Searched for: subject%3A%22aggregation%22
(1 - 3 of 3)
document
Dekker, Florine W. (author), Erkin, Z. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
conference paper 2021
document
Dekker, Florine (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
master thesis 2020
document
Najafian, S. (author), Inel, O. (author), Tintarev, N. (author)
Explanations can be used to supply transparency in recommender systems (RSs). However, when presenting a shared explanation to a group, we need to balance users' need for privacy with their need for transparency. This is particularly challenging when group members have highly diverging tastes and individuals are confronted with items they do not...
conference paper 2020