Articles with "data leakage" as a keyword



Photo by campaign_creators from unsplash

A Novel Mechanism for Fast Detection of Transformed Data Leakage

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2851228

Abstract: Data leakage is a growing insider threat in information security among organizations and individuals. A series of methods has been developed to address the problem of data leakage prevention (DLP). However, large amounts of unstructured… read more here.

Keywords: data leakage; mechanism fast; transformed data; novel mechanism ... See more keywords
Photo from wikipedia

Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2018.2844180

Abstract: Globalization of microchip fabrication opens the possibility for an attacker to insert hardware Trojans into a chip during the manufacturing process. While most defensive methods focus on detection or prevention, a recent method, called Randomized… read more here.

Keywords: division multiplexing; data leakage; time; time division ... See more keywords
Photo by cokdewisnu from unsplash

Leakage Prediction in Machine Learning Models When Using Data from Sports Wearable Sensors

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/5314671

Abstract: One of the major problems in machine learning is data leakage, which can be directly related to adversarial type attacks, raising serious concerns about the validity and reliability of artificial intelligence. Data leakage occurs when… read more here.

Keywords: machine; machine learning; data leakage; prediction machine ... See more keywords