Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = privacy-preserving monotonicity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 1133 KB  
Article
Distributed Privacy-Preserving Fusion for Multi-UAV Target Localization via Free-Noise Masking
by Ke Ma, Guowei Pan and Jian Huang
Electronics 2026, 15(5), 1016; https://doi.org/10.3390/electronics15051016 - 28 Feb 2026
Viewed by 344
Abstract
Multi-UAV target localization relies on cooperative fusion of local, perception-derived geometric measurements over an edge network. While distributed fusion improves scalability and robustness compared with a centralized architecture, the iterative message exchanges may leak sensitive information to external eavesdroppers or honest-but-curious peers. This [...] Read more.
Multi-UAV target localization relies on cooperative fusion of local, perception-derived geometric measurements over an edge network. While distributed fusion improves scalability and robustness compared with a centralized architecture, the iterative message exchanges may leak sensitive information to external eavesdroppers or honest-but-curious peers. This paper proposes a privacy-preserving distributed fusion method for multi-UAV localization via free-noise masking. The key idea is a double-injection mechanism. Specifically, each UAV masks its transmitted iterate with a locally generated bounded noise vector, while injecting the same noise into its local update so that the perturbations cancel exactly in the network-average dynamics under doubly stochastic mixing. As a result, the proposed PPDO-FN scheme preserves the practical convergence and weighted least squares localization accuracy of non-private distributed gradient descent, without requiring heavy cryptography or a trusted server. We further introduce reconstruction-based privacy metrics under transcript attacks and quantify the privacy–accuracy tradeoff. Simulation results demonstrate (i) near-identical accuracy and consensus behavior to the non-private baseline, (ii) monotonic privacy improvement with increasing masking strength, and (iii) the necessity of double-injection canceling compared with a naive single-injection baseline. Finally, we provide an end-to-end case study to connect the image-level detection to the geometric localization and then to privacy-preserving distributed fusion, illustrating engineering viability for our proposed approach. Full article
Show Figures

Figure 1

32 pages, 501 KB  
Article
Privacy-Preserving Monotonicity of Differential Privacy Mechanisms
by Hai Liu, Zhenqiang Wu, Yihui Zhou, Changgen Peng, Feng Tian and Laifeng Lu
Appl. Sci. 2018, 8(11), 2081; https://doi.org/10.3390/app8112081 - 28 Oct 2018
Cited by 8 | Viewed by 6119
Abstract
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and utility metrics. However, there is no [...] Read more.
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy metrics and utility metrics. The trade-off of differential privacy shows that one thing increases and another decreases in terms of privacy metrics and utility metrics. However, there is no unified trade-off measurement of differential privacy mechanisms. To this end, we proposed the definition of privacy-preserving monotonicity of differential privacy, which measured the trade-off between privacy and utility. First, to formulate the trade-off, we presented the definition of privacy-preserving monotonicity based on computational indistinguishability. Second, building on privacy metrics of the expected estimation error and entropy, we theoretically and numerically showed privacy-preserving monotonicity of Laplace mechanism, Gaussian mechanism, exponential mechanism, and randomized response mechanism. In addition, we also theoretically and numerically analyzed the utility monotonicity of these several differential privacy mechanisms based on utility metrics of modulus of characteristic function and variant of normalized entropy. Third, according to the privacy-preserving monotonicity of differential privacy, we presented a method to seek trade-off under a semi-honest model and analyzed a unilateral trade-off under a rational model. Therefore, privacy-preserving monotonicity can be used as a criterion to evaluate the trade-off between privacy and utility in differential privacy mechanisms under the semi-honest model. However, privacy-preserving monotonicity results in a unilateral trade-off of the rational model, which can lead to severe consequences. Full article
(This article belongs to the Special Issue Security and Privacy for Cyber Physical Systems)
Show Figures

Figure 1

Back to TopTop