Results 11 to 20 of about 400,277 (251)

KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models

open access: yesApplied Sciences, 2021
Many organizations devote significant resources to building high-fidelity deep learning (DL) models. Therefore, they have a great interest in making sure the models they have trained are not appropriated by others. Embedding watermarks (WMs) in DL models
Najeeb Moharram Jebreel   +3 more
doaj   +1 more source

Automatic Assessment of Privacy Policies under the GDPR

open access: yesApplied Sciences, 2021
To comply with the EU General Data Protection Regulation (GDPR), companies managing personal data have been forced to review their privacy policies. However, privacy policies will not solve any problems as long as users do not read or are not able to ...
David Sánchez   +2 more
doaj   +1 more source

Government Access to Personal Data and Transnational Interoperability: An Accountability Perspective

open access: yesOslo Law Review, 2023
This article applies the principle of ʻaccountabilityʼ to the issue of international transfers of personal data and government requirements for access to that data.
Christopher Docksey, Kenneth Propp
doaj   +1 more source

Data Privacy

open access: yesJournal Economic History, 2021
The objective of this article is to analyze current situation and relevant historical events to Mexican Data Privacy Law and how it was influenced by another domestic dispositions around the world. Due to GDPR (General Data Protection Regulation) is about to enter into effect in EU (European Union), is it perfect moment to analyze the differences ...
openaire   +2 more sources

Data privacy [PDF]

open access: yesWIREs Data Mining and Knowledge Discovery, 2014
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive information. Its origin is in statistics with the goal to ensure the confidentiality of data gathered from census and questionnaires. The topic was latter introduced in computer science and more particularly in data mining, where due to the large amount of data ...
Vicenç Torra, Guillermo Navarro-Arribas
openaire   +5 more sources

Design and Security Analysis of Cryptosystems

open access: yesApplied Sciences, 2023
The development of cryptography is closely related to the development of computers [...]
Suhri Kim, Seokhie Hong
doaj   +1 more source

Assessment of verbal interaction in Chinese classroom using social network analysis [PDF]

open access: yesPeerJ Computer Science
Background The global growth in Chinese language learners presents systematic challenges to Chinese classroom interaction evaluation. Key limitations include inadequate accuracy in speech recognition and shallow interaction analysis.
Li Zhang   +5 more
doaj   +2 more sources

Data privacy and DNA data

open access: yesIASSIST Quarterly, 2023
The letter to the Editor is in response to the manuscript by Hertzog et al. (2023) titled "Data management instruments to Protect the personal information of Children and Adolescents in sub-Saharan Africa." The letter elaborates on personal data ...
J.H. Smith, JS Horne
doaj   +1 more source

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

open access: yesJournal of Mathematical Cryptology, 2017
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj   +1 more source

Home - About - Disclaimer - Privacy