Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








19 Hits in 8.4 sec

SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning [article]

Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin
2022 arXiv   pre-print
In this paper, we present a game-based framework to systematize the body of knowledge on privacy inference risks in machine learning.  ...  Inspired by the success of games (i.e., probabilistic experiments) to study security properties in cryptography, some authors describe privacy inference risks in machine learning using a similar game-based  ...  Current uses of privacy games The use of privacy games has become prevalent in the literature on machine learning privacy.  ... 
arXiv:2212.10986v1 fatcat:ra7hcxe4rfhznljltyqjrxyuni

SoK: Explainable Machine Learning for Computer Security Applications [article]

Azqa Nadeem, Daniël Vos, Clinton Cao, Luca Pajola, Simon Dieck, Robert Baumgartner, Sicco Verwer
2023 arXiv   pre-print
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines.  ...  evaluation are conducted in only 14% of the cases.  ...  We thank Daniël Meinsma for his contributions to the literature review, and the anonymous reviewers for their valuable feedback.  ... 
arXiv:2208.10605v2 fatcat:3lsl5zblb5ha7fidkgqadi2ncy

SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit

Cormac Herley, P. C. van Oorschot
2017 2017 IEEE Symposium on Security and Privacy (SP)  
However, we find that there is little clarity on what "scientific" means in the context of computer security research, or consensus on what a "Science of Security" should look like.  ...  We selectively review work in the history and philosophy of science and more recent work under the label "Science of Security".  ...  The second author is Canada Research Chair in Authentication and Computer Security, and acknowledges NSERC for funding the chair and a Discovery Grant.  ... 
doi:10.1109/sp.2017.38 dblp:conf/sp/HerleyO17 fatcat:tb34aq22vvh6ddpazd3g3azgzu

Health privacy : methods for privacy-preserving data sharing of methylation, microbiome and eye tracking data [article]

Inken Hagestedt, Universität Des Saarlandes
2022
Dies zerfällt in zwei Teile: Zunächst zeigen wir die Risiken für die Privatsphäre auf, die von biomedizinischen Daten wie DNA Methylierung, Mikrobiomdaten und bei der Aufnahme von Augenbewegungen vorkommen  ...  RQ 5: What is the influence of a larger data set on the performance of the machine learning model?  ...  machine learning in general.  ... 
doi:10.22028/d291-37172 fatcat:zef67ni7cvgx5armitjsjuey3q

Proceedings of the 2021 Joint Workshop of the German Research Training Groups in Computer Science. May 31–June 1, 2021

Joint Workshop Of The German Research Training Groups In Computer Science, Erlangen May 31–June 1, 2021, Felix Freiling
2021
Initiated in 1996 and run regularly since 2007, researchers of the German Research and Training Groups (RTGs) funded by the Deutsche Forschungsgemeinschaft (DFG) in the field of computer science meet annually  ...  The goal of these workshops is to foster an interchange of ideas and experiences in order to strengthen the connection within the German computer science community.  ...  These mapping are usually learned via a machine learning algorithm of choice.  ... 
doi:10.25593/opus4-fau-16426 fatcat:isoyq5lzdffxrdqzvkmfsnjgau

Proceedings of the 2022 Joint Workshop of the German Research Training Groups in Computer Science

Felix Freiling, Helmut Seidl, 2022 2022 Joint Workshop Of The German Research Training Groups In Computer Science June 12–June 15
2022
Because last year's event marked the 25th anniversary of the workshop series, it featured a live interview with Professor Otto Spaniol who had initiated the workshop series in 1996.  ...  This volume documents the abstracts of the research topics of funded researchers in the participating RTGs.  ...  In another experiment, we let the participant play a computer game to relax their mental state.  ... 
doi:10.25593/opus4-fau-19321 fatcat:ry4vd32xxbgldirrvymuaxxqwi

The Moral Character of Cryptographic Work

Phillip Rogaway
2015 unpublished
I apologize in advance if I offend anyone with any of my comments; nothing of the sort is my intent.  ...  If cryptography's most basic aim is to enable secure communications, how could it not be a colossal failure of our field when ordinary people lack even a modicum of communication privacy when interacting  ...  Acknowledgments My thanks go first to Mihir Bellare for countless discussions on the topic of this  ... 
fatcat:wl6iopkk4vda7nkvfdblc3hjnu

Rights in Action [chapter]

Patricia Goedde, Celeste L. Arrington
2021 Rights Claiming in South Korea  
Citizen B Cooperation Betrayal Citizen A Cooperation (2, 2) (3, 0) Betrayal (0, 3) (1, 1) Let us look into the equilibrium of the universal value game.  ...  Or, at times, they can be given preferential treatment. 28 Treatment of the unsecured claims Rule of fixation of a co-debtor's liability.  ...  of the current Debtor Rehabilitation and Bankruptcy Act (hereinafter "Unified Insolvency Act"), was in effect. 2 Among various options, adopting mergers and acquisitions (hereinafter "M&A") in reorganization  ... 
doi:10.1017/9781108893947.001 fatcat:gcvl556kevaxrdn2a6277c7w6e

Foundations of decentralised privacy [article]

Thomas Kerber, University Of Edinburgh, Aggelos Kiayias, Markulf Kohlweiss
2022
One of their greatest shortcomings lies in a fundamental conflict with privacy.  ...  It further demonstrates the possibility of privacy-preserving proof-of-stake, removing the need for costly proofs-of-work for a privacy-focused distributed ledger.  ...  The disparate approaches to privacy in smart contract systems and lack of a unified and foundational approach is one of the primary challenges to privacy in the distributed ledger space.  ... 
doi:10.7488/era/1766 fatcat:6olpkep6urci3g666krqxwuzue

Thwarting Malicious Adversaries in Homomorphic Encryption Pipelines

Sylvain Chatel
2023
I am also thankful for the members of LCA1/LDS, Spring, DEDIS, and LASEC whom I had the pleasure to meet throughout the years for making our floor such a vibrant environment.  ...  Our foody club took a noteworthy part in this journey as well. Thanks to Henry, Ludovic, and Kirill for being such good partners in debriefing about good food around the world.  ...  Acknowledgements Acknowledgements share many more of those.  ... 
doi:10.5075/epfl-thesis-9845 fatcat:lxs32rscyjejlehyff4anmwuwm

Dagstuhl Reports, Volume 9, Issue 7, July 2019, Complete Issue [article]

2020
This collected data will be used to develop an objective function for a social game. We will use these games to further analyze the current situation in the field of FOSS wrt privacy features.  ...  Machine learning and data mining for data series: Recent developments in deep neural network architectures have also caused an intense interest in examining the interactions between machine learning algorithms  ...  Depending on the age of the minor, the system provisions for various degrees of privacy. In the first mode the avatar will be invoked only when the user initiates it.  ... 
doi:10.4230/dagrep.9.7 fatcat:x4rfs6mnwfdztnbt6lghoavg6e

Dagstuhl Reports, Volume 6, Issue 1, January 2016, Complete Issue [article]

2016
We learned in December 2015 that Juniper used this random number generator in NetScreen products, with parameters they generated themselves and feeding the output into another PRNG that should hide the  ...  For example, the NSF in the US explicitly requests "broader impact" statements, DARPA in the US often runs programs with the goal of transitioning technology to industry or government, and REF in the UK  ...  Issues in Weakly/Unsupervised Learning A current trend in computer vision is exploiting machine learning, and in particular Deep Learning, to support the tasks of object and activity recognition.  ... 
doi:10.4230/dagrep.6.1 fatcat:vq74ezrwifbkhex6twvtdzbpaa

Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society [article]

Baha Abu-Shaqra, University, My, University, My
2020
Cyber adversaries exploit a cybersecurity skill/knowledge gap and an open society, undermining the information security/privacy of citizens and businesses and eroding trust in governments, thus threatening  ...  A cybersecurity skill gap undermines the security/viability of business and government institutions.  ...  For many people, this sounds like a zero-sum game. Sacrifice privacy for innovation, or let innovation suffer in the name of privacy. But these should not be competing priorities.  ... 
doi:10.20381/ruor-24626 fatcat:7umlebidtzao3ndyy4iifivboa

Art and Documentation no.22

various authors
2020 Sztuka i Dokumentacja  
Suggestions of topics and texts should be sent to the e-mail address of the editor. We also kindly ask to read the notes on style that can be found on our journal's website.  ...  All content is publish under the Creative Commons licenses. Articles are peer-reviewed. The list of peers and the peer-review process are available on our website.  ...  s writing at the time of the Machine Art exhibition in New York's Museum of Modern Art in 1934. The show summarized the modern artists' preoccupation with machine-made items and machines themselves.  ... 
doi:10.32020/artanddoc/22/2020/30 doaj:0cfeac1eebdb4b41a8b31d8510bcfcf1 fatcat:26s6xzya4bae7aacjwvc5uprcm

Dynamic Finland: The Political System and the Welfare State

A. F. Upton
2004 English Historical Review  
The association, whose board of directors consists of representatives of state administration and social welfare and health care organizations, has a legal monopoly on slot machine games in Finland.  ...  The textile industry emerged in the 1730s and the spinning machine and weaving machine, which mark the beginning of the Industrial Revolution, came to Finland as the forerunners of modern industry around  ...  87, 88 Hagfors, Robert 162, 228 Halila, Aimo 32, 189 Halonen, Tarja 101, 169, 170, 172, 173, 175, 179, 283 Hanell, Kenneth D. 70, 72, 73, 143, 198, 199, 200 196-197 expenditure 194-195 functions of  ... 
doi:10.1093/ehr/119.480.268 fatcat:s27ihukvrncp5cy6n75je27suu
« Previous Showing results 1 — 15 out of 19 results