Results 31 to 40 of about 882,964 (360)

LSGAN-AT: enhancing malware detector robustness against adversarial examples

open access: yesCybersecurity, 2021
Adversarial Malware Example (AME)-based adversarial training can effectively enhance the robustness of Machine Learning (ML)-based malware detectors against AME. AME quality is a key factor to the robustness enhancement.
Jianhua Wang   +4 more
doaj   +1 more source

Integral Cryptanalysis of Lightweight Block Cipher PIPO

open access: yesIEEE Access, 2022
PIPO is a lightweight block cipher proposed at ICISC 2020, which has a byte-oriented structure suitable for bit-sliced implementation and allows for efficient higher-order masking implementations.
Sunyeop Kim   +5 more
doaj   +1 more source

Numerical Composition of Differential Privacy [PDF]

open access: yesNeural Information Processing Systems, 2021
We give a fast algorithm to optimally compose privacy guarantees of differentially private (DP) algorithms to arbitrary accuracy. Our method is based on the notion of \emph{privacy loss random variables} to quantify the privacy loss of DP algorithms.The ...
Sivakanth Gopi, Y. Lee, Lukas Wutschitz
semanticscholar   +1 more source

Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

open access: yesSensors, 2021
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim   +3 more
doaj   +1 more source

Privacy

open access: yes, 2021
The purpose of this Chapter is to provide an overview of the legislative framework in relation to the fundamental right to privacy and its potential application in the border control context.
openaire   +2 more sources

On ADS-B Sensor Placement for Secure Wide-Area Multilateration

open access: yesProceedings, 2020
As automatic dependent surveillance–broadcast (ADS-B) becomes more prevalent, the placement of on-ground sensors is vital for Air Traffic Control (ATC) to control the airspace.
Ala’ Darabseh   +3 more
doaj   +1 more source

Data privacy [PDF]

open access: yesWIREs Data Mining and Knowledge Discovery, 2014
Data privacy studies methods, tools, and theory to avoid the disclosure of sensitive information. Its origin is in statistics with the goal to ensure the confidentiality of data gathered from census and questionnaires. The topic was latter introduced in computer science and more particularly in data mining, where due to the large amount of data ...
Vicenç Torra, Guillermo Navarro-Arribas
openaire   +6 more sources

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things

open access: yesIEEE Access, 2017
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure key storage is expensive, novel solutions have been developed based on the idea of deriving the key from noisy ...
Christopher Huth   +4 more
doaj   +1 more source

CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2021
We introduce CryptGPU, a system for privacy-preserving machine learning that implements all operations on the GPU (graphics processing unit). Just as GPUs played a pivotal role in the success of modern deep learning, they are also essential for realizing
Sijun Tan   +3 more
semanticscholar   +1 more source

The Economics of Privacy [PDF]

open access: yesJournal of Economic Literature, 2015
This article summarizes and draws connections among diverse streams of theoretical and empirical research on the economics of privacy. We focus on the economic value and consequences of protecting and disclosing personal information, and on consumers' understanding and decisions regarding the trade-offs associated with the privacy and the sharing of ...
Liad Wagman   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy