DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 17,131
1.
  • User Data Privacy: Facebook... User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection
    Isaak, Jim; Hanna, Mina J. Computer (Long Beach, Calif.), 08/2018, Volume: 51, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    With the revelation that Facebook handed over personally identifiable information of more than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be ...
Full text
Available for: UL
2.
  • Privacy-Preserving Consensu... Privacy-Preserving Consensus-Based Energy Management in Smart Grids
    Zhao, Chengcheng; Chen, Jiming; He, Jianping ... IEEE transactions on signal processing, 12/2018, Volume: 66, Issue: 23
    Journal Article
    Peer reviewed

    Privacy has become a big concern for consumers in electricity consumption activities, as privacy disclosure may cause losses to individuals. Since the information exchange and update in distributed ...
Full text
Available for: UL
3.
  • Towards Personalized Federa... Towards Personalized Federated Learning
    Tan, Alysa Ziying; Yu, Han; Cui, Lizhen ... IEEE transaction on neural networks and learning systems, 12/2023, Volume: 34, Issue: 12
    Journal Article
    Open access

    In parallel with the rapid adoption of artificial intelligence (AI) empowered by advances in AI research, there has been growing awareness and concerns of data privacy. Recent significant ...
Full text
Available for: UL
4.
  • Digital Health Innovation: ... Digital Health Innovation: Exploring Adoption of COVID-19 Digital Contact Tracing Apps
    Sharma, Shavneet; Singh, Gurmeet; Sharma, Rashmini ... IEEE transactions on engineering management, 2024
    Journal Article
    Peer reviewed
    Open access

    With the outbreak of COVID-19, contact tracing is becoming a used intervention to control the spread of this highly infectious disease. This article explores an individual's intention to adopt ...
Full text
Available for: UL

PDF
5.
  • Latent-Data Privacy Preserv... Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data
    He, Zaobo; Cai, Zhipeng; Yu, Jiguo IEEE transactions on vehicular technology, 2018-Jan., 2018-1-00, 20180101, Volume: 67, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Social network data can help with obtaining valuable insight into social behaviors and revealing the underlying benefits. New big data technologies are emerging to make it easier to discover ...
Full text
Available for: UL

PDF
6.
  • Privacy preserving distribu... Privacy preserving distributed machine learning with federated learning
    Chamikara, M.A.P.; Bertok, P.; Khalil, I. ... Computer communications, 04/2021, Volume: 171
    Journal Article
    Peer reviewed
    Open access

    Edge computing and distributed machine learning have advanced to a level that can revolutionize a particular organization. Distributed devices such as the Internet of Things (IoT) often produce a ...
Full text
Available for: UL

PDF
7.
  • Perspectives on citizen dat... Perspectives on citizen data privacy in a smart city – An empirical case study
    Lucas, Evie; Simpson, Seamus Convergence, 04/2024
    Journal Article
    Peer reviewed
    Open access

    Digitisation is arguably an inevitable feature of contemporary urban development, yet privacy issues arising from the mass data collection, transmission and processing it entails continue to be a ...
Full text
Available for: UL
8.
  • Matryoshka: Exploiting the ... Matryoshka: Exploiting the Over-Parametrization of Deep Learning Models for Covert Data Transmission
    Pan, Xudong; Zhang, Mi; Yan, Yifan ... IEEE transactions on pattern analysis and machine intelligence, 07/2024, Volume: PP
    Journal Article
    Peer reviewed

    High-quality private machine learning (ML) data stored in local data centers becomes a key competitive factor for AI corporations. In this paper, we present a novel insider attack called Matryoshka ...
Full text
Available for: UL
9.
  • CacheOut: Leaking Data on Intel CPUs via Cache Evictions
    van Schaik, Stephan; Minkin, Marina; Kwong, Andrew ... 2021 IEEE Symposium on Security and Privacy (SP)
    Conference Proceeding
    Open access

    Recent transient-execution attacks, such as RIDL, Fallout, and ZombieLoad, demonstrated that attackers can leak information while it transits through microarchitectural buffers. Named ...
Full text
Available for: UL

PDF
10.
  • Robust Aggregation for Fede... Robust Aggregation for Federated Learning
    Pillutla, Krishna; Kakade, Sham M.; Harchaoui, Zaid IEEE transactions on signal processing, 2022, Volume: 70
    Journal Article
    Peer reviewed
    Open access

    We present a novel approach to federated learning that endows its aggregation process with greater robustness to potential poisoning of local data or model parameters of participating devices. The ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 17,131

Load filters