2021
DOI: 10.1109/tifs.2020.3013200
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(27 citation statements)
references
References 38 publications
2
25
0
Order By: Relevance
“…Accordingly, we consider MI as a utility measure; that is, the user wants to maximize the MI between the useful hypothesis and the observations by the time the adversary reaches the prescribed confidence level on the secret. MI is commonly used both as a privacy and a utility measure in the literature [4,8,15] The MI between U and (Z T , A T ) over time T is given by…”
Section: Pomdp Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Accordingly, we consider MI as a utility measure; that is, the user wants to maximize the MI between the useful hypothesis and the observations by the time the adversary reaches the prescribed confidence level on the secret. MI is commonly used both as a privacy and a utility measure in the literature [4,8,15] The MI between U and (Z T , A T ) over time T is given by…”
Section: Pomdp Formulationmentioning
confidence: 99%
“…Privacy is an important concern for the adoption of many IoT services, and there is a growing demand from consumers to keep their personal information private. Privacy has been widely studied in the literature [1][2][3][4][5][6][7][8][9][10], and a vast number of privacy measures have been introduced, including differential privacy [1], mutual information (MI) [2][3][4][5][6][7][8], total variation distance [11], maximal leakage [12,13], and guessing leakage [14], to count a few.…”
Section: Introductionmentioning
confidence: 99%
“…The privacy notions studied therein include k-anonymity [16], [17], (extended) differential privacy [18]- [20], and distortion privacy [21], [22], which all differ from the information-theoretic privacy measure studied in this paper. The works of [23], [24] recently studied the information-theoretic privacy measure in location-privacy protection mechanisms, and their privacy metric was defined by the mutual information between the released data and the true traces. In this paper's language, it can be viewed as the case when privacy is always ON.…”
Section: B Related Workmentioning
confidence: 99%
“…Therefore, research studies focus on multiple domains separately. For example, privacy and IoT [36][37][38], privacy in AI, and machine learning [39,40] privacy in Process Mining [41][42][43][44]. This targeted attention lagged in paying concerted attention to the overall context of the issue.…”
Section: Ethical Issuesmentioning
confidence: 99%