Results 11 to 20 of about 400,277 (251)
KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models
Many organizations devote significant resources to building high-fidelity deep learning (DL) models. Therefore, they have a great interest in making sure the models they have trained are not appropriated by others. Embedding watermarks (WMs) in DL models
Najeeb Moharram Jebreel +3 more
doaj +1 more source
Automatic Assessment of Privacy Policies under the GDPR
To comply with the EU General Data Protection Regulation (GDPR), companies managing personal data have been forced to review their privacy policies. However, privacy policies will not solve any problems as long as users do not read or are not able to ...
David Sánchez +2 more
doaj +1 more source
Government Access to Personal Data and Transnational Interoperability: An Accountability Perspective
This article applies the principle of ʻaccountabilityʼ to the issue of international transfers of personal data and government requirements for access to that data.
Christopher Docksey, Kenneth Propp
doaj +1 more source
The objective of this article is to analyze current situation and relevant historical events to Mexican Data Privacy Law and how it was influenced by another domestic dispositions around the world. Due to GDPR (General Data Protection Regulation) is about to enter into effect in EU (European Union), is it perfect moment to analyze the differences ...
openaire +2 more sources
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive information. Its origin is in statistics with the goal to ensure the confidentiality of data gathered from census and questionnaires. The topic was latter introduced in computer science and more particularly in data mining, where due to the large amount of data ...
Vicenç Torra, Guillermo Navarro-Arribas
openaire +5 more sources
Design and Security Analysis of Cryptosystems
The development of cryptography is closely related to the development of computers [...]
Suhri Kim, Seokhie Hong
doaj +1 more source
Assessment of verbal interaction in Chinese classroom using social network analysis [PDF]
Background The global growth in Chinese language learners presents systematic challenges to Chinese classroom interaction evaluation. Key limitations include inadequate accuracy in speech recognition and shallow interaction analysis.
Li Zhang +5 more
doaj +2 more sources
The letter to the Editor is in response to the manuscript by Hertzog et al. (2023) titled "Data management instruments to Protect the personal information of Children and Adolescents in sub-Saharan Africa." The letter elaborates on personal data ...
J.H. Smith, JS Horne
doaj +1 more source
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang +4 more
doaj +1 more source
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source

