Results 91 to 100 of about 1,939,766 (365)
Improved Ciphertext-Only Attack on GMR-1
The GEO-Mobile Radio Interface-1 (GMR-1) is a satellite communication standard used in Thuraya, a United Arab Emirates-based regional mobile satellite service provider.
Dongjae Lee+4 more
doaj +1 more source
The Enterprise Privacy Office released these documents that concerned privacy and security in reference to ...
Enterprise Privacy Office
core
An Examination of Privacy Policies of US Government Senate Websites. [PDF]
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core +2 more sources
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting
Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. A growing body of prior work demonstrates that models produced by these algorithms may leak specific private information in the training data to an attacker ...
Samuel Yeom+3 more
semanticscholar +1 more source
A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and Protection [PDF]
As data privacy increasingly becomes a critical societal concern, federated learning has been a hot research topic in enabling the collaborative training of machine learning models among different organizations under the privacy restrictions.
Q. Li+3 more
semanticscholar +1 more source
Cancer stem cells are associated with aggressive disease, but a deep characterization of such markers is lacking in endometrial cancer. This study uses imaging mass cytometry to explore putative cancer stem cell markers in endometrial tumors and corresponding organoid models.
Hilde E. Lien+7 more
wiley +1 more source
Android platform has dominated the operating system of mobile devices. However, the dramatic increase of Android malicious applications (malapps) has caused serious software failures to Android system and posed a great threat to users.
Wei Wang+5 more
doaj +1 more source
The Enterprise Privacy Office released these documents that concerned privacy and security in reference to ...
Enterprise Privacy Office
core
What Do Our Choices Say About Our Preferences?
Taking online decisions is a part of everyday life. Think of buying a house, parking a car or taking part in an auction. We often take those decisions publicly, which may breach our privacy - a party observing our choices may learn a lot about our ...
Grining, Krzysztof+2 more
core
The roles and applications of extracellular vesicles in cancer
Extracellular vesicles (EVs) are minute versions of cells limited by a lipid bilayer containing cytoplasm from the cell that releases them, but without a nucleus and thus unable to self‐reproduce. EVs contain multiple molecules (proteins, lipids, glycans, and nucleic acids) they can induce complex responses in cells.
Clotilde Théry, Daniel Louvard
wiley +1 more source