Search

Your search keyword '"Privacy Attack"' showing total 27 results

Search Constraints

Start Over You searched for: Descriptor "Privacy Attack" Remove constraint Descriptor: "Privacy Attack"
27 results on '"Privacy Attack"'

Search Results

1. An integrated graph data privacy attack framework based on graph neural networks in IoT.

2. Can Inputs’ Reconstruction Information Be Coded into Machine Learning Model’s Outputs?

4. Empirical study of privacy inference attack against deep reinforcement learning models.

5. P‐2.24: A Survey of Privacy Protection Research based on Virtual Reality.

6. SAME: Sampling Attack in Multiplex Network Embedding

8. Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems

9. Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems.

10. Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey

11. SF-CABD: Secure Byzantine fault tolerance federated learning on Non-IID data.

12. Differential privacy in deep learning: A literature survey.

13. Defending against Reconstruction Attacks through Differentially Private Federated Learning for Classification of Heterogeneous Chest X-ray Data.

14. Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks

16. Privacy Threat Analysis of Mobile Social Network Data Publishing

17. VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching

18. Defending against Reconstruction Attacks through Differentially Private Federated Learning for Classification of Heterogeneous Chest X-ray Data

19. Precise and Fast Cryptanalysis for Bloom Filter Based Privacy-Preserving Record Linkage.

20. NFC Payment Spy: A Privacy Attack on Contactless Payments

21. Privacy Inference Analysis on Event-Based Social Networks

22. Attribute Inference Attacks in Online Social Networks.

23. Security Issues for Pervasive Personalized Communication Systems

24. PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression.

25. A critique and attack on "Blockchain-based privacy-preserving record linkage".

26. Linking Online and Offline Social Worlds: Opportunities and Threats

27. TRAP: using TaRgeted Ads to unveil Google personal Profiles

Catalog

Books, media, physical & digital resources