Searched for: contributor%3A%22Lagendijk%2C+R.L.+%28promotor%29%22
(1 - 20 of 38)

Pages

document
Xu, J. (author)
Deep Neural Networks (DNNs) have found extensive applications across diverse fields, such as image classification, speech recognition, and natural language processing. However, their susceptibility to various adversarial attacks, notably the backdoor attack, has repeatedly been demonstrated in recent years. <br/>The backdoor attack aims to...
doctoral thesis 2025
document
Wang, R. (author)
Federated Learning (FL) is a revolutionary approach to machine learning that enables collaborative model training among multiple parties without exposing sensitive data. Introduced by Google in 2016, FL taps into the wealth of data generated by edge devices while prioritizing user privacy and minimizing communication costs. Its applications span...
doctoral thesis 2024
document
Li, H. (author)
Electronic devices have permeated into all aspects of our lives, from basic smart cards to sophisticated hybrid automobile systems. These devices comprise a range of products like sensors, wearable gadgets, mobile phones, personal computers, and others, playing vital roles in many applications and enabling the Internet of Things (IoT). However,...
doctoral thesis 2024
document
Nadeem, A. (author)
Understanding the behavior of cyber adversaries provides threat intelligence to security practitioners, and improves the cyber readiness of an organization. With the rapidly evolving threat landscape, data-driven solutions are becoming essential for automatically extracting behavioral patterns from data that are otherwise too time-consuming to...
doctoral thesis 2024
document
Wu, L. (author)
For almost three decades, side-channel analysis has represented a realistic and severe threat to embedded devices' security. As a well-known and influential class of implementation attacks, side-channel analysis has been applied against cryptographic implementations, processors, communication systems, and, more recently, machine learning models....
doctoral thesis 2023
document
Oosthoek, K. (author)
Cybercrime is negatively impacting everybody. In recent years cybercriminal activity has directly affected individuals, companies, governments and critical infrastructure. It has led to significant financial damage, impeded critical infrastructure and harmed human lives. Defending against cybercrime is difficult, as persistent actors perpetually...
doctoral thesis 2023
document
Griffioen, H.J. (author)
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together with the rise of premade tools to perform exploits, the number of cyber incidents grows rapidly each year. Defending against these threats becomes increasingly difficult as organizations depend heavily on the Internet and have many different...
doctoral thesis 2022
document
Ersoy, O. (author)
Bitcoin is a widely acknowledged digital currency that is designed in a decentralized manner. The recognition of Bitcoin has introduced the notion of cryptocurrencies and, in general, blockchain technology. Blockchain, within less than a decade, has become one of the most exciting technological developments. Among several exciting use cases and...
doctoral thesis 2021
document
Roeling, M.P. (author)
This thesis presents several methodological and statistical solutions to problems encountered in cyber security. We investigated the effects of compromised data veracity in state estimators and fraud detection systems, a model to impute missing data in attributes of linked observations, and an unsupervised approach to detect infected machines in...
doctoral thesis 2021
document
Ugwuoke, C.I. (author)
The genome is the blueprint of life and has a detailed genotype and phenotype description of any organism. This in itself attributes sensitivity to genetic data, be it in the biological or electronic format. The possibility of sequencing the genome has opened doors to further probing of the data in its electronic form. Post sequencing of the...
doctoral thesis 2021
document
Tillem, G. (author)
The enhancements in computation technologies in the last decades enabled businesses to analyze the data that is collected through their systems which helps to improve their services.<br/>However, performing data analytics remains a challenging task for small- and medium-scale companies due to the lack of in-house experience and computational...
doctoral thesis 2020
document
Nateghizad, M. (author)
In order to achieve practical e-healthcare systems, five requirements should be addressed, namely 1) availability, 2) integrity, 3) accuracy, 4) confidentiality, and 5) efficiency. Using remote computer storage and processing services satisfies availability, integrity, and efficiency. However, it introduces privacy concerns regarding the leakage...
doctoral thesis 2019
document
Zeng, Y. (author)
In digital speech communication applications like hands-free mobile telephony, hearing aids and human-to-computer communication systems, the recorded speech signals are typically corrupted by background noise. As a result, their quality and intelligibility can get severely degraded. Traditional noise reduction approaches process signals recorded...
doctoral thesis 2015
document
Martínez Castañeda, J.A. (author)
The "telephone'' model has been, for the last one hundred thirty years, the base of modern telecommunications with virtually no changes in its fundamental concept. The arise of smaller and more powerful computing devices have opened new possibilities. For example, to build systems able to give to the user the illusion of being talking to the...
doctoral thesis 2013
document
Yang, L. (author)
doctoral thesis 2013
document
Shi, Y. (author)
In this thesis we report the results of our research on recommender systems, which addresses some of the critical scientific challenges that still remain open in this domain. Collaborative filtering (CF) is the most common technique of predicting the interests of a user by collecting preference information from many users. In order to determine...
doctoral thesis 2013
document
Rudinac, S. (author)
To facilitate finding of relevant information in ever-growing multimedia collections, a number of multimedia information retrieval solutions have been proposed over the past years. The essential element of any such solution is the relevance criterion deployed to select or rank the items from a multimedia collection to be presented to the user....
doctoral thesis 2013
document
Taal, C.H. (author)
In digital speech-communication systems like mobile phones, public address systems and hearing aids, conveying the message is one of the most important goals. This can be challenging since the intelligibility of the speech may be harmed at various stages before, during and after the transmission process from sender to receiver. Causes which...
doctoral thesis 2013
document
Gedrojc, B. (author)
The objective of this thesis is to preserve privacy for the user while untrustworthy proxies are involved in the communication and computation i.e. private computing. A basic example of private computing is an access control system (proxy) which grants access (or not) to users based on fingerprints. For privacy reasons the user does not want to...
doctoral thesis 2011
document
Doets, P.J.O. (author)
An audio fingerprint is a compact low-level representation of a multimedia signal. An audio fingerprint can be used to identify audio files or fragments in a reliable way. The use of audio fingerprints for identification consists of two phases. In the enrollment phase known content is fingerprinted, and ingested into a database, together with...
doctoral thesis 2010
Searched for: contributor%3A%22Lagendijk%2C+R.L.+%28promotor%29%22
(1 - 20 of 38)

Pages