default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Likely matches
- Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR)
also: International Workshop on Privacy-Preserving IR (PIR @ SIGIR)
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 14,269 matches
- 2025
- Shajjad Hossain, Sidi-Mohammed Senouci, Bouziane Brik, Abdelwahab Boualouache:
A privacy-preserving Self-Supervised Learning-based intrusion detection system for 5G-V2X networks. Ad Hoc Networks 166: 103674 (2025) - Girraj Kumar Verma, Vinay Chamola, Asheesh Tiwari, Neeraj Kumar, Dheerendra Mishra, Saurabh Rana, Ahmed Barnawi:
Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs. Ad Hoc Networks 166: 103670 (2025) - Kaixiang Zhang, Zhaojian Li, Yongqiang Wang, Nan Li:
Privacy-preserving nonlinear cloud-based model predictive control via affine masking. Autom. 171: 111939 (2025) - Zhiyu Duan, Airong Wei, Xianfu Zhang, Zi-Ming Wang:
Privacy-preserving secure control for nonlinear multi-agent systems under hybrid attacks. Commun. Nonlinear Sci. Numer. Simul. 140: 108356 (2025) - Qiang Wang, Ying Wang, Fucai Zhou, Jian Xu, Changsheng Zhang:
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR. Comput. Stand. Interfaces 91: 103899 (2025) - Xuan Zhao, Jia Yu:
Privacy-preserving top-k spatio-temporal keyword preference query. Comput. Stand. Interfaces 92: 103900 (2025) - Himanshu Kumar Singh, Kedar Nath Singh, Amit Kumar Singh:
Split ways: Using GAN watermarking for digital image protection with privacy-preserving split model training. Future Gener. Comput. Syst. 163: 107523 (2025) - Jiaqi Xia, Meng Wu, Pengyong Li:
SFML: A personalized, efficient, and privacy-preserving collaborative traffic classification architecture based on split learning and mutual learning. Future Gener. Comput. Syst. 162: 107487 (2025) - Ling Xiong, Qiang Li, Lele Tang, Fagen Li, Xingchun Yang:
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks. Future Gener. Comput. Syst. 163: 107530 (2025) - Bochang Yang, Anfeng Liu, Neal N. Xiong, Tian Wang, Shaobo Zhang:
VLR-BPP: An intelligent virtual location replacement based bilateral privacy-preserving architecture for edge cloud systems. Future Gener. Comput. Syst. 163: 107488 (2025) - Natthakan Iam-On, Tossapon Boongoen, Nitin Naik, Longzhi Yang:
Leveraging ensemble clustering for privacy-preserving data fusion: Analysis of big social-media data in tourism. Inf. Sci. 686: 121336 (2025) - Jin Qian, Mingchen Zheng, Ying Yu, Chuanpeng Zhou, Duoqian Miao:
A dynamic anonymization privacy-preserving model based on hierarchical sequential three-way decisions. Inf. Sci. 686: 121316 (2025) - Juliane Mendelsohn, Stephan Werner, Philipp Richter, Thomas Köllmer, Tobias Schwandt, Wolfgang Broll:
Towards Privacy-Preserving Mixed Reality: Legal and Technical Implications. WoWMoM 2025: 91-96 - 2024
- Shafiq Ahmad:
Privacy-preserving Person Re-Identification in Event-based Vision. University of Genoa, Italy, 2024 - Rahma Bintey Mufiz Mukta:
Privacy Preserving Identity and Credential Management: a blockchain-based solution. 2024 - Manuel Slokom:
Towards Purpose-aware Privacy-Preserving Techniques for Predictive Applications. Delft University of Technology, Netherlands, 2024 - Martin Franke:
Scalable, Accurate and Secure Privacy-Preserving Record Linkage. Leipzig University, Germany, 2024 - Ammar Haydari:
Towards Efficient and Secure Intelligent Transportation Services: AI-driven Traffic Light Controller and Privacy-Preserving Mobility Data Generation. University of California, Davis, USA, 2024 - Xianwen Fang, Mengyao Li:
Privacy-Preserving Process Mining: A Blockchain-Based Privacy-Aware Reversible Shared Image Approach. Appl. Artif. Intell. 38(1) (2024) - Maryam Abbasalizadeh, Jeffrey Chan, Pranathi Rayavaram, Yimin Chen, Sashank Narain:
Privacy-Preserving Link Scheduling for Wireless Networks. IEEE Access 12: 109657-109672 (2024) - Shafiq Ahmad, Pietro Morerio, Alessio Del Bue:
Event Anonymization: Privacy-Preserving Person Re-Identification and Pose Estimation in Event-Based Vision. IEEE Access 12: 66964-66980 (2024) - Aftab Akram, Fawad Khan, Shahzaib Tahir, Asif Iqbal, Syed Aziz Shah, Abdullah Baz:
Privacy Preserving Inference for Deep Neural Networks: Optimizing Homomorphic Encryption for Efficient and Secure Classification. IEEE Access 12: 15684-15695 (2024) - Zeyad Ghaleb Al-Mekhlafi, Saima Anwar Lashari, Jalal Mohammed Hachim Altmemi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba:
Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing. IEEE Access 12: 100152-100166 (2024) - Shahad S. Aljehani, Youseef Alotaibi:
Preserving Privacy in Association Rule Mining Using Metaheuristic-Based Algorithms: A Systematic Literature Review. IEEE Access 12: 21217-21236 (2024) - Nour Mahmoud Bahbouh, Ahmad B. Alkhodre, Sandra Sendra, Adnan Ahmed Abi Sen, Yazed Alsaawy, Mohamed Benaida, Hani Almoamari:
Double Cloak Area Approach for Preserving Privacy and Reliability of Crowdsourcing Data. IEEE Access 12: 100529-100543 (2024) - Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable, Narinderjit Singh Thandi:
Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices. IEEE Access 12: 23733-23750 (2024) - Somchart Fugkeaw, Lyhour Hak:
PPAC-CDW: A Privacy-Preserving Access Control Scheme With Fast OLAP Query and Efficient Revocation for Cloud Data Warehouse. IEEE Access 12: 78743-78758 (2024) - Boyoung Han, Hojune Shin, Yeonghyeon Kim, Jina Choi, Younho Lee:
HEaaN-NB: Non-Interactive Privacy-Preserving Naive Bayes Using CKKS for Secure Outsourced Cloud Computing. IEEE Access 12: 110762-110780 (2024) - Muhammad Ayat Hidayat, Yugo Nakamura, Yutaka Arakawa:
Enhancing Efficiency in Privacy-Preserving Federated Learning for Healthcare: Adaptive Gaussian Clipping With DFT Aggregator. IEEE Access 12: 88445-88457 (2024) - Subramani Jegadeesan, Maria Azees, Arun Sekar Rajasekaran, Babji Prasad Chapa:
Mutual and Batch Authentication With Conditional Privacy-Preserving Scheme for V2G Communication System. IEEE Access 12: 69593-69602 (2024)
skipping 14,239 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-12 00:05 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint