Results 1 to 10 of about 2,252,336 (338)
The present paper, which composes a broader research agenda developed by Data Privacy Brasil Research Association, aims to conduct a descriptive and qualitative study of the Brazilian National Identity System through a data protection and data justice ...
Bruno Bioni +3 more
doaj +1 more source
Mobility patterns of vehicles and people provide powerful data sources for location-based services such as fleet optimization and traffic flow analysis.
Stefano Bennati, Aleksandra Kovacevic
doaj +1 more source
Camouflage Backdoor Attack against Pedestrian Detection
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu +9 more
doaj +1 more source
NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND ...
Na Young Ahn, Dong Hoon Lee
doaj +1 more source
Availability and Reliability of Service Function Chain: A Quantitative Evaluation View
Service function chain (SFC) based on network function virtualization (NFV) technology can handle network traffic flexibly and efficiently. The virtual network function (VNF), as the core function unit of SFC, can experience software aging, which reduces
Yaru Li +5 more
doaj +1 more source
Background Regulatory agencies, such as the European Medicines Agency and Health Canada, are requiring the public sharing of clinical trial reports that are used to make drug approval decisions.
Janice Branson +5 more
doaj +1 more source
Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks
Dongjun Park +5 more
doaj +1 more source
This article argues that much of what we refer to as privacy in present-day society was materialised, experienced, instrumentalised, and also, to some extent, protected before the 19th century, when it was broadly conceptualised as a value and a right ...
Johannes Ljungberg, Natalie P. Körner
doaj +2 more sources
The Privacy ZEBRA: Zero Evidence Biometric Recognition Assessment [PDF]
Mounting privacy legislation calls for the preservation of privacy in speech technology, though solutions are gravely lacking. While evaluation campaigns are long-proven tools to drive progress, the need to consider a privacy adversary implies that ...
Bonastre, Jean-Francois +7 more
core +2 more sources
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds [PDF]
"Concentrated differential privacy" was recently introduced by Dwork and Rothblum as a relaxation of differential privacy, which permits sharper analyses of many privacy-preserving computations.
A Beimel +7 more
core +2 more sources

