Results 31 to 40 of about 285,701 (294)

Label Leakage and Protection in Two-party Split Learning

open access: yesCoRR, 2021
Accepted to ICLR 2022 (https://openreview.net/forum?id=cOtBRgsf2fO)
Oscar Li   +7 more
openaire   +3 more sources

On the relation between Differential Privacy and Quantitative Information Flow [PDF]

open access: yes, 2011
Differential privacy is a notion that has emerged in the community of statistical databases, as a response to the problem of protecting the privacy of the database's participants when performing statistical queries.
A. Ghosh   +13 more
core   +7 more sources

Rule Fusion of Privacy Protection Strategies for Co-Ownership Data Sharing

open access: yesMathematics, 2022
With the rapid development of social networks, personal privacy leakage has become more and more serious. A social network is a shared platform. Resources in a social network may be shared by multiple owners.
Tinghuai Ma   +4 more
doaj   +1 more source

Ozone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures

open access: yes, 2017
Time variation during program execution can leak sensitive information. Time variations due to program control flow and hardware resource contention have been used to steal encryption keys in cipher implementations such as AES and RSA.
Austin, Todd, Aweke, Zelalem Birhanu
core   +1 more source

Protecting Circuits from Computationally Bounded and Noisy Leakage [PDF]

open access: yesSIAM Journal on Computing, 2014
Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles any circuit into a circuit with the same functionality but resilience against well-defined classes of leakage.
Faust, Sebastian   +4 more
openaire   +2 more sources

Relations among Security Metrics for Template Protection Algorithms [PDF]

open access: yes, 2013
Many biometric template protection algorithms have been proposed mainly in two approaches: biometric feature transformation and biometric cryptosystem.
Inuma, Manabu, Otsuka, Akira
core   +1 more source

The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes

open access: yesFEBS Letters, EarlyView.
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga   +3 more
wiley   +1 more source

Present situation and development trend of control and protection technology for mine-used combined switch

open access: yesGong-kuang zidonghua, 2019
Present situation of control and protection technology for mine-used combined switch was introduced from aspects of short circuit protection, overload protection, leakage lockout and leakage protection, transient overvoltage protection and temperature ...
YANG Fan, CHEN Jiang
doaj   +1 more source

Reserves in Context: Planning for Leakage from Protected Areas

open access: yesPLOS ONE, 2015
When protected areas reduce threats within their boundaries, they often displace a portion of these threats into adjacent areas through a process known as 'leakage', undermining conservation objectives. Using theoretical models and a case study of terrestrial mammals in Indonesia, we develop the first theoretical explanation of how leakage impacts ...
Renwick, Anna   +2 more
openaire   +6 more sources

Dapagliflozin prevents methylglyoxal‐induced retinal cell death in ARPE‐19 cells

open access: yesFEBS Open Bio, EarlyView.
Diabetic macular oedema is a diabetes complication of the eye, which may lead to permanent blindness. ARPE‐19 are human retinal cells used to study retinal diseases and potential therapeutics. Methylglyoxal is a compound increased in uncontrolled diabetes due to elevated blood glucose.
Naina Trivedi   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy