Results 111 to 120 of about 1,939,766 (365)
Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure multi-party computing, in order to preserve ...
Yanwei Gong+5 more
doaj +1 more source
Fog Service in Space Information Network: Architecture, Use Case, Security and Challenges
As a large heterogeneous information infrastructure, space terrestrial coinformation network provides a reliable and effective services for all types of space-based users, aviation users, marine users and land-based users through satellite networks ...
Junyan Guo, Ye Du
doaj +1 more source
Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples
Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has
Yixiang Wang+5 more
doaj +1 more source
This paper aims to identify and order the harms or losses which the law might compensate (or more widely redress) in actions for breach of privacy. Part I identifies three such detriments, to which all the others are reducible: pecuniary loss, mental distress and breach of privacy per se. Part II seeks to explain why they cannot all coexist at the same
openaire +4 more sources
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source
Over the last few years, the malware propagation on PC platforms, especially on Windows OS has been even severe. For the purpose of resisting a large scale of malware variants, machine learning (ML) classifiers for malicious Portable Executable (PE ...
Yipin Zhang+4 more
doaj +1 more source
Privacy in Implementation [PDF]
In most implementation frameworks agents care only about the outcome, and not at all about the way in which it was obtained. Additionally, typical mechanisms for full implementation involve the complete revelation of all private information to the planner. In this paper I consider the problem of full implementation with agents who may prefer to protect
openaire +5 more sources
Abstract Background This study aims to develop a novel predictive model for determining human papillomavirus (HPV) presence in oropharyngeal cancer using computed tomography (CT). Current image‐based HPV prediction methods are hindered by high computational demands or suboptimal performance.
Junhua Chen+3 more
wiley +1 more source
Context-Aware Generative Adversarial Privacy
Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often
Chen, Xiao+4 more
core +2 more sources
El treball es va presentar a la International Conference on Cryptology and Network Security (15th : 2016 : Milan, Italy) When considering data provenance some problems arise from the need to safely handle provenance related functionality. If some modifications have to be performed in a data set due to provenance related requirements, e.g.
Torra i Reventós, Vicenç+1 more
openaire +4 more sources