Searched for: subject%3A%22Privacy%22
(1 - 20 of 201)

Pages

document
Vunderink, Pepijn (author)
With widespread use of advanced technology for the recording, storing and sharing of social interactions, protecting privacy of people has been a growing concern. This paper zooms in on the collection of spoken audio with regard for the privacy of recorded individuals. Recently efforts have been made to collect audio at a low sampling rate to...
bachelor thesis 2022
document
Jehee, Wouter (author)
Federated learning (FL), although a major privacy improvement over centralized learning, is still vulnerable to privacy leaks. The research presented in this paper provides an analysis of the threats to FL Generative Adversarial Networks. Furthermore, an implementation is provided to better protect the data of the participants with Trusted...
bachelor thesis 2022
document
Schram, Gregor (author)
Machine learning has been applied to almost all fields of computer science over the past decades. The introduction of GANs allowed for new possibilities in fields of medical research and text prediction. However, these new fields work with ever more privacy-sensitive data. In order to maintain user privacy, a combination of federated learning,...
bachelor thesis 2022
document
Colenberg, Susanne (author), Romero Herrera, Natalia (author), Keyson, David (author)
Background and aim - Lack of privacy is a prominent issue in contemporary offices. This study aimed to identify interior design features that jointly influence satisfaction with privacy and noise in the office workspace, and estimate their predictive power. This knowledge can inform strategic workplace design. Methods - Eight design features...
conference paper 2022
document
Oudejans, Daan (author)
Data compliance is essential for ensuring that organizations do not run afoul of data protection and privacy legislation. Geographically distributed data is an especially relevant topic because of recent developments in cross-border data protection agreements between the United States and the European Union. We introduce Qompliance, a novel...
master thesis 2022
document
van den Boogert, Mirjam (author)
In 2050, it is expected that 70% of the world’s population will live in cities (Jin et al., 2014), leading to increasing congestion in and surrounding cities. This will raise new challenges, requiring more efficient and interactive cities. A novel paradigm contributing to these so-called smart cities is participatory sensing. Also known as...
master thesis 2022
document
Hendrikx, Roemer (author)
In the past 8 years, Bitcoin has dominated the cryptocurrency markets and drawn attention from academia, developers and legislators alike. Bitcoin has been praised for its impact on decentralizing trust and currencies but also criticized for its volatility and energy-inefficient consensus mechanism. To improve its limitations, in 2016, payment...
master thesis 2022
document
Li, Qiongxiu (author), Heusdens, R. (author), Christensen, M.T. (author)
Privacy issues and communication cost are both major concerns in distributed optimization in networks. There is often a trade-off between them because the encryption methods used for privacy-preservation often require expensive communication overhead. To address these issues, we, in this paper, propose a quantization-based approach to achieve...
journal article 2022
document
Bay, Asli (author), Erkin, Z. (author), Hoepman, Jaap Henk (author), Samardjiska, Simona (author), Vos, J.J.H. (author)
Privacy-preserving techniques for processing sets of information have attracted the research community's attention in recent years due to society's increasing dependency on the availability of data at any time. One of the fundamental problems in set operations is known as Private Set Intersection (PSI). The problem requires two parties to...
journal article 2022
document
Kirli, Desen (author), Couraud, Benoit (author), Robu, Valentin (author), Salgado-Bravo, Marcelo (author), Norbu, Sonam (author), Andoni, Merlinda (author), Antonopoulos, Ioannis (author), Negrete-Pincetic, Matias (author), Flynn, David (author), Kiprakis, Aristides (author)
Given the ongoing transition towards a more decentralised and adaptive energy system, the potential of blockchain-enabled smart contracts for the energy sector is being increasingly recognised. Due to their self-executing, customisable and tamper-proof nature, they are seen as a key technology for enabling the transition to a more efficient,...
review 2022
document
Li, T. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service. Information leakage during transportation is an important reason for theft since thieves can identify which truck is...
journal article 2022
document
Zare Oskouei, Morteza (author), Mehrjerdi, Hasan (author), Babazadeh, Davood (author), Teimourzadeh Baboli, Payam (author), Becker, Christian (author), Palensky, P. (author)
As an achievement of innovations resulting from partitioning mechanisms, these mechanisms can contribute to the more flexible operation of power systems in local communities. The ever-increasing frequency and severity of unexpected real-time failures have created challenges for partitioned-based power system operators, affecting each...
journal article 2022
document
Cardaioli, Matteo (author), Conti, M. (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Ideally, secure user sessions should start and end with authentication and de-Authentication phases, respectively. While the user must pass the former to start a secure session, the latter's importance is often ignored or underestimated. Dangling or unattended sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, the...
conference paper 2022
document
He, Daojing (author), Du, Runmeng (author), Zhu, Shanshan (author), Zhang, Min (author), Liang, K. (author), Chan, Sammy (author)
Data island effectively blocks the practical application of machine learning. To meet this challenge, a new framework known as federated learning was created. It allows model training on a large amount of scattered data owned by different data providers. This article presents a parallel solution for computing logistic regression based on...
journal article 2022
document
Somai, Ashay (author)
This thesis looks at how to characterize weaknesses in machine learning models that are used for detecting privacy-sensitive data in images with the help of crowdsourcing. Before we can come up with a method to achieve a goal, we first need to make clear what we consider privacy-sensitive data. We took the General Data Protection Regulation ...
master thesis 2021
document
Băbeanu, Alexandru (author)
Online advertisement is a multi-billion dollar industry that constitutes a primary source of income for most publishers offering free content on the Web. Online behavioural advertisement refers to the practice of serving targeted ads to online users based on their potential interests. In order to infer these interests, online advertisers...
master thesis 2021
document
von Hünerbein, Anton (author)
The world is getting more and more censored, and the currently available solutions work but with high latency costs. We proposed Ethix, a low latency general-purpose architecture with differential privacy, low network overhead and high theoretical censorship evasion. The Ethix system is a hybrid VPN architecture that uses both centrally...
master thesis 2021
document
Heijligers, Jaap (author)
Tor is the most popular tool for anonymous online communication. However, the performance of Tor's volunteer-run network is suboptimal when network congestion occurs. Within Tor, many connections are multiplexed over a single TCP connection between relays, which causes a head-of-line blocking problem, degrading relay performance. In this thesis,...
master thesis 2021
document
Cao, Qingyuan (author)
This project is dedicated to implementing an unsupervised learning clustering method system for processing big data applied in Intel SGX. Intel SGX is a technology developed to meet the needs of the trusted computing industry similarly to ARM TrustZone, but this time for desktop and server platforms. It is a set of safety-related instruction...
master thesis 2021
document
Ahmed, Adeeb (author)
Ultra-Wideband (UWB) technology became unregulated within the EU in 2007. Most recently, it was integrated into mobile phones in 2019, notably Apply and Samsung adding it to all their newer models. While UWB is characterised as a radio technology with any signal above 500 MHz, it operates within the 6-9 GHz<br/>range in mobile phones. This...
student report 2021
Searched for: subject%3A%22Privacy%22
(1 - 20 of 201)

Pages