{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:45:42Z","timestamp":1774021542640,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031733437","type":"print"},{"value":"9783031733444","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-73344-4_32","type":"book-chapter","created":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T05:01:40Z","timestamp":1728968500000},"page":"385-392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Survey on\u00a0Privacy-Enhancing Techniques in\u00a0the\u00a0Era of\u00a0Artificial Intelligence"],"prefix":"10.1007","author":[{"given":"Elias","family":"Dritsas","sequence":"first","affiliation":[]},{"given":"Maria","family":"Trigka","sequence":"additional","affiliation":[]},{"given":"Phivos","family":"Mylonas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,16]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.ins.2023.03.033","volume":"632","author":"R Al-Huthaifi","year":"2023","unstructured":"Al-Huthaifi, R., Li, T., Huang, W., Gu, J., Li, C.: Federated learning in smart cities: privacy and security survey. Inf. Sci. 632, 833\u2013857 (2023)","journal-title":"Inf. Sci."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Boussis, D., Dritsas, E., Kanavos, A., Sioutas, S., Tzimas, G., Verykios, V.S.: Mapreduce implementations for privacy preserving record linkage. In: Proceedings of the 10th Hellenic Conference on Artificial Intelligence, pp.\u00a01\u20134 (2018)","DOI":"10.1145\/3200947.3201043"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Chioti, E., Dritsas, E., Kanavos, A., Liapakis, X., Sioutas, S., Tsakalidis, A.: Bloom filters for efficient coupling between tables of a database. In: Engineering Applications of Neural Networks: 18th International Conference, EANN 2017, Athens, Greece, August 25\u201327, 2017, Proceedings, pp. 596\u2013608. Springer (2017)","DOI":"10.1007\/978-3-319-65172-9_50"},{"issue":"2","key":"32_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TAI.2021.3088084","volume":"2","author":"J Curzon","year":"2021","unstructured":"Curzon, J., Kosa, T.A., Akalu, R., El-Khatib, K.: Privacy and artificial intelligence. IEEE Trans. Artif. Intell. 2(2), 96\u2013108 (2021)","journal-title":"IEEE Trans. Artif. Intell."},{"key":"32_CR5","unstructured":"Dritsas, E.: Efficient algorithms for big data management. Ph.D. thesis (2020)"},{"issue":"12","key":"32_CR6","doi-asserted-by":"publisher","first-page":"266","DOI":"10.3390\/a12120266","volume":"12","author":"E Dritsas","year":"2019","unstructured":"Dritsas, E., Kanavos, A., Trigka, M., Sioutas, S., Tsakalidis, A.: Storage efficient trajectory clustering and k-nn for robust privacy preserving spatio-temporal databases. Algorithms 12(12), 266 (2019)","journal-title":"Algorithms"},{"issue":"8","key":"32_CR7","doi-asserted-by":"publisher","first-page":"182","DOI":"10.3390\/a13080182","volume":"13","author":"E Dritsas","year":"2020","unstructured":"Dritsas, E., Kanavos, A., Trigka, M., Vonitsanos, G., Sioutas, S., Tsakalidis, A.: Trajectory clustering and k-nn for robust privacy preserving k-nn query processing in geospark. Algorithms 13(8), 182 (2020)","journal-title":"Algorithms"},{"issue":"12","key":"32_CR8","doi-asserted-by":"publisher","first-page":"207","DOI":"10.3390\/a11120207","volume":"11","author":"E Dritsas","year":"2018","unstructured":"Dritsas, E., Trigka, M., Gerolymatos, P., Sioutas, S.: Trajectory clustering and k-nn for robust privacy preserving spatiotemporal databases. Algorithms 11(12), 207 (2018)","journal-title":"Algorithms"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-020-1041-3","volume":"20","author":"J Eicher","year":"2020","unstructured":"Eicher, J., Bild, R., Spengler, H., Kuhn, K.A., Prasser, F.: A comprehensive tool for creating and evaluating privacy-preserving biomedical prediction models. BMC Med. Inform. Decis. Mak. 20, 1\u201314 (2020)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"32_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2022.113910","volume":"166","author":"H He","year":"2023","unstructured":"He, H., Wang, Z., Jain, H., Jiang, C., Yang, S.: A privacy-preserving decentralized credit scoring method based on multi-party information. Decis. Support Syst. 166, 113910 (2023)","journal-title":"Decis. Support Syst."},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"153276","DOI":"10.1109\/ACCESS.2021.3124309","volume":"9","author":"MA Husnoo","year":"2021","unstructured":"Husnoo, M.A., Anwar, A., Chakrabortty, R.K., Doss, R., Ryan, M.J.: Differential privacy for iot-enabled critical infrastructure: a comprehensive survey. IEEE Access 9, 153276\u2013153304 (2021)","journal-title":"IEEE Access"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Javeed, D., Saeed, M.S., Kumar, P., Jolfaei, A., Islam, S., Islam, A.N.: Federated learning-based personalized recommendation systems: an overview on security and privacy challenges. IEEE Trans. Consumer Electron. (2023)","DOI":"10.1109\/TCE.2023.3318754"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Khalid, N., Qayyum, A., Bilal, M., Al-Fuqaha, A., Qadir, J.: Privacy-preserving artificial intelligence in healthcare: techniques and applications. Comput. Biol. Med., 106848 (2023)","DOI":"10.1016\/j.compbiomed.2023.106848"},{"key":"32_CR14","unstructured":"King, J., Meinhardt, C.: Rethinking privacy in the ai era: Policy provocations for a data-centric world (2024)"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Li, F., Ruijs, N., Lu, Y.: Ethics & ai: a systematic review on ethical concerns and related strategies for designing with ai in healthcare. Ai 4(1), 28\u201353 (2022)","DOI":"10.3390\/ai4010003"},{"issue":"3","key":"32_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MCE.2019.2959108","volume":"9","author":"Z Li","year":"2020","unstructured":"Li, Z., Sharma, V., Mohanty, S.P.: Preserving data privacy via federated learning: challenges and solutions. IEEE Consum. Electron. Mag. 9(3), 8\u201316 (2020)","journal-title":"IEEE Consum. Electron. Mag."},{"issue":"8","key":"32_CR17","doi-asserted-by":"publisher","first-page":"7751","DOI":"10.1109\/JIOT.2020.2991401","volume":"7","author":"Y Liu","year":"2020","unstructured":"Liu, Y., James, J., Kang, J., Niyato, D., Zhang, S.: Privacy-preserving traffic flow prediction: a federated learning approach. IEEE Internet Things J. 7(8), 7751\u20137763 (2020)","journal-title":"IEEE Internet Things J."},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Louassef, B.R., Chikouche, N.: Privacy preservation in healthcare systems. In: 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/AI-CSP52968.2021.9671083"},{"issue":"13","key":"32_CR19","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.3390\/electronics11131931","volume":"11","author":"A Majeed","year":"2022","unstructured":"Majeed, A., Khan, S., Hwang, S.O.: A comprehensive analysis of privacy-preserving solutions developed for online social networks. Electronics 11(13), 1931 (2022)","journal-title":"Electronics"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","volume":"9","author":"A Majeed","year":"2020","unstructured":"Majeed, A., Lee, S.: Anonymization techniques for privacy preserving data publishing: a comprehensive survey. IEEE access 9, 8512\u20138545 (2020)","journal-title":"IEEE access"},{"key":"32_CR21","doi-asserted-by":"publisher","first-page":"203564","DOI":"10.1109\/ACCESS.2020.3036899","volume":"8","author":"J Park","year":"2020","unstructured":"Park, J., Kim, D.S., Lim, H.: Privacy-preserving reinforcement learning using homomorphic encryption in cloud computing infrastructures. IEEE Access 8, 203564\u2013203579 (2020)","journal-title":"IEEE Access"},{"key":"32_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-030-68035-0_9","volume-title":"High Performance Computing","author":"LB Pulido-Gaytan","year":"2021","unstructured":"Pulido-Gaytan, L.B., Tchernykh, A., Cort\u00e9s-Mendoza, J.M., Babenko, M., Radchenko, G.: A survey on privacy-preserving machine learning with fully homomorphic encryption. In: Nesmachnow, S., Castro, H., Tchernykh, A. (eds.) CARLA 2020. CCIS, vol. 1327, pp. 115\u2013129. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68035-0_9"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Qin, H., He, D., Feng, Q., Khan, M.K., Luo, M., Choo, K.K.R.: Cryptographic primitives in privacy-preserving machine learning: a survey. IEEE Trans. Knowl. Data Eng. (2023)","DOI":"10.1109\/TKDE.2023.3321803"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Qu, Y., Nosouhi, M.R., Cui, L., Yu, S.: Privacy preservation in smart cities. In: Smart Cities Cybersecurity and Privacy, pp. 75\u201388. Elsevier (2019)","DOI":"10.1016\/B978-0-12-815032-0.00006-8"},{"key":"32_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102198","volume":"105","author":"TH Rafi","year":"2024","unstructured":"Rafi, T.H., Noor, F.A., Hussain, T., Chae, D.K.: Fairness and privacy preserving in federated learning: a survey. Inf. Fusion 105, 102198 (2024)","journal-title":"Inf. Fusion"},{"issue":"1","key":"32_CR26","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TKDE.2019.2929794","volume":"33","author":"GD Samaraweera","year":"2019","unstructured":"Samaraweera, G.D., Chang, J.M.: Security and privacy implications on database systems in big data era: a survey. IEEE Trans. Knowl. Data Eng. 33(1), 239\u2013258 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"32_CR27","first-page":"1","volume":"5","author":"VV Vegesna","year":"2023","unstructured":"Vegesna, V.V.: Privacy-preserving techniques in ai-powered cyber security: challenges and opportunities. Int. J. Mach. Learn. Sustainable Dev. 5(4), 1\u20138 (2023)","journal-title":"Int. J. Mach. Learn. Sustainable Dev."},{"key":"32_CR28","doi-asserted-by":"crossref","unstructured":"Vonitsanos, G., Dritsas, E., Kanavos, A., Mylonas, P., Sioutas, S.: Security and privacy solutions associated with nosql data stores. In: 2020 15th International Workshop on Semantic and Social Media Adaptation and Personalization (SMA), pp.\u00a01\u20135. IEEE (2020)","DOI":"10.1109\/SMAP49528.2020.9248442"},{"key":"32_CR29","doi-asserted-by":"crossref","unstructured":"Xu, R., Joshi, J.B., Li, C.: Cryptonn: training neural networks over encrypted data. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1199\u20131209. IEEE (2019)","DOI":"10.1109\/ICDCS.2019.00121"},{"key":"32_CR30","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.neucom.2019.12.136","volume":"416","author":"A Yale","year":"2020","unstructured":"Yale, A., Dash, S., Dutta, R., Guyon, I., Pavao, A., Bennett, K.P.: Generation and evaluation of privacy preserving synthetic health data. Neurocomputing 416, 244\u2013255 (2020)","journal-title":"Neurocomputing"},{"issue":"5","key":"32_CR31","doi-asserted-by":"publisher","first-page":"2864","DOI":"10.1109\/TNSE.2022.3185327","volume":"10","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Xu, J., Vijayakumar, P., Sharma, P.K., Ghosh, U.: Homomorphic encryption-based privacy-preserving federated learning in iot-enabled healthcare system. IEEE Trans. Network Sci. Eng. 10(5), 2864\u20132880 (2022)","journal-title":"IEEE Trans. Network Sci. Eng."},{"issue":"6","key":"32_CR32","doi-asserted-by":"publisher","first-page":"2824","DOI":"10.1109\/TKDE.2020.3014246","volume":"34","author":"T Zhu","year":"2020","unstructured":"Zhu, T., Ye, D., Wang, W., Zhou, W., Philip, S.Y.: More than privacy: applying differential privacy in key areas of artificial intelligence. IEEE Trans. Knowl. Data Eng. 34(6), 2824\u20132843 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Networks and Systems","Novel and Intelligent Digital Systems: Proceedings of the 4th International Conference (NiDS 2024)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73344-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T05:04:47Z","timestamp":1728968687000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73344-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031733437","9783031733444"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73344-4_32","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"16 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NiDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Novel & Intelligent Digital Systems Conferences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nids2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}