopfield neural networks (HNNs) demonstrate unique advantages in IE. The introduction of fractional-order calculus operators enables them to possess more complex dynamical behaviors, creating more random and unpredictable keystreams. To enhance privacy protection, this paper introduces a high-performance medical IE scheme that integrates a novel 4D fractional-order HNN with a differentiated encryption strategy (MIES-FHNN-DE). Specifically, MIES-FHNN-DE leverages this 4D fractional-order HNN alongside a 2D hyperchaotic map to generate keystreams collaboratively. This design not only capitalizes on the 4D fractional-order HNN’s intricate dynamics but also sidesteps the efficiency constraints of recent IE schemes. Moreover, MIES-FHNN-DE boosts encryption efficiency through pixel bit splitting and weighted accumulation, ensuring robust security. Rigorous evaluations confirm that MIES-FHNN-DE delivers cutting-edge security performance. It features a large key space (2383), exceptional key sensitivity, extremely low ciphertext pixel correlations (<0.002), excellent ciphertext entropy values (>7.999 bits), uniform ciphertext pixel distributions, outstanding resistance to differential attacks (with average NPCR and UACI values of 99.6096% and 33.4638%, respectively), and remarkable robustness against data loss. Most importantly, MIES-FHNN-DE achieves an average encryption rate as high as 102.5623 Mbps. Compared with recent leading counterparts, MIES-FHNN-DE better meets the privacy protection demands for medical images in emerging fields like medical intelligent analysis and medical cloud services. Full article
(This article belongs to the Special Issue Advances in Fractional-Order Chaotic and Complex Systems)
Show Figures

Figure 1

21 pages, 9140 KB  
Article
Encrypted Spiking Neural Networks Based on Adaptive Differential Privacy Mechanism
by Xiwen Luo, Qiang Fu, Junxiu Liu, Yuling Luo, Sheng Qin and Xue Ouyang
Entropy 2025, 27(4), 333; https://doi.org/10.3390/e27040333 - 22 Mar 2025
Cited by 1 | Viewed by 2360
Abstract
Spike neural networks (SNNs) perform excellently in various domains. However, SNNs based on differential privacy (DP) protocols introduce uniform noise to the gradient parameters, which may affect the trade-off between model efficiency and personal privacy. Therefore, the adaptive differential private SNN (ADPSNN) is [...] Read more.
Spike neural networks (SNNs) perform excellently in various domains. However, SNNs based on differential privacy (DP) protocols introduce uniform noise to the gradient parameters, which may affect the trade-off between model efficiency and personal privacy. Therefore, the adaptive differential private SNN (ADPSNN) is proposed in this work. It dynamically adjusts the privacy budget based on the correlations between the output spikes and labels. In addition, the noise is added to the gradient parameters according to the privacy budget. The ADPSNN is tested on four datasets with different spiking neurons including leaky integrated-and-firing (LIF) and integrate-and-fire (IF) models. Experimental results show that the LIF neuron model provides superior utility on the MNIST (accuracy 99.56%) and Fashion-MNIST (accuracy 92.26%) datasets, while the IF neuron model performs well on the CIFAR10 (accuracy 90.67%) and CIFAR100 (accuracy 66.10%) datasets. Compared to existing methods, the accuracy of ADPSNN is improved by 0.09% to 3.1%. The ADPSNN has many potential applications, such as image classification, health care, and intelligent driving. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

20 pages, 2085 KB  
Article
Personalized Federated Learning Scheme for Autonomous Driving Based on Correlated Differential Privacy
by Yuan Tian, Yanfeng Shi, Yue Zhang and Qikun Tian
Sensors 2025, 25(1), 178; https://doi.org/10.3390/s25010178 - 31 Dec 2024
Cited by 7 | Viewed by 4608
Abstract
In the era of big data, advanced data processing devices and smart sensors greatly benefit us in many areas. As for each individual user, data sharing can be an essential part of the process of data collection and transmission. However, the issue of [...] Read more.
In the era of big data, advanced data processing devices and smart sensors greatly benefit us in many areas. As for each individual user, data sharing can be an essential part of the process of data collection and transmission. However, the issue of constant attacks on data privacy arouses huge concerns among the public. This work proposes a personalized federated learning method associated with correlated differential privacy for autonomous driving. First, instead of transmitting raw data to the server following collection, a device that employs federated learning can perform calculations to obtain the training model at each node. Second, we specifically perform a correlated classification analysis to encrypt data that share high relevance, which can minimize the system cost. Then, correlated differential privacy is utilized to achieve the preservation of data privacy before sharing. In contrast to the traditional differential privacy, the proposed solution guarantees enhanced privacy to meet the demands of customization. The experimental results show that our scheme is more refined in terms of user heterogeneity and the utility of data than others without violating privacy. Full article
Show Figures

Figure 1

21 pages, 2996 KB  
Article
Location Privacy Protection in Edge Computing: Co-Design of Differential Privacy and Offloading Mode
by Guowei Zhang, Shengjian Zhang, Zhiyi Man, Chenlin Cui and Wenli Hu
Electronics 2024, 13(13), 2668; https://doi.org/10.3390/electronics13132668 - 7 Jul 2024
Cited by 3 | Viewed by 3331
Abstract
Edge computing has emerged as an innovative paradigm that decentralizes computation to the network’s periphery, empowering edge servers to manage user-initiated complex tasks. This strategy alleviates the computational load on end-user devices and increases task processing efficiency. Nonetheless, the task offloading process can [...] Read more.
Edge computing has emerged as an innovative paradigm that decentralizes computation to the network’s periphery, empowering edge servers to manage user-initiated complex tasks. This strategy alleviates the computational load on end-user devices and increases task processing efficiency. Nonetheless, the task offloading process can introduce a critical vulnerability, as adversaries may infer a user’s location through an analysis of their offloading mode, thereby threatening the user’s location privacy. To counteract this vulnerability, this study introduces differential privacy as a protective mechanism to obscure the user’s offloading mode, thereby safeguarding their location information. This research specifically addresses the issue of location privacy leakage stemming from the correlation between a user’s location and their task offloading ratio. The proposed strategy is based on differential privacy. It aims to increase the efficiency of offloading services and the benefits of task offloading. At the same time, it ensures privacy protection. An innovative optimization technique for task offloading that maintains location privacy is presented. Utilizing this technique, users can make informed offloading decisions, dynamically adjusting the level of obfuscation in response to the state of the wireless channel and their privacy requirements. This study substantiates the feasibility and effectiveness of the proposed mechanism through rigorous theoretical analysis and extensive empirical testing. The numerical results demonstrate that the proposed strategy can achieve a balance between offloading privacy and processing overhead. Full article
Show Figures

Figure 1

21 pages, 868 KB  
Article
Enhancing Real-Time Traffic Data Sharing: A Differential Privacy-Based Scheme with Spatial Correlation
by Junqing Le, Bowen Xing, Di Zhang and Dewen Qiao
Mathematics 2024, 12(11), 1722; https://doi.org/10.3390/math12111722 - 31 May 2024
Cited by 2 | Viewed by 1936
Abstract
The real-time sharing of traffic data can offer improved services to users and timely respond to environmental changes. However, this data often involves individuals’ sensitive information, raising substantial privacy concerns. It is imperative to find ways to protect the privacy of the shared [...] Read more.
The real-time sharing of traffic data can offer improved services to users and timely respond to environmental changes. However, this data often involves individuals’ sensitive information, raising substantial privacy concerns. It is imperative to find ways to protect the privacy of the shared traffic data while maintaining its ongoing data utility. In this paper, a Differential Privacy-based scheme with Spatial Correlation for Real-time traffic data (named as DP-SCR) is proposed. DP-SCR not only ensures the high data utility of shared traffic data, but also provides strong privacy protection. Specifically, DP-SCR is designed to adhere to w-event ε-differential privacy, ensuring a high level of privacy protection. Subsequently, a novel adaptive allocation based on spatial correlation prediction is proposed to optimize the privacy budget allocation in differential privacy. In addition, a feasible dynamic clustering algorithm is developed to minimize the relative perturbation error, which further improves the quality of shared data. Finally, the analyses demonstrate that DP-SCR provides w-event privacy for the shared data of each section, and the spatial correlation is a more pronounced characteristic of the traffic data than other characteristics. Meanwhile, experiments conducted on real-world data show that the MAR and MER of the predicted data in DP-SCR are smaller than those in other baseline DP-based schemes. It indicates that the DP-SCR scheme proposed in this paper can provide more accurate shared data. Full article
Show Figures

Figure 1

23 pages, 1267 KB  
Article
Comparative Analysis of Local Differential Privacy Schemes in Healthcare Datasets
by Andres Hernandez-Matamoros and Hiroaki Kikuchi
Appl. Sci. 2024, 14(7), 2864; https://doi.org/10.3390/app14072864 - 28 Mar 2024
Cited by 11 | Viewed by 4295
Abstract
In the rapidly evolving landscape of healthcare technology, the critical need for robust privacy safeguards is undeniable. Local Differential Privacy (LDP) offers a potential solution to address privacy concerns in data-rich industries. However, challenges such as the curse of dimensionality arise when dealing [...] Read more.
In the rapidly evolving landscape of healthcare technology, the critical need for robust privacy safeguards is undeniable. Local Differential Privacy (LDP) offers a potential solution to address privacy concerns in data-rich industries. However, challenges such as the curse of dimensionality arise when dealing with multidimensional data. This is particularly pronounced in k-way joint probability estimation, where higher values of k lead to decreased accuracy. To overcome these challenges, we propose the integration of Bayesian Ridge Regression (BRR), known for its effectiveness in handling multicollinearity. Our approach demonstrates robustness, manifesting a noteworthy reduction in average variant distance when compared to baseline algorithms such as LOPUB and LOCOP. Additionally, we leverage the R-squared metric to highlight BRR’s advantages, illustrating its performance relative to LASSO, as LOPUB and LOCOP are based on it. This paper addresses a relevant concern related to datasets exhibiting high correlation between attributes, potentially allowing the extraction of information from one attribute to another. We convincingly show the superior performance of BRR over LOPUB and LOCOP across 15 datasets with varying average correlation attributes. Healthcare takes center stage in this collection of datasets. Moreover, the datasets explore diverse fields such as finance, travel, and social science. In summary, our proposed approach consistently outperforms the LOPUB and LOCOP algorithms, particularly when operating under smaller privacy budgets and with datasets characterized by lower average correlation attributes. This signifies the efficacy of Bayesian Ridge Regression in enhancing privacy safeguards in healthcare technology. Full article
(This article belongs to the Special Issue Data Privacy and Security for Information Engineering)
Show Figures

Figure 1

33 pages, 10250 KB  
Article
Differential Privacy Preservation for Continuous Release of Real-Time Location Data
by Lihui Mao and Zhengquan Xu
Entropy 2024, 26(2), 138; https://doi.org/10.3390/e26020138 - 3 Feb 2024
Cited by 3 | Viewed by 2688
Abstract
Continuous real-time location data is very important in the big data era, but the privacy issues involved is also a considerable topic. It is not only necessary to protect the location privacy at each release moment, but also have to consider the impact [...] Read more.
Continuous real-time location data is very important in the big data era, but the privacy issues involved is also a considerable topic. It is not only necessary to protect the location privacy at each release moment, but also have to consider the impact of data correlation. Correlated Laplace Mechanism (CLM) is a sophisticated method to implement differential privacy on correlated time series. This paper aims to solve the key problems of applying CLM in continuous location release. Based on the finding that the location increment is approximately stationary in many scenarios, a location correlation estimation method based on the location increment is proposed to solve the problem of nonstationary location data correlation estimation; an adaptive adjustment model for the CLM filter based on parameter quantization idea (QCLM) as well as its effective implementation named QCLM-Lowpass utilizing the lowpass spectral characteristics of location data series is proposed to solve the problem of output deviations due to the undesired transient response of the CLM filter in time-varying environments. Extensive simulations and real data experiments validate the effectiveness of the proposed approach and show that the privacy scheme based on QCLM-Lowpass can offer a better balance between the ability to resist correlation-based attacks and data availability. Full article
Show Figures

Figure 1

Back to TopTop