Results 91 to 100 of about 1,939,766 (365)

Improved Ciphertext-Only Attack on GMR-1

open access: yesIEEE Access, 2022
The GEO-Mobile Radio Interface-1 (GMR-1) is a satellite communication standard used in Thuraya, a United Arab Emirates-based regional mobile satellite service provider.
Dongjae Lee   +4 more
doaj   +1 more source

Information Sharing [PDF]

open access: yes, 2015
The Enterprise Privacy Office released these documents that concerned privacy and security in reference to ...
Enterprise Privacy Office
core  

An Examination of Privacy Policies of US Government Senate Websites. [PDF]

open access: yes, 2010
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core   +2 more sources

Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting

open access: yesIEEE Computer Security Foundations Symposium, 2017
Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. A growing body of prior work demonstrates that models produced by these algorithms may leak specific private information in the training data to an attacker ...
Samuel Yeom   +3 more
semanticscholar   +1 more source

A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and Protection [PDF]

open access: yesIEEE Transactions on Knowledge and Data Engineering, 2019
As data privacy increasingly becomes a critical societal concern, federated learning has been a hot research topic in enabling the collaborative training of machine learning models among different organizations under the privacy restrictions.
Q. Li   +3 more
semanticscholar   +1 more source

Multiplex single‐cell profiling of putative cancer stem cell markers ALDH1, SOX9, SOX2, CD44, CD133 and CD15 in endometrial cancer

open access: yesMolecular Oncology, EarlyView.
Cancer stem cells are associated with aggressive disease, but a deep characterization of such markers is lacking in endometrial cancer. This study uses imaging mass cytometry to explore putative cancer stem cell markers in endometrial tumors and corresponding organoid models.
Hilde E. Lien   +7 more
wiley   +1 more source

DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features

open access: yesIEEE Access, 2018
Android platform has dominated the operating system of mobile devices. However, the dramatic increase of Android malicious applications (malapps) has caused serious software failures to Android system and posed a great threat to users.
Wei Wang   +5 more
doaj   +1 more source

Faxes and Copiers [PDF]

open access: yes, 2015
The Enterprise Privacy Office released these documents that concerned privacy and security in reference to ...
Enterprise Privacy Office
core  

What Do Our Choices Say About Our Preferences?

open access: yes, 2021
Taking online decisions is a part of everyday life. Think of buying a house, parking a car or taking part in an auction. We often take those decisions publicly, which may breach our privacy - a party observing our choices may learn a lot about our ...
Grining, Krzysztof   +2 more
core  

The roles and applications of extracellular vesicles in cancer

open access: yesMolecular Oncology, EarlyView.
Extracellular vesicles (EVs) are minute versions of cells limited by a lipid bilayer containing cytoplasm from the cell that releases them, but without a nucleus and thus unable to self‐reproduce. EVs contain multiple molecules (proteins, lipids, glycans, and nucleic acids) they can induce complex responses in cells.
Clotilde Théry, Daniel Louvard
wiley   +1 more source

Home - About - Disclaimer - Privacy