Results 11 to 20 of about 223 (114)
Evaluating the determinants of support for police militarization among officers
Abstract We evaluate the determinants of officer support for their agency participating in the 1033 Program: a program that facilitates the flow of military hardware to local law enforcement agencies. In doing so, we provide insight into why officers demand such equipment, which, in turn, may partially explain patterns of program participation and ...
Ryan M. Welch +3 more
wiley +1 more source
Abstract How political actors choose which politics to focus on helps shape the outcome of the policy process. While the policy agenda of the federal government has received widespread attention, there is much less known about the policy agendas of the U.S. states. In this paper, we describe how and why states choose to have similar agendas. We rely on
David A. M. Peterson +4 more
wiley +1 more source
隐私计算是一种新型数据处理技术,可以在保护数据隐私及安全的前提下,实现数据价值转化和流通。然而隐私计算场景中“数据可用不可见”的特性给传统的数据质量治理工作带来了很大的挑战,业界尚缺乏完善的解决方案。针对上述问题,提出一种适用于隐私计算场景的数据质量治理方法与流程,构建了本地与多方两个层级的数据质量评估体系,能够兼顾本地域及联邦域的数据质量治理工作,同时提出了一种数据贡献度衡量方法,对隐私计算的长效激励机制进行探索,从而提升隐私计算的数据质量,并提高计算结果的精度。
张燕 +5 more
doaj +1 more source
Membership inference attack and defense method in federated learning based on GAN [PDF]
Aiming at the problem that the federated learning system was extremely vulnerable to membership inference attacks initiated by malicious parties in the prediction stage, and the existing defense methods were difficult to achieve a balance between privacy
Bing CHEN +3 more
core +1 more source
Federated learning optimization algorithm based on incentive mechanism [PDF]
Federated learning optimization algorithm based on incentive mechanism was proposed to address the issues of multiple iterations, long training time and low efficiency in the training process of federated learning.Firstly, the reputation value related to
Hua ZHOU +4 more
core +1 more source
Survey on privacy protection in non-aggregated data sharing [PDF]
Although there is a great value hidden in the massive data, it can also easily expose user privacy.Aiming at efficiently and securely sharing data from multiple parties and avoiding leakage of user private information, the development of related research
Honghao GAO +4 more
core +1 more source
Federated edge learning with reconfigurable intelligent surface and its application in Internet of vehicles [PDF]
Aiming at the problem that it is difficult to achieve an optimal trade-off between wireless communication and model accuracy in FEEL training caused by the heterogeneity of wireless links and data distribution, a reconfigurable intelligent surface (RIS ...
Heju LI, Ping WANG, Zhiwei YANG
core +1 more source
Adversarial sample generation algorithm for vertical federated learning [PDF]
To adapt to the scenario characteristics of vertical federated learning (VFL) applications regarding high communication cost, fast model iteration, and decentralized data storage, a generalized adversarial sample generation algorithm named VFL-GASG was ...
Bei GUAN +4 more
core +1 more source
Federated learning based intelligent edge computing technique for video surveillance [PDF]
With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the ...
Guan GUI +4 more
core +1 more source
DAGUARD: distributed backdoor attack defense scheme under federated learning [PDF]
In order to solve the problems of distributed backdoor attack under federated learning, a distributed backdoor attack defense scheme (DAGUARD) under federated learning was proposed based on the assumption that the server selected no more than half of ...
Shengxing YU +3 more
core +1 more source

