Results 1 to 10 of about 1,939,667 (266)
Interrogating the relationship between copyright enforcement and privacy raises deeper questions about the nature of privacy and what counts, or ought to count, as privacy invasion in the age of networked digital technologies.
Cohen, Julie E.
core +6 more sources
Multi-step Jailbreaking Privacy Attacks on ChatGPT [PDF]
With the rapid progress of large language models (LLMs), many downstream NLP tasks can be well solved given appropriate prompts. Though model developers and researchers work hard on dialog safety to avoid generating harmful content from LLMs, it is still
Haoran Li+5 more
semanticscholar +1 more source
A Survey on Metaverse: Fundamentals, Security, and Privacy [PDF]
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize.
Yuntao Wang+6 more
semanticscholar +1 more source
The present paper, which composes a broader research agenda developed by Data Privacy Brasil Research Association, aims to conduct a descriptive and qualitative study of the Brazilian National Identity System through a data protection and data justice ...
Bruno Bioni+3 more
doaj +1 more source
Mobility patterns of vehicles and people provide powerful data sources for location-based services such as fleet optimization and traffic flow analysis.
Stefano Bennati, Aleksandra Kovacevic
doaj +1 more source
Deep Learning with Differential Privacy [PDF]
Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the training of models requires large, representative datasets, which may be crowdsourced and contain sensitive information.
Martín Abadi+6 more
semanticscholar +1 more source
What Does it Mean for a Language Model to Preserve Privacy? [PDF]
Natural language reflects our private lives and identities, making its privacy concerns as broad as those of real life. Language models lack the ability to understand the context and sensitivity of text, and tend to memorize phrases present in their ...
Hannah Brown+4 more
semanticscholar +1 more source
This position paper observes how different technical and normative conceptions of privacy have evolved in parallel and describes the practical challenges that these divergent approaches pose. Notably, past technologies relied on intuitive, heuristic understandings of privacy that have since been shown not to satisfy expectations for privacy protection.
Kobbi Nissim, Alexandra Wood
openaire +4 more sources
Camouflage Backdoor Attack against Pedestrian Detection
Pedestrian detection models in autonomous driving systems heavily rely on deep neural networks (DNNs) to perceive their surroundings. Recent research has unveiled the vulnerability of DNNs to backdoor attacks, in which malicious actors manipulate the ...
Yalun Wu+9 more
doaj +1 more source
NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND ...
Na Young Ahn, Dong Hoon Lee
doaj +1 more source