Results 41 to 50 of about 676,463 (285)
Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language Processing
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases ...
Veronika Belcheva +2 more
doaj +1 more source
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-
Minxin Du +5 more
openaire +2 more sources
A Survey on Privacy Protection of Blockchain: The Technology and Application
As a kind of point-to-point distributed public ledger technology, blockchain has been widely concerned in recent years. The privacy protection of blockchain technology has always been the core issue of people's attention.
Dan Wang, Jindong Zhao, Yingjie Wang
doaj +1 more source
Towards privacy-preserving dynamic deep packet inspection over outsourced middleboxes
The prosperity of network function virtualization (NFV) pushes forward the paradigm of migrating in-house middleboxes to third-party providers, i.e., software (virtualized) middlebox services.
Chunxiao Li, Yu Guo, Xia Wang
doaj +1 more source
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu +4 more
core +1 more source
Translational cancer research and its implementation through competitively selected Comprehensive Cancer Centers across Europe should be the primary policy focus for addressing the increasing cancer burden in Europe and counteract the present main strategy to convert cancer to a chronic disease.
Manuel Heitor +2 more
wiley +1 more source
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng +7 more
doaj +1 more source
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara +3 more
wiley +1 more source
Response to Privacy as a Public Good [PDF]
In the spirit of moving forward the theoretical and empirical scholarship on privacy as a public good, this response addresses four issues raised by Professors Fairfield and Engel’s article: first, their depiction of individuals in groups; second ...
Regan, Priscilla M.
core +1 more source
Privacy and Impertinence: Talking about Servants in Austen [PDF]
With a few exceptions Austen does not give servants a distinctive character. Though she may acknowledge the material fact of the labour they do, she rarely brings them forward as individuals.
Hockenhull-Smith, Marie
core

