In this paper, we identify that the classic Gaussian mechanism and its
v...
With the rapid development of technology in genome-related fields,
resea...
One way to classify private set intersection (PSI) for secure 2-party
co...
Database fingerprinting has been widely used to discourage unauthorized
...
Computation offloading is indispensable for mobile edge computing (MEC)....
When sharing sensitive databases with other parties, a database owner ai...
Database fingerprinting schemes have been widely adopted to prevent
unau...
Privacy-preserving genomic data sharing is prominent to increase the pac...