25 items found

Tags: Privacy

Filter Results
  • ConferencePaper

    Fair detection of poisoning attacks in federated learning

    Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph

    Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • BookChapter

    Information Technology Privacy and the Protection of Personal Data

    Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,...
    • HTML
      The resource: 'DOI: ...' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'Web page' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Book chapter' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Privacy in the clouds

    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by...
    • HTML
      The resource: 'DOI: 10.1007/s12394-008-0005-z' is not accessible as guest user. You must login to access it!
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Big other Surveillance capitalism and the prospects of an information civiliz...

    This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The...
    • bibtex
      The resource: 'BibTeX file' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Big Data and Due Process Toward a Framework to Redress Predictive Privacy Harms

    The rise of “Big Data” analytics in the private sector poses new challenges for privacy advocates. Through its reliance on existing data and predictive analysis to create...
    • bibtex
      The resource: 'BibTeX file' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • JournalArticle

    General confidentiality and utility metrics for privacy-preserving data publi...

    Anonymization for privacy-preserving data publishing, also known as statistical disclosure control (SDC), can be viewed under the lens of the permutation model. According to...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Legal Materials as Big Data: (algo)Rithms Support Legal Interpretation. A Dia...

    This webinar, which took place on 6 July 2021, focused on the interplay between legal data and data science. The webinar, entitled ‘Legal Materials as Big Data: (algo)Rithms to...
    • .webloc
      The resource: 'Webinar Link' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Second SoBigData Plus Plus Awareness Panel R. I. Platforms Data Protection an...

    This webinar, which took place on 10 November 2020, was aimed at exploring the theme of data protection and intellectual property issues in platforms. The first speaker was...
    • HTML
      The resource: 'Second SoBigData++ ...' is not accessible as guest user. You must login to access it!
  • Dataset

    Multi-Task Faces (MTF) dataset

    The Multi-Task Faces (MTF) dataset consists of cropped human faces for classification tasks or other research purposes. Each image in the dataset is labelled according to four...
    • ZIP
      The resource: 'MTF_dataset_20230701' is not accessible as guest user. You must login to access it!
  • Method

    Privlib

    Privlib is a Python software package to manage privacy risk and discrimination in tabular and sequential data. It comprises methods to assess privacy risk (PRUDEnce) and...
    • url
      The resource: 'Pip webpage' is not accessible as guest user. You must login to access it!
    • url
      The resource: 'GitHub repository' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Library files' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Machine Learning Explainability Via Microaggregation and Shallow Decision Trees

    Artificial intelligence (AI) is being deployed in missions that are increasingly critical for human life. To build trust in AI and avoid an algorithm-based authoritarian...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Explanation of Deep Models with Limited Interaction for Trade Secret and Priv...

    An ever-increasing number of decisions affecting our lives are made by algorithms. For this reason, algorithmic transparency is becoming a pressing need: automated decisions...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • BookChapter

    Machine Learning Explainability Through Comprehensible Decision Trees

    The role of decisions made by machine learning algorithms in our lives is ever increasing. In reaction to this phenomenon, the European General Data Protection Regulation...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • Method

    Python library for direct and indirect discrimination prevention in data mining

    This python library implements the discrimination discovery and prevention method proposed in the paper: “A methodology for direct and indirect discrimination prevention in...
    • GitHub
      The resource: 'Link to library' is not accessible as guest user. You must login to access it!
  • Method

    Privacy Risk on Sociometer

    This method provides a Privacy Risk Assessment on CDR data, aggregated through the presence vectors used by the Sociometer.
    • PDF
      The resource: 'Privacy Risk' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'Documentation.txt' is not accessible as guest user. You must login to access it!
    • jar
      The resource: 'RiskEvaluation.jar' is not accessible as guest user. You must login to access it!
  • Method

    Privacy Risk on Trajectories

    This method provides a Privacy Risk Assessment on mobility data, in terms of trajectories or aggregation of trajectories, i.e., locations with frequency of visit and locations...
    • Python
      The resource: 'privacy-lib' is not accessible as guest user. You must login to access it!
  • Method

    Human Mobility Data Privacy Risk Estimator

    This method is a fast and flexible approach to estimate privacy risk in human mobility data. The idea is to train classifiers to capture the relation between individual...
  • TrainingMaterial

    Mobility data sharing: application potential and ethical issues webinar

    4th SoBigData++ Awareness Panel Webinar Programme Decentralized anonymization of mobility data Speaker: Josep Domingo-Ferrer (Universitat Rovira i Virgili, Catalonia)...
  • TrainingMaterial

    Tutorials on anonymization and antidiscrimination of datasets

    These tutorials show how to use the already implemented libraries for the anonymization and antidiscrimination of data sets: - Anonymization library:...
    • The resource: 'Anonymization library ...' is not accessible as guest user. You must login to access it!
    • The resource: 'Antidiscrimination library ...' is not accessible as guest user. You must login to access it!
    • ipynb
      The resource: 'anonymization_training' is not accessible as guest user. You must login to access it!
    • ipynb
      The resource: 'antiDiscrimination_training' is not accessible as guest user. You must login to access it!
You can also access this registry using the API (see API Docs).