Results 41 to 50 of about 676,463 (285)

Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language Processing

open access: yesInformation, 2023
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases ...
Veronika Belcheva   +2 more
doaj   +1 more source

DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass

open access: yesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-
Minxin Du   +5 more
openaire   +2 more sources

A Survey on Privacy Protection of Blockchain: The Technology and Application

open access: yesIEEE Access, 2020
As a kind of point-to-point distributed public ledger technology, blockchain has been widely concerned in recent years. The privacy protection of blockchain technology has always been the core issue of people's attention.
Dan Wang, Jindong Zhao, Yingjie Wang
doaj   +1 more source

Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes

open access: yesHigh-Confidence Computing, 2022
The prosperity of network function virtualization (NFV) pushes forward the paradigm of migrating in-house middleboxes to third-party providers, i.e., software (virtualized) middlebox services.
Chunxiao Li, Yu Guo, Xia Wang
doaj   +1 more source

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

Revisiting Mission‐Oriented Cancer Research to tackle the increasing burden of cancer in Europe–a policy perspective

open access: yesMolecular Oncology, EarlyView.
Translational cancer research and its implementation through competitively selected Comprehensive Cancer Centers across Europe should be the primary policy focus for addressing the increasing cancer burden in Europe and counteract the present main strategy to convert cancer to a chronic disease.
Manuel Heitor   +2 more
wiley   +1 more source

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +1 more source

Lipopolysaccharide uptake is augmented in lipopolysaccharide‐tolerant mouse macrophage‐like cells via increased CD14 expression

open access: yesFEBS Open Bio, EarlyView.
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara   +3 more
wiley   +1 more source

Response to Privacy as a Public Good [PDF]

open access: yes, 2016
In the spirit of moving forward the theoretical and empirical scholarship on privacy as a public good, this response addresses four issues raised by Professors Fairfield and Engel’s article: first, their depiction of individuals in groups; second ...
Regan, Priscilla M.
core   +1 more source

Privacy and Impertinence: Talking about Servants in Austen [PDF]

open access: yes, 2020
With a few exceptions Austen does not give servants a distinctive character. Though she may acknowledge the material fact of the labour they do, she rarely brings them forward as individuals.
Hockenhull-Smith, Marie
core  

Home - About - Disclaimer - Privacy