Login / Signup
Platform Utilizing Similar Users' Data to Detect Anomalous Operation of Home IoT Without Sharing Private Information.
Masaaki Yamauchi
Yuichi Ohsita
Masayuki Murata
Published in:
IEEE Access (2021)
Keyphrases
</>
private information
data sets
data sources
user privacy
data collection
training data
privacy violations
private data
original data
raw data
image data
data analysis
data quality
big data
privacy preserving
user interaction
sensitive information
privacy concerns
data privacy
multiple users