Search

Your search keyword '"data leakage"' showing total 400 results

Search Constraints

Start Over You searched for: Descriptor "data leakage" Remove constraint Descriptor: "data leakage"
400 results on '"data leakage"'

Search Results

1. Shielding secrets: developing an enigmatic defense system with deep learning against side channel attacks.

2. Carbon Price Forecasting Using Optimized Sliding Window Empirical Wavelet Transform and Gated Recurrent Unit Network to Mitigate Data Leakage.

3. Visual Censorship: A Deep Learning-Based Approach to Preventing the Leakage of Confidential Content in Images.

4. Privacy risks induced by generative large language models and governance paths

5. Shielding secrets: developing an enigmatic defense system with deep learning against side channel attacks

6. Batch data recovery from gradients based on generative adversarial networks.

7. MAIDS: malicious agent identification-based data security model for cloud environments.

8. Exposing Data Leakage in Wi-Fi CSI-Based Human Action Recognition: A Critical Analysis.

9. 基于区块链技术的网络通信数据泄露自动检测系统设计.

10. A Method for Predicting Transformer Oil-Dissolved Gas Concentration Based on Multi-Window Stepwise Decomposition with HP-SSA-VMD-LSTM.

11. Enhancing Monitoring Performance: A Microservices Approach to Monitoring with Spyware Techniques and Prediction Models.

12. A Machine Learning Approach for Predicting the Size of Abdominal Aortic Aneurysm

13. The change and disadvantage brought about by the generation of artificial intelligence

15. Performance Analysis of AES and DES Algorithm for Encrypting Medical Record Using Blockchain

16. Critical Analysis of Data Leakage in WiFi CSI-Based Human Action Recognition Using CNNs.

17. Data leakage in deep learning studies of translational EEG.

18. Analisis Yuridis Peristiwa Kebocoran Data Daftar Pemilih Tetap Dalam Penyelenggaraan Pemilihan Umum Tahun 2024.

19. Survey on Effective Disposal of E-Waste to Prevent Data Leakage.

20. Cracking the black box of deep sequence-based protein–protein interaction prediction.

21. Sentiment Clustering: A Hybrid Approach for Insider Threat Detection.

23. Visual Censorship: A Deep Learning-Based Approach to Preventing the Leakage of Confidential Content in Images

24. An Interpretable Approach with Explainable AI for Heart Stroke Prediction.

25. Preventive Legal Protection Against Leaks Consumer Data by Company Negligence Financial Technology.

26. Amenazas emergentes en la computación en la nube: desafíos de seguridad y respuesta.

27. Implementación de medidas de seguridad y principio de conservación de datos según la ley orgánica de protección de datos personales en instituciones públicas de Babahoyo, Ecuador.

29. Data leakage in deep learning studies of translational EEG

30. Carbon Price Forecasting Using Optimized Sliding Window Empirical Wavelet Transform and Gated Recurrent Unit Network to Mitigate Data Leakage

31. Exposing Data Leakage in Wi-Fi CSI-Based Human Action Recognition: A Critical Analysis

32. Enhancing Monitoring Performance: A Microservices Approach to Monitoring with Spyware Techniques and Prediction Models

34. Review on the Static Analysis Techniques Used for Privacy Leakage Detection in Android Apps

35. How You Split Matters: Data Leakage and Subject Characteristics Studies in Longitudinal Brain MRI Analysis

36. Privacy and Ethical Considerations of Smart Environments: A Philosophical Approach on Smart Meters

39. Cloud leakage in higher education in South Africa: A case of University of Technology

40. DockerChannel: A framework for evaluating information leakages of Docker containers

41. Enhancing Brain Tumor Segmentation Accuracy through Scalable Federated Learning with Advanced Data Privacy and Security Measures.

42. Obfuscating the Dataset: Impacts and Applications.

43. A critical link in the cybersecurity system.

44. A smart access control mechanism based on user preference in online social networks.

47. Exploiting machine learning methods with monthly routine milk recording data and climatic information to predict subclinical mastitis in Italian Mediterranean buffaloes

48. Critical Analysis of Data Leakage in WiFi CSI-Based Human Action Recognition Using CNNs

49. Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer

50. A blockchain‐based privacy‐preserving advertising attribution architecture: Requirements, design, and a prototype implementation.

Catalog

Books, media, physical & digital resources