Search Results - "Erkin, Z."
-
1
Content-based recommendations with approximate integer division
Published in 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-04-2015)“…Recommender systems have become a vital part of e-commerce and online media applications, since they increased the profit by generating personalized…”
Get full text
Conference Proceeding -
2
Private data aggregation with groups for smart grids in a dynamic setting using CRT
Published in 2015 IEEE International Workshop on Information Forensics and Security (WIFS) (01-11-2015)“…Computing the total consumption within a neighbourhood or of a single households in smart grids is important for billing and statistical analysis. Fine…”
Get full text
Conference Proceeding -
3
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
Published in IEEE transactions on information forensics and security (01-06-2012)“…Recommender systems have become an important tool for personalization of online services. Generating recommendations in online services depends on…”
Get full text
Journal Article -
4
Efficiently computing private recommendations
Published in 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-05-2011)“…Online recommender systems enable personalized service to users. The underlying collaborative filtering techniques operate on privacy sensitive user data,…”
Get full text
Conference Proceeding -
5
Emerging cryptographic challenges in image and video processing
Published in 2012 19th IEEE International Conference on Image Processing (01-09-2012)“…In an increasing number of image and video processing problems, cryptographic techniques are used to enforce content access control, identity verification and…”
Get full text
Conference Proceeding -
6
Privacy-preserving recommender systems in dynamic environments
Published in 2013 IEEE International Workshop on Information Forensics and Security (WIFS) (01-11-2013)“…Recommender systems play a crucial role today in on-line applications as they improve the customer satisfaction, and at the same time results in an increase in…”
Get full text
Conference Proceeding -
7
Generating private recommendations in a social trust network
Published in 2011 International Conference on Computational Aspects of Social Networks (CASoN) (01-10-2011)“…Recommender systems have become increasingly important in e-commerce as they can guide customers with finding personalized services and products. A variant of…”
Get full text
Conference Proceeding -
8
Efficient privacy preserving K-means clustering in a three-party setting
Published in 2011 IEEE International Workshop on Information Forensics and Security (01-11-2011)“…User clustering is a common operation in online social networks, for example to recommend new friends. In previous work [5], Erkin et al. proposed a…”
Get full text
Conference Proceeding -
9
Privacy-preserving user clustering in a social network
Published in 2009 First IEEE International Workshop on Information Forensics and Security (WIFS) (01-12-2009)“…In a ubiquitously connected world, social networks are playing an important role on the Internet by allowing users to find groups of people with similar…”
Get full text
Conference Proceeding -
10
Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation
Published in IEEE signal processing magazine (01-01-2013)“…In recent years, signal processing applications that deal with user-related data have aroused privacy concerns. For instance, face recognition and personalized…”
Get full text
Magazine Article -
11
Privacy-preserving data aggregation in smart metering systems: an overview
Published in IEEE signal processing magazine (01-03-2013)“…Growing energy needs are forcing governments to look for alternative resources and ways to better manage the energy grid and load balancing. As a major…”
Get full text
Magazine Article