Results 281 to 290 of about 2,622,455 (327)
Some of the next articles are maybe not open access.

Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning

IEEE/ACM Transactions on Networking
Federated learning (FL) requires frequent uploading and updating of model parameters, which is naturally vulnerable to gradient leakage attacks (GLAs) that reconstruct private training data through gradients.
Jiahui Hu   +7 more
semanticscholar   +1 more source

More Than Enough is Too Much: Adaptive Defenses Against Gradient Leakage in Production Federated Learning

IEEE/ACM Transactions on Networking
With increasing concerns on privacy leakage from gradients, various attack mechanisms emerged to recover private data from gradients, which challenged the primary advantage of privacy protection in federated learning. However, we cast doubt upon the real
Fei Wang, Ethan Hugh, Baochun Li
semanticscholar   +1 more source

Leakage Protection System Based on Zigbee Design

Applied Mechanics and Materials, 2012
As a Zigbee wireless sensor technology, Its application to the grid. Analyze leakage protection system in relation to the past system of superior performance and favorable conditions, And its features and system design of a simple program to explain the analysis and application of specific measures.
openaire   +1 more source

Automatic Full Gas Leakage Protection

International Journal of Scientific and Research Publications, 2023
Bader Algahtani, Adnan Affandi
openaire   +1 more source

Protecting organizational competitive advantage: A knowledge leakage perspective

Computers & Security, 2014
Abstract The strategic management literature emphasizes the importance of protecting organizational knowledge and information, especially in terms of maintaining competitive advantage. We synthesized several mechanisms from the literature that organizations could deploy to protect their knowledge and information.
Atif Ahmad   +2 more
openaire   +1 more source

Crystallization Regulation and Lead Leakage Prevention Simultaneously for High-Performance CsPbI2Br Perovskite Solar Cells.

Journal of Physical Chemistry Letters
All-inorganic CsPbI2Br perovskite is striking as a result of the reasonable band gap and thermal stability. However, the notorious air instability, unsatisfactory conversion efficiencies, and toxic water-soluble Pb2+ ions have greatly limited the further
Yanqiang Hu   +6 more
semanticscholar   +1 more source

Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey

IEEE/CAA Journal of Automatica Sinica
To enable precision medicine and remote patient monitoring, internet of healthcare things (IoHT) has gained significant interest as a promising technique.
Minfeng Qi   +5 more
semanticscholar   +1 more source

Protecting Electronic Signatures in Case of Key Leakage

2017
We present a protection mechanism against forgery of electronic signatures with the original signing keys. It works for standard signatures based on discrete logarithm problem such as DSA. It requires only a slight modification of the signing device – an implementation of an additional hidden evidence functionality.
Mirosław Kutyłowski   +5 more
openaire   +1 more source

ELECTRONIC PROTECTION OF EXAM PAPER LEAKAGE

Examination paper leakage is a severe issue affecting the integrity of academic evaluations. This project proposes an IoT-based smart locking and alert system to safeguard confidential examination materials during transportation and storage. The system utilizes an Arduino micro controller to control and monitor access using multi-level authentication ...
openaire   +1 more source

Home - About - Disclaimer - Privacy