Results 1 to 10 of about 1,939,667 (266)

DRM and Privacy [PDF]

open access: yesCommunications of the ACM, 2003
Interrogating the relationship between copyright enforcement and privacy raises deeper questions about the nature of privacy and what counts, or ought to count, as privacy invasion in the age of networked digital technologies.
Cohen, Julie E.
core   +6 more sources

Multi-step Jailbreaking Privacy Attacks on ChatGPT [PDF]

open access: yesConference on Empirical Methods in Natural Language Processing, 2023
With the rapid progress of large language models (LLMs), many downstream NLP tasks can be well solved given appropriate prompts. Though model developers and researchers work hard on dialog safety to avoid generating harmful content from LLMs, it is still
Haoran Li   +5 more
semanticscholar   +1 more source

A Survey on Metaverse: Fundamentals, Security, and Privacy [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2022
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize.
Yuntao Wang   +6 more
semanticscholar   +1 more source

The digitization of the Brazilian national identity system: A descriptive and qualitative analysis of its information architecture

open access: yesData & Policy, 2022
The present paper, which composes a broader research agenda developed by Data Privacy Brasil Research Association, aims to conduct a descriptive and qualitative study of the Brazilian National Identity System through a data protection and data justice ...
Bruno Bioni   +3 more
doaj   +1 more source

Modelling imperfect knowledge via location semantics for realistic privacy risks estimation in trajectory data

open access: yesScientific Reports, 2022
Mobility patterns of vehicles and people provide powerful data sources for location-based services such as fleet optimization and traffic flow analysis.
Stefano Bennati, Aleksandra Kovacevic
doaj   +1 more source

Deep Learning with Differential Privacy [PDF]

open access: yesConference on Computer and Communications Security, 2016
Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the training of models requires large, representative datasets, which may be crowdsourced and contain sensitive information.
Martín Abadi   +6 more
semanticscholar   +1 more source

What Does it Mean for a Language Model to Preserve Privacy? [PDF]

open access: yesConference on Fairness, Accountability and Transparency, 2022
Natural language reflects our private lives and identities, making its privacy concerns as broad as those of real life. Language models lack the ability to understand the context and sensitivity of text, and tend to memorize phrases present in their ...
Hannah Brown   +4 more
semanticscholar   +1 more source

Is privacy privacy ? [PDF]

open access: yesPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2018
This position paper observes how different technical and normative conceptions of privacy have evolved in parallel and describes the practical challenges that these divergent approaches pose. Notably, past technologies relied on intuitive, heuristic understandings of privacy that have since been shown not to satisfy expectations for privacy protection.
Kobbi Nissim, Alexandra Wood
openaire   +4 more sources

Camouflage Backdoor Attack against Pedestrian Detection

open access: yesApplied Sciences, 2023
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu   +9 more
doaj   +1 more source

Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory

open access: yesIEEE Access, 2022
NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND ...
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy