Results 91 to 100 of about 12,885 (184)
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs [PDF]
Smartphones, the devices we carry everywhere with us, are being heavily tracked and have undoubtedly become a major threat to our privacy. As "tracking the trackers" has become a necessity, various static and dynamic analysis tools have been developed in
Achara, Jagdish Prasad +3 more
core +2 more sources
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e.
Narayanan, Arvind, Shmatikov, Vitaly
core +2 more sources
The Metaverse brings together components of parallel processing computing platforms, the digital development of physical systems, cutting-edge machine learning, and virtual identity to uncover a fully digitalized environment with equal properties to the ...
Faisal Fiaz +4 more
doaj +1 more source
De-Identification of Electronic Health Records Using Deep Learning and Transformers
Adoption of electronic health records (EHRs) has significantly advanced healthcare by enabling extensive data storage and analysis for clinical decisions and research.
Fatih Dilmaç, Adil Alpkocak
doaj +1 more source
Regulating Data as Property: A New Construct for Moving Forward [PDF]
The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets.
Mayer, Anna, Ritter, Jeffrey
core +1 more source
Addressing Memorization and Aggregation Risks in AI: A Knowledge Graph Approach to Privacy
Recent studies have shown that AI models can memorize specific data records, resulting in sensitive data exposure through model access. Current privacy-enhancing technologies often overlook the crucial, context-dependent nature of privacy risk as they ...
Jinhui Zuo, Seok-Won Lee
doaj +1 more source
Airport Wi-Fi Service Delivery and Monetisation Strategies – an International Perspective. [PDF]
With internet connectivity becoming an important enabler to knowledge sharing, information access and communication, free Wi-Fi offerings are becoming more prevalent not only in a business context, but also in a leisure context.
Dr Candice Louw
doaj
Do LLMs Really Memorize Personally Identifiable Information? Revisiting PII Leakage with a Cue-Controlled Memorization Framework [PDF]
XIAOYU LUO +3 more
openalex +3 more sources
Applying PII fingerprints in security incident analysis [PDF]
Regulations in many countries govern the use of personally identifiable information (PII) in IT systems. A key aspect of these regulations is to retain PII only as long as necessary and delete it immediately afterwards.
Milman, Ivan +2 more
core +1 more source
UEG Week 2025 Poster Presentations
United European Gastroenterology Journal, Volume 13, Issue S8, Page S803-S1476, October 2025.
wiley +1 more source

