Results 21 to 30 of about 2,252,336 (338)

Redrawing the Boundaries on Purchasing Data from Privacy-Sensitive Individuals [PDF]

open access: yes, 2014
We prove new positive and negative results concerning the existence of truthful and individually rational mechanisms for purchasing private data from individuals with unbounded and sensitive privacy preferences. We strengthen the impossibility results of
Nissim, Kobbi   +2 more
core   +1 more source

LSGAN-AT: enhancing malware detector robustness against adversarial examples

open access: yesCybersecurity, 2021
Adversarial Malware Example (AME)-based adversarial training can effectively enhance the robustness of Machine Learning (ML)-based malware detectors against AME. AME quality is a key factor to the robustness enhancement.
Jianhua Wang   +4 more
doaj   +1 more source

Jurisprudential and Legal Study of the Relationship between Surrogate Mother and the Child Born of Surrogacy [PDF]

open access: yesپژوهش‌نامه حقوق اسلامی, 2013
Using surrogacy as one of the new ways of supporting fertility in away that the owner of the womb (surrogate mother) does not have anycreational relationship (through ovum) with the child, merely raisingthe fetus of another couple and giving birth to it,
Najadali Almasi   +2 more
doaj   +1 more source

Genomic Privacy [PDF]

open access: yesClinical Chemistry, 2018
Abstract BACKGROUND Genetic information is unique among all laboratory data because it not only informs the current health of the specific person tested but may also be predictive of the future health of the individual and, to varying degrees, all biological relatives.
Abraham P, Schwab   +3 more
openaire   +2 more sources

Privacy-preserving artificial intelligence in healthcare: Techniques and applications

open access: yesComput. Biol. Medicine, 2023
There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services.
N. Khalid   +4 more
semanticscholar   +1 more source

Adversarial attack and defense in reinforcement learning-from AI security view

open access: yesCybersecurity, 2019
Reinforcement learning is a core technology for modern artificial intelligence, and it has become a workhorse for AI applications ranging from Atrai Game to Connected and Automated Vehicle System (CAV).
Tong Chen   +5 more
doaj   +1 more source

Rényi Differential Privacy [PDF]

open access: yesIEEE Computer Security Foundations Symposium, 2017
We propose a natural relaxation of differential privacy based on the Rényi divergence. Closely related notions have appeared in several recent papers that analyzed composition of differentially private mechanisms. We argue that the useful analytical tool
Ilya Mironov
semanticscholar   +1 more source

AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]

open access: yes, 2017
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal   +2 more
core   +2 more sources

Assessment of verbal interaction in Chinese classroom using social network analysis [PDF]

open access: yesPeerJ Computer Science
Background The global growth in Chinese language learners presents systematic challenges to Chinese classroom interaction evaluation. Key limitations include inadequate accuracy in speech recognition and shallow interaction analysis.
Li Zhang   +5 more
doaj   +2 more sources

Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective

open access: yesIEEE Access, 2021
This paper proposes a safe copy-back program operation in a NAND flash memory, which is targeting digital forensics for a variety of reasons. Due to the background management operation of the NAND flash memory, the original data is highly likely to ...
Na Young Ahn, Dong Hoon Lee
doaj   +1 more source

Home - About - Disclaimer - Privacy