Results 61 to 70 of about 1,939,766 (365)
Content-centric networking (CCN) aims to improve network reliability, scalability, and security by changing the way that information is organized and retrieved in the current Internet. One critical issue in CCN is in-network cache allocation. It is known
Guozhi Zhang+3 more
doaj +1 more source
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang+4 more
doaj +1 more source
Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022
High-quality academic publishing is built on rigorous peer review [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj +1 more source
Anonymous subject identification and privacy information management in video surveillance [PDF]
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection.
Barni, Mauro+4 more
core +1 more source
Deep neural networks are susceptible to various inference attacks as they remember information about their training data. We design white-box inference attacks to perform a comprehensive privacy analysis of deep learning models.
Milad Nasr, R. Shokri, Amir Houmansadr
semanticscholar +1 more source
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizing agents has received much attention lately. Privacy concerns are often modeled by altering the utility functions of agents to consider also their privacy lossĀ [4, 14, 20, 28].
Or Sheffet, Salil Vadhan, Yiling Chen
openaire +3 more sources
Privacy-Preserving Traffic Flow Prediction: A Federated Learning Approach [PDF]
Existing traffic flow forecasting approaches by deep learning models achieve excellent success based on a large volume of data sets gathered by governments and organizations.
Yi Liu+4 more
semanticscholar +1 more source
One of the major views of privacy associates privacy with the control over information. This gives rise to the question how controllable privacy actually is. In this paper, we adapt certain formal methods of control theory and investigate the implications of a control theoretic analysis of privacy.
Yefim Shulman, Joachim Meyer
openaire +3 more sources
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information ...
Maik Ender+4 more
doaj +1 more source
Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges
Targets of cyber crime are not exclusive to the private sector. Successful cyber attacks on nation-states have proved that cyber threats can jeopardize significant national interests.
Suhyeon Lee, Seungjoo Kim
doaj +1 more source