Results 21 to 30 of about 2,252,336 (338)
Redrawing the Boundaries on Purchasing Data from Privacy-Sensitive Individuals [PDF]
We prove new positive and negative results concerning the existence of truthful and individually rational mechanisms for purchasing private data from individuals with unbounded and sensitive privacy preferences. We strengthen the impossibility results of
Nissim, Kobbi +2 more
core +1 more source
LSGAN-AT: enhancing malware detector robustness against adversarial examples
Adversarial Malware Example (AME)-based adversarial training can effectively enhance the robustness of Machine Learning (ML)-based malware detectors against AME. AME quality is a key factor to the robustness enhancement.
Jianhua Wang +4 more
doaj +1 more source
Jurisprudential and Legal Study of the Relationship between Surrogate Mother and the Child Born of Surrogacy [PDF]
Using surrogacy as one of the new ways of supporting fertility in away that the owner of the womb (surrogate mother) does not have anycreational relationship (through ovum) with the child, merely raisingthe fetus of another couple and giving birth to it,
Najadali Almasi +2 more
doaj +1 more source
Abstract BACKGROUND Genetic information is unique among all laboratory data because it not only informs the current health of the specific person tested but may also be predictive of the future health of the individual and, to varying degrees, all biological relatives.
Abraham P, Schwab +3 more
openaire +2 more sources
Privacy-preserving artificial intelligence in healthcare: Techniques and applications
There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services.
N. Khalid +4 more
semanticscholar +1 more source
Adversarial attack and defense in reinforcement learning-from AI security view
Reinforcement learning is a core technology for modern artificial intelligence, and it has become a workhorse for AI applications ranging from Atrai Game to Connected and Automated Vehicle System (CAV).
Tong Chen +5 more
doaj +1 more source
Rényi Differential Privacy [PDF]
We propose a natural relaxation of differential privacy based on the Rényi divergence. Closely related notions have appeared in several recent papers that analyzed composition of differentially private mechanisms. We argue that the useful analytical tool
Ilya Mironov
semanticscholar +1 more source
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Ahamed, Sheikh Iqbal +2 more
core +2 more sources
Assessment of verbal interaction in Chinese classroom using social network analysis [PDF]
Background The global growth in Chinese language learners presents systematic challenges to Chinese classroom interaction evaluation. Key limitations include inadequate accuracy in speech recognition and shallow interaction analysis.
Li Zhang +5 more
doaj +2 more sources
Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective
This paper proposes a safe copy-back program operation in a NAND flash memory, which is targeting digital forensics for a variety of reasons. Due to the background management operation of the NAND flash memory, the original data is highly likely to ...
Na Young Ahn, Dong Hoon Lee
doaj +1 more source

