Articles with "information leakage" as a keyword



Photo by alterego_swiss from unsplash

An Integrated Management Model for Avoiding Customer Information Leakage in China’s Housing Markets

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of the Knowledge Economy"

DOI: 10.1007/s13132-017-0476-y

Abstract: Along with China’s housing boom, customer information leakage becomes a serious problem. To seek solutions, authors proposed a novel management framework based on theoretical analysis and literature review. Furthermore, questionnaires with items about customer information… read more here.

Keywords: management; information; information leakage; customer information ... See more keywords
Photo from wikipedia

Method for Evaluating Digital Video Electromagnetic Information Leakage from Video Cable

Sign Up to like & get
recommendations!
Published in 2021 at "Chinese Journal of Electronics"

DOI: 10.1049/cje.2021.07.009

Abstract: Electromagnetic emissions from electrical information equipment may contain useful information and lead to information leakage. In order to detect the electromagnetic information leakage of digital video cable, a rapid testing method for computer video information… read more here.

Keywords: video; information; cable; electromagnetic information ... See more keywords
Photo from wikipedia

Quantitative analysis of information leakage in service-oriented architecture-based Web services

Sign Up to like & get
recommendations!
Published in 2017 at "Kybernetes"

DOI: 10.1108/k-07-2016-0178

Abstract: Purpose Any computing architecture cannot be designed with complete confidentiality. As a result, at any point, it may leak the information. So, it is important to decide leakage threshold in any computing architecture. To prevent… read more here.

Keywords: information; leakage; web services; based web ... See more keywords
Photo from wikipedia

Name Filter: A Countermeasure Against Information Leakage Attacks in Named Data Networking

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2877792

Abstract: Named data networking (NDN) has emerged as a future networking architecture having the potential to replace the Internet. In order to do so, the NDN needs to cope with inherent problems of the Internet, such… read more here.

Keywords: information; named data; leakage; data networking ... See more keywords
Photo by dtopkin1 from unsplash

GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2019.2897874

Abstract: By learning generative models of semantic-rich data distributions from samples, generative adversarial network (GAN) has recently attracted intensive research interests due to its excellent empirical performance as a generative model. The model is used to… read more here.

Keywords: gan; differential privacy; information leakage; privacy ... See more keywords
Photo from wikipedia

Research on Online Social Network Information Leakage-Tracking Algorithm Based on Deep Learning

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/1926794

Abstract: The rapid iteration of information technology makes the development of online social networks increasingly rapid, and its corresponding network scale is also increasingly large and complex. The corresponding algorithms to deal with social networks and… read more here.

Keywords: information; article; network; algorithm ... See more keywords
Photo from wikipedia

Developer-Friendly and Computationally Efficient Predictive Modeling without Information Leakage: The emil Package for R

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Statistical Software"

DOI: 10.18637/jss.v085.i13

Abstract: Data driven machine learning for predictive modeling problems (classification, regression, or survival analysis) typically involves a number of steps beginning with data preprocessing and ending with performance evaluation. A large number of packages providing tools… read more here.

Keywords: package; evaluation; performance; information leakage ... See more keywords