First Steps towards Data-Driven Adversarial Deduplication [PDF]
In traditional databases, the entity resolution problem (which is also known as deduplication) refers to the task of mapping multiple manifestations of virtual objects to their corresponding real-world entities.
Jose N. Paredes +3 more
doaj +9 more sources
Building an Ethical and Trustworthy Biomedical AI Ecosystem for the Translational and Clinical Integration of Foundation Models. [PDF]
Foundation Models (FMs) are gaining increasing attention in the biomedical artificial intelligence (AI) ecosystem due to their ability to represent and contextualize multimodal biomedical data. These capabilities make FMs a valuable tool for a variety of
Sankar BS +11 more
europepmc +3 more sources
Cyber attackers have constantly updated their attack techniques to evade antivirus software detection in recent years. One popular evasion method is to execute malicious code and perform malicious actions only in memory.
Jiaxi Liu +4 more
doaj +1 more source
Reversing Gradients in Adversarial Domain Adaptation for Question Deduplication and Textual Entailment Tasks [PDF]
Adversarial domain adaptation has been recently proposed as an effective technique for textual matching tasks, such as question deduplication. Here we investigate the use of gradient reversal on adversarial domain adaptation to explicitly learn both shared and unshared (domain specific) representations between two textual domains. In doing so, gradient
Anush Kamath +2 more
openaire +1 more source
Efficiently Decodable Codes for the Binary Deletion Channel [PDF]
In the random deletion channel, each bit is deleted independently with probability p. For the random deletion channel, the existence of codes of rate (1-p)/9, and thus bounded away from 0 for any p ...
Guruswami, Venkatesan, Li, Ray
core +1 more source
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
Security challenges of small cell as a service in virtualized mobile edge computing environments [PDF]
Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are ...
A Fragkiadakis +31 more
core +5 more sources
Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation [PDF]
Background Techniques have been developed to compute statistics on distributed datasets without revealing private information except the statistical results.
A Beimel +57 more
core +2 more sources
Cloud Storage File Recoverability [PDF]
Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact.
Armknecht, Frederik +3 more
core +2 more sources

