all InfoSec news
Semi-Private Computation of Data Similarity with Controlled Leakage. (arXiv:2206.06650v1 [cs.IT])
June 15, 2022, 1:20 a.m. | René Bødker Christensen, Shashi Raj Pandey, Petar Popovski
cs.CR updates on arXiv.org arxiv.org
Consider two data providers that want to contribute data to a certain
learning model. Recent works have shown that the value of the data of one of
the providers is dependent on the similarity with the data owned by the other
provider. It would thus be beneficial if the two providers can calculate the
similarity of their data, while keeping the actual data private. In this work,
we devise multiparty computation-protocols to compute similarity of two data
sets based on …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Intermediate Security Engineer, (Incident Response, Trust & Safety)
@ GitLab | Remote, US
Journeyman Cybersecurity Triage Analyst
@ Peraton | Linthicum, MD, United States
Project Manager II - Compliance
@ Critical Path Institute | Tucson, AZ, USA
Junior System Engineer (m/w/d) Cyber Security 1
@ Deutsche Telekom | Leipzig, Deutschland