Results 41 to 50 of about 2,252,336 (338)

Inverse privacy

open access: yesCommunications of the ACM, 2016
Seeking a market-based solution to the problem of a person's unjustified inaccessibility to their private information.
Gurevich, Yuri   +2 more
openaire   +2 more sources

Digital technologies: tensions in privacy and data

open access: yesJournal of the Academy of Marketing Science, 2022
Driven by data proliferation, digital technologies have transformed the marketing landscape. In parallel, significant privacy concerns have shaken consumer–firm relationships, prompting changes in both regulatory interventions and people’s own privacy ...
S. Quach   +4 more
semanticscholar   +1 more source

Why the Economics Profession Must Actively Participate in the Privacy Protection Debate [PDF]

open access: yes, 2019
When Google or the U.S. Census Bureau publish detailed statistics on browsing habits or neighborhood characteristics, some privacy is lost for everybody while supplying public information. To date, economists have not focused on the privacy loss inherent
Abowd, John M   +3 more
core   +2 more sources

Bistochastic Privacy

open access: yes, 2022
We introduce a new privacy model relying on bistochastic matrices, that is, matrices whose components are nonnegative and sum to 1 both row-wise and column-wise. This class of matrices is used to both define privacy guarantees and a tool to apply protection on a data set.
Ruiz, Nicolas, Domingo-Ferrer, Josep
openaire   +2 more sources

What Do Our Choices Say About Our Preferences?

open access: yes, 2021
Taking online decisions is a part of everyday life. Think of buying a house, parking a car or taking part in an auction. We often take those decisions publicly, which may breach our privacy - a party observing our choices may learn a lot about our ...
Grining, Krzysztof   +2 more
core  

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +1 more source

Couldn't or Wouldn't? the Influence of Privacy Concerns and Self-Efficacy in Privacy Management on Privacy Protection [PDF]

open access: yes, 2015
Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor ...
Chen, Hsuan-Ting, Chen, Wenhong
core   +1 more source

Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning

open access: yesIEEE Symposium on Security and Privacy, 2018
Deep neural networks are susceptible to various inference attacks as they remember information about their training data. We design white-box inference attacks to perform a comprehensive privacy analysis of deep learning models.
Milad Nasr, R. Shokri, Amir Houmansadr
semanticscholar   +1 more source

Differential Privacy for Deep and Federated Learning: A Survey

open access: yesIEEE Access, 2022
Users’ privacy is vulnerable at all stages of the deep learning process. Sensitive information of users may be disclosed during data collection, during training, or even after releasing the trained learning model.
Ahmed El Ouadrhiri, Ahmed M Abdelhadi
semanticscholar   +1 more source

JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information ...
Maik Ender   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy