Results 1 to 10 of about 543,621 (317)
The present paper, which composes a broader research agenda developed by Data Privacy Brasil Research Association, aims to conduct a descriptive and qualitative study of the Brazilian National Identity System through a data protection and data justice ...
Bruno Bioni +3 more
doaj +1 more source
Mobility patterns of vehicles and people provide powerful data sources for location-based services such as fleet optimization and traffic flow analysis.
Stefano Bennati, Aleksandra Kovacevic
doaj +1 more source
Camouflage Backdoor Attack against Pedestrian Detection
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu +9 more
doaj +1 more source
This position paper observes how different technical and normative conceptions of privacy have evolved in parallel and describes the practical challenges that these divergent approaches pose. Notably, past technologies relied on intuitive, heuristic understandings of privacy that have since been shown not to satisfy expectations for privacy protection.
Kobbi Nissim, Alexandra Wood
openaire +3 more sources
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park +5 more
doaj +1 more source
Availability and Reliability of Service Function Chain: A Quantitative Evaluation View
Service function chain (SFC) based on network function virtualization (NFV) technology can handle network traffic flexibly and efficiently. The virtual network function (VNF), as the core function unit of SFC, can experience software aging, which reduces
Yaru Li +5 more
doaj +1 more source
NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND ...
Na Young Ahn, Dong Hoon Lee
doaj +1 more source
Background Regulatory agencies, such as the European Medicines Agency and Health Canada, are requiring the public sharing of clinical trial reports that are used to make drug approval decisions.
Janice Branson +5 more
doaj +1 more source
This article argues that much of what we refer to as privacy in present-day society was materialised, experienced, instrumentalised, and also, to some extent, protected before the 19th century, when it was broadly conceptualised as a value and a right ...
Johannes Ljungberg, Natalie P. Körner
doaj +2 more sources
Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives
Empirical attacks on Federated Learning (FL) systems indicate that FL is fraught with numerous attack surfaces throughout the FL execution. These attacks can not only cause models to fail in specific tasks, but also infer private information.
Pengrui Liu, Xiangrui Xu, Wei Wang
doaj +1 more source

