Skip to main content
TudRepo
  • Research repository
  • Education Repository
  • Cultural Heritage
About · How to search
Search results  
Back

Enabled Filters

  • (-) = Privacy
  • (-) = info:fedora/collection:thesis
  • (-) = master thesis

Subject

  • Crowdsourcing (2)
  • Machine Learning (2)
  • Surveillance (2)
  • 2050 (1)
  • Adversarial Machine Learning (1)
  • Applied Cryptography (1)
  • Applied cryptography (1)
  • Armenia (1)
  • Camping (1)
  • Collaborative Learning (1)
  • Control (1)
  • Cookies (1)
  • Cryptography (1)
  • Cybercrime (1)
  • Data aggregation (1)
  • Discrete Choice Modelling (1)
  • Disgust (1)
  • Dumping (1)
  • Dynamic Traffic Management (1)
  • E-Privacy Directive (1)
  • E-Privacy Regulation (1)
  • Economics of Privacy (1)
  • Explanations (1)
  • Exploratory Analysis (1)
  • Governance (1)
  • Group Recommendation (1)
  • Hierarchical Query Mechanisms (1)
  • Human Waste (1)
  • Hybrid Human-AI Algorithm (1)
  • Hybrid Intelligence (1)
  • Hypergraphs (1)
  • Incentives (1)
  • Inference Attacks (1)
  • Information Security (1)
  • Logistic regression (1)
  • Monitoring (1)
  • Natural Language Processing (1)
  • Network (1)
  • Online Behavioral Advertisement (1)
Show more

Author

  • Dekker (1)
  • Kitkauskas (1)
  • Nasrullah (1)
  • Prahesa Kusuma Setia (1)
  • Prasad (1)
  • Rovers (1)
  • Shriram (1)
  • Somai (1)
  • Turcios Rodriguez (1)
  • Van Bergen (1)
  • de Jong (1)
  • van Tetering (1)
  • van de Kamp (1)
  • van der Meulen (1)
Show more

Date

2009 - 2022
(years)
Specify date range: Show
Format: 2022/05/23
Searched for: +
(1 - 14 of 14)
  • Document type
  • Date sort ascending
List view
Grid view
  • Print
  • Email
  • export CSV
  • export Excel
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Characterising AI Weakness in Detecting Personal Data from Images By Crowds
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Mitigating Inference Attacks in Collaborative Credit Card Fraud Detection using Secure Multi-Party Selection
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Privacy-Preserving Data Aggregation with Probabilistic Range Validation
Do they really value your privacy?
Do they really value your privacy?: An exploratory analysis of what can be learned about companies from their privacy statements
Evaluating  Explanations for different Relationship Strengths
Evaluating Explanations for different Relationship Strengths
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
A Human-Machine Approach to Preserve Privacy in Image Analysis Crowdsourcing Tasks
Road-user participation in vehicle-data sharing systems
Road-user participation in vehicle-data sharing systems: for the purpose of dynamic traffic management
Towards a New Prison
Towards a New Prison: Facilitating the cyber crime threat
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
Tracking Cookies in the European Union, an Empirical Analysis of the Current Situation
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
PRECLUDE: PRivacy-prEserving Collaborative Learning Using a Decentralised Ensemble approach
Surveillance/Intimacy
Surveillance/Intimacy: Shifts in spaces - transformations of realities
Privacy-Preserving Data Aggregation in Peer-to-Peer Network
Privacy-Preserving Data Aggregation in Peer-to-Peer Network: A Multiparty Computation Approach
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
HUMAN WASTE, WHAT A DRAG!: Redesign transporting and the handling of Thetford’s waste-holding tank
Hierarchical Query Mechanisms for Searchable Encrypted Databases
Hierarchical Query Mechanisms for Searchable Encrypted Databases
Searched for: +
(1 - 14 of 14)
  • Document type
  • Date sort ascending
List view
Grid view
  • Print
  • Email
  • export CSV
  • export Excel
  • About
  • Disclaimer
  • Terms of use
  • Hosted repositories
  • Login

Powered by TU Delft Library