Results 61 to 70 of about 1,939,766 (365)

Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking

open access: yesIEEE Access, 2017
Content-centric networking (CCN) aims to improve network reliability, scalability, and security by changing the way that information is organized and retrieved in the current Internet. One critical issue in CCN is in-network cache allocation. It is known
Guozhi Zhang   +3 more
doaj   +1 more source

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022

open access: yesJournal of Cybersecurity and Privacy, 2023
High-quality academic publishing is built on rigorous peer review [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj   +1 more source

Anonymous subject identification and privacy information management in video surveillance [PDF]

open access: yes, 2017
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection.
Barni, Mauro   +4 more
core   +1 more source

Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning

open access: yesIEEE Symposium on Security and Privacy, 2018
Deep neural networks are susceptible to various inference attacks as they remember information about their training data. We design white-box inference attacks to perform a comprehensive privacy analysis of deep learning models.
Milad Nasr, R. Shokri, Amir Houmansadr
semanticscholar   +1 more source

Privacy Games [PDF]

open access: yesACM Transactions on Economics and Computation, 2014
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizing agents has received much attention lately. Privacy concerns are often modeled by altering the utility functions of agents to consider also their privacy lossĀ [4, 14, 20, 28].
Or Sheffet, Salil Vadhan, Yiling Chen
openaire   +3 more sources

Privacy-Preserving Traffic Flow Prediction: A Federated Learning Approach [PDF]

open access: yesIEEE Internet of Things Journal, 2020
Existing traffic flow forecasting approaches by deep learning models achieve excellent success based on a large volume of data sets gathered by governments and organizations.
Yi Liu   +4 more
semanticscholar   +1 more source

Is Privacy Controllable?

open access: yes, 2019
One of the major views of privacy associates privacy with the control over information. This gives rise to the question how controllable privacy actually is. In this paper, we adapt certain formal methods of control theory and investigate the implications of a control theoretic analysis of privacy.
Yefim Shulman, Joachim Meyer
openaire   +3 more sources

JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information ...
Maik Ender   +4 more
doaj   +1 more source

Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges

open access: yesIEEE Access, 2022
Targets of cyber crime are not exclusive to the private sector. Successful cyber attacks on nation-states have proved that cyber threats can jeopardize significant national interests.
Suhyeon Lee, Seungjoo Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy