Searched for: subject%253A%2522Privacy%2522
(1 - 20 of 132)

Pages

document
van Gend, Thijmen (author)
Privacy-enhancing technologies (PETs) have historically been used for safeguarding individual privacy from both public and private interference. But lately, tech companies have started using PETs as one instrument for the expansion of their power over different actors, as appears to be unfolding in the case of Amazon’s Sidewalk service: a United...
master thesis 2024
document
Kouwenhoven, Robin (author)
Foremost among the challenges of the Bitcoin blockchain is the scalability bottleneck. To address this issue, the Lightning Network, a payment channel network, was created. Lightning is a payment channel network that is source-routed and uses onion routing, like Tor. However, unlike Tor, the routing path is determined by optimizing a cost...
master thesis 2024
document
Out, Annabelle (author)
This project explores the prospects for interior design in a dual purpose train that can run both day and night for improved utilization and comfort.<br/><br/>Contemporary trains are categorized as either exclusively for daytime or nighttime use. Their interiors limit them to specific temporal contexts. For instance, in daytime trains,...
master thesis 2024
document
Bestebreur, Timon (author)
The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic is handled. Researchers have proposed an extension to the internet,...
master thesis 2024
document
Van Opstal, Quinten (author)
Federated learning provides a lot of opportunities, especially with the built-in privacy considerations. There is however one attack that might compromise the utility of federated learning: backdoor attacks [14]. There are already some existing defenses, like flame [13] but they are computationally expensive [14]. This paper evaluates a version...
bachelor thesis 2024
document
Ghasia, Zahra (author)
The use of Electronic Health Records (EHRs) has seen a breakthrough in clinical research for personalized treatments (Hamburg &amp; Collins, 2010.) Despite the potential advantages of vast EHR data available, constraints of privacy and legislation hinder its use (Rieke et al., 2020.) Health data exists in an interconnected healthcare system ...
master thesis 2024
document
Li, Martin (author)
In recent years, the rapid advancements in big data, machine learning, and artificial intelligence have led to a corresponding rise in privacy concerns. One of the solutions to address these concerns is federated learning. In this thesis, we will look at the setting of vertical federated learning based on tree models. We have built a system that...
master thesis 2024
document
Spanninga, Paulien (author)
In recent years, the medical world has seen rapid digitalisation. Digitalisation of healthcare and the opportunities of remote monitoring can help to keep the healthcare system affordable and accessible. A promising application of remote monitoring is the use of consumer-grade wearables for clinical care. However, vulnerabilities leave consumer...
master thesis 2023
document
van Assen, Jorrit (author)
Recent developments in the capability and availability of small internet of things devices has meant that networked medical devices, like networked implants and wearable monitors, have become more widespread. This data is invaluable for solving pressing global healthcare concerns, like eectively monitoring and treating heart patients. The...
master thesis 2023
document
Humblet Vertongen, Marie (author)
Face recognition using lidar presents challenges arising from high dimensionality and data sparsity, especially at longer distances. This paper proposes a novel approach for face recognition via automotive lidar. The approach leverages a combination of deep learning and point cloud processing techniques. After identification of the facial point...
master thesis 2023
document
Kroskinski, Ivo (author)
Organizations use cloud service providers for outsourcing their data, since this includes advantages such as: scalability, security and no need for in house experts. Therefore, outsourcing data to cloud providers results in reduced costs. <br/>The disadvantage of outsourcing data to a cloud provider, is that organizations are not in control of...
master thesis 2023
document
Trap, Cyril (author)
Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it...
master thesis 2023
document
Samardžić, Mariana (author)
The Machine Learning (ML) technology has taken the world by storm since it equipped the machines with previously unimaginable decision-making capabilities. However, building powerful ML models is not an easy task, but the demand for their utilization in different industries and areas of expertise is high. This was recognized by entities that...
master thesis 2023
document
Geadău, Andrei (author)
Cloud computing and storage solutions have been credited with increasing competitiveness through cost savings, greater flexibility, elasticity and optimal resource allocation. However, the data outsourced to the cloud may contain private information that must be protected from misuse. In such cases, the data can only be outsourced after...
master thesis 2023
document
Yu, Wenrui (author)
Privacy concerns in federated learning have attracted considerable attention recently. In centralized networks, it has been observed that even without directly exchanging raw training data, the exchange of other so-called intermediate parameters such as weights/gradients can still potentially reveal private information. However, there has been...
master thesis 2023
document
van Groeningen, Boris (author)
CNAME (Canonical Name) cloaking has emerged as a deceptive technique employed by website operators to obfuscate the true origin of their content. This master thesis aims to comprehensively examine the utilization and prevalence of CNAME cloaking across the web.<br/><br/>To achieve this, a custom program was developed to crawl websites and gather...
master thesis 2023
document
Liang, C. (author)
Caring for the elderly has always been a topic of great discussion. Demographic changes in an aging society have resulted in the growing phenomenon of the Sandwich Generation. The middle-aged generation cares for their aging parents and children and is usually one of the groups providing informal care. The burden of caregiving gradually harms...
master thesis 2023
document
Mercier, Arthur (author)
Reconstructing seen images from functional magnetic resonance imaging (fMRI) brain scans has been a growing topic of interest in the field of neuroscience, fostered by innovation in machine learning and AI. This paper investigates the possible presence of personal features allowing the identification of subjects from their reconstructed images....
bachelor thesis 2023
document
Walter, Thomas (author)
This paper explores using synthetic noise superimposed on fMRI data to selectively impact the performance of the Generic Object Decoding (GOD) model developed at Kamitani Lab. The GOD model predicts image categories that subjects viewed, based on their recorded fMRI brain activity. To evaluate how selective the noise can be in impacting...
bachelor thesis 2023
document
Kafedjian, Ivana (author)
Overpollution with plastic waste is becoming a leading concern globally, but even more so at island destinations popular among tourists. Tourists generate 3 times more waste than local residents, overuse local resources, and often lead to a change of the identity of the location (the so-called “disneyfication”). This project combines the topics...
master thesis 2023
Searched for: subject%253A%2522Privacy%2522
(1 - 20 of 132)

Pages