GT

G. Tillem

Authored

18 records found

Badass

Preserving privacy in behavioural advertising with applied secret sharing

Online advertising is a multi-billion dollar industry, forming the primary source of income for many publishers offering free web content. Serving advertisements tailored to users’ interests greatly improves the effectiveness of advertisements, and is believed to be beneficial to ...

BAdASS

Preserving privacy in behavioural advertising with applied secret sharing

Online advertising forms the primary source of income for many publishers offering free web content by serving advertisements tailored to users’ interests. The privacy of users, however, is threatened by the widespread collection of data that is required for behavioural advertisi ...

AHEad

Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

Online advertising is a rapidly growing industry, forming the primary source of income for many publishers that offer free web content. The practice of serving advertisements based on individuals' interests greatly improves the expected effectiveness of advertisements, and is bel ...

AHEad

Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

Online advertising is a rapidly growing industry, forming the primary source of income for many publishers that offer free web content. The practice of serving advertisements based on individuals' interests greatly improves the expected effectiveness of advertisements, and is bel ...

AHEad

Privacy-preserving Online Behavioural Advertising using Homomorphic Encryption

Online advertising is a rapidly growing industry, forming the primary source of income for many publishers that offer free web content. The practice of serving advertisements based on individuals' interests greatly improves the expected effectiveness of advertisements, and is bel ...
We investigate the trade-off between privacy and solution quality that occurs when a k-anonymized database is used as input to the bin-packing optimization problem. To investigate the impact of the chosen anonymization method on this trade-off, we consider two recoding methods fo ...
We investigate the trade-off between privacy and solution quality that occurs when a k-anonymized database is used as input to the bin-packing optimization problem. To investigate the impact of the chosen anonymization method on this trade-off, we consider two recoding methods fo ...
We investigate the trade-off between privacy and solution quality that occurs when a k-anonymized database is used as input to the bin-packing optimization problem. To investigate the impact of the chosen anonymization method on this trade-off, we consider two recoding methods fo ...
We investigate the trade-off between privacy and solution quality that occurs when a k-anonymized database is used as input to the bin-packing optimization problem. To investigate the impact of the chosen anonymization method on this trade-off, we consider two recoding methods fo ...
We investigate the trade-off between privacy and solution quality that occurs when a k-anonymized database is used as input to the bin-packing optimization problem. To investigate the impact of the chosen anonymization method on this trade-off, we consider two recoding methods fo ...
The enhancements in computation technologies in the last decades enabled businesses to analyze the data that is collected through their systems which helps to improve their services. However, performing data analytics remains a challenging task for small- and medium-scale compani ...
Smart grids promise a more reliable, efficient, economically viable, and environment-friendly electricity infrastructure for the future. State estimation in smart grids plays a pivotal role in system monitoring, reliable operation, automation, and grid stabilization. However, the ...
The growing complexity of software with respect to technological advances encourages model-based analysis of software systems for validation and verification. Process mining is one recently investigated technique for such analysis which enables the discovery of process models fro ...
Multi-party access control has been proposed to enable collaborative decision making for the protection of co-owned resources. In particular, multi-party access control aims to reconcile conflicts arising from the evaluation of policies authored by different stakeholders for join ...
Multi-party access control has been proposed to enable collaborative decision making for the protection of co-owned resources. In particular, multi-party access control aims to reconcile conflicts arising from the evaluation of policies authored by different stakeholders for join ...
Privacy-preserving data aggregation is growing in popularity due to the increasing amount of online services depending on user data. This information is privacy-sensitive, warranting the need for protection during data-processing. A wide variety of approaches have been considered ...
Privacy-preserving data aggregation is growing in popularity due to the increasing amount of online services depending on user data. This information is privacy-sensitive, warranting the need for protection during data-processing. A wide variety of approaches have been considered ...
The increasing demand for data mining in business intelligence has led to a significant growth in the adoption of data mining as a service paradigm which enables companies to outsource their data and mining tasks to a cloud service provider. Despite the popularity of the paradigm ...

Contributed

2 records found

With the emergence of many modern automated systems around us that rely heavily on the private data collected from individuals, the problem of privacy-preserving data analysis is now gaining a significant attention in the field of systems and control. In this thesis, we investiga ...
In less than a century, the Internet has morphed from being a communication channel to a medium of existence for people. Meanwhile, attacks over the Internet have been growing both qualitatively and quantitatively, with losses transcending the financial kind and threatening the w ...