Pages
- 1
- 2
- document
-
Zhou, Junwei (author), Lei, Botian (author), Lang, Huile (author), Panaousis, Emmanouil (author), Liang, K. (author), Xiang, Jianwen (author)Genotype imputation estimates missing genotypes from the haplotype or genotype reference panel in individual genetic sequences, which boosts the potential of genome-wide association and is essential in genetic data analysis. However, the genetic sequences involve people's privacy, confirming an individual's identification and even disease...journal article 2023
- document
-
Fernandes, Maria (author), Decouchant, J.E.A.P. (author), Couto, Francisco M. (author)DNA computing is an emerging field that aims at enabling more efficient data storage and processing. One principle of DNA computing is to encode some information (e.g., image, video, programming scripts) into a digital DNA-like sequence and then synthesize the corresponding DNA molecule. Synthesizing this molecule using digital or real human...book chapter 2023
- document
-
Karahan, Asli (author)Healthcare recommender systems emerged to help patients make better decisions for their health, leveraging the vast amount of data and patient experience. One type of this system focuses on recommending the most appropriate physician based on previous patient feedback in the form of ratings. Such advice can be challenging to generate for new...master thesis 2022
- document
-
Memar Zahedani, Armin (author)Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auctioneer aggregates the offers into demand and supply curves to...master thesis 2022
- document
-
Jehee, Wouter (author)Federated learning (FL), although a major privacy improvement over centralized learning, is still vulnerable to privacy leaks. The research presented in this paper provides an analysis of the threats to FL Generative Adversarial Networks. Furthermore, an implementation is provided to better protect the data of the participants with Trusted...bachelor thesis 2022
- document
-
Hendrikx, Roemer (author)In the past 8 years, Bitcoin has dominated the cryptocurrency markets and drawn attention from academia, developers and legislators alike. Bitcoin has been praised for its impact on decentralizing trust and currencies but also criticized for its volatility and energy-inefficient consensus mechanism. To improve its limitations, in 2016, payment...master thesis 2022
- document
-
Xu, Weitao (author), Xue, Wanli (author), Lin, Qi (author), Lan, G. (author), Feng, Xingyu (author), Wei, Bo (author), Luo, Chengwen (author), Li, Wei (author), Zomaya, Albert Y. (author)Smart space has emerged as a new paradigm that combines sensing, communication, and artificial intelligence technologies to offer various customized services. A fundamental requirement of these services is person identification. Although a variety of person-identification approaches has been proposed, they suffer from several limitations in...journal article 2022
- document
-
Ahvanooey, Milad Taleby (author), Zhu, Mark Xuefang (author), Mazurczyk, Wojciech (author), Li, Qianmu (author), Kilger, Max (author), Choo, Kim Kwang Raymond (author), Conti, M. (author)While encryption can prevent unauthorized access to a secret message, it does not provide undetectability of covert communications over the public network. Implementing a highly latent data exchange, especially with low eavesdropping/discovery probability, is challenging for practical scenarios, such as social and political movements in...journal article 2022
- document
-
Zare Oskouei, Morteza (author), Mehrjerdi, Hasan (author), Babazadeh, Davood (author), Teimourzadeh Baboli, Payam (author), Becker, Christian (author), Palensky, P. (author)As an achievement of innovations resulting from partitioning mechanisms, these mechanisms can contribute to the more flexible operation of power systems in local communities. The ever-increasing frequency and severity of unexpected real-time failures have created challenges for partitioned-based power system operators, affecting each...journal article 2022
- document
-
Kester, David (author), Li, T. (author), Erkin, Z. (author)There is an increase in interest and necessity for an interoperable and efficient railway network across Europe, creating a key distribution problem between train and trackside entities’ key management centres (KMC). Train and trackside entities establish a secure session using symmetric keys (KMAC) loaded beforehand by their respective KMC...conference paper 2022
- document
-
Bay, Asli (author), Erkin, Z. (author), Hoepman, Jaap Henk (author), Samardjiska, Simona (author), Vos, Jelle (author)Privacy-preserving techniques for processing sets of information have attracted the research community's attention in recent years due to society's increasing dependency on the availability of data at any time. One of the fundamental problems in set operations is known as Private Set Intersection (PSI). The problem requires two parties to...journal article 2022
- document
-
Wiemers, Marina (author)With recent advances in performance and complexity, multi-party computation, a privacy-preserving technology which allows for joint processing of hidden input data, has lately been found to be applicable in a number of use cases. Despite existing implementations for secure data aggregation, substantial adoptions of the technology remain limited...bachelor thesis 2021
- document
-
Tĩtu, Andrei (author)Federated learning (FL) is a new paradigm that allows several parties to train a model together without sharing their proprietary data. This paper investigates vertical federated learning, which addresses scenarios in which collaborating organizations own data from the same set of users but with differing features. The survey provides an...bachelor thesis 2021
- document
-
Zagorac, Ivor (author)The continuous generation of a large volume of health data from different sources has led to healthcare being a data-intensive domain. To achieve innovative advances in medical treatment procedures and to provide personalized healthcare services to the patients this data needs to be shared among different medical facilities. However, because...bachelor thesis 2021
- document
-
Joshi, Ayush (author)Supply chains are vital to the global economy, and so, increasing efficiency in supply chain management is of utmost importance. Modernizing technology has allowed for various uses of machine learning to be possible in several aspects of supply chains, specifically in demand forecasting with prediction models, and customer relations with chat...bachelor thesis 2021
- document
-
Soos, Márton (author)Federated Learning (FL)[1] is a type of distributed machine learning that allows the owners of the training data to preserve their privacy while still be- ing able to collectively train a model. FL is a new area in research and several chal- lenges reagarding privacy and communication cost still need to be overcome. Gradient leakage[1], for...bachelor thesis 2021
- document
-
Mînea, Robert (author)Privacy in today's world is a very important topic and all the more important when sizeable amounts of data are needed in Neural Network processing models. Federated Learning is a technique which aims to decentralize the training process in order to allow the clients to maintain their privacy, while also contributing to a broader learning...bachelor thesis 2021
- document
-
Filip, Eduard (author)Federated Learning starts to give a new perspective regarding the applicability of machine learning in real-life scenarios. Its main goal is to train the model while keeping the participants' data in their devices, thus guaranteeing the privacy of their data. One of the main architectures is the Horizontal Federated Learning, which is the most...bachelor thesis 2021
- document
-
Koster, Martin (author)In practice, many applications like traffic monitoring and smart grids rely on computing functions on privacy-sensitive data. In order to protect privacy-sensitive data and still keep the ability to compute any arbitrary function, multi-functional privacy-preserving data aggregation schemes have been created. These schemes, however, can be...master thesis 2021
- document
-
Minnema, Harm (author)Data is becoming more important because of the increased possibilities of analysis and the increase in possibilities of data sharing. Multi-party Computation or MPC is a privacy-preserving technology that enables anonymous data sharing between companies. This thesis identified quantifiable aspects of economic impact such as legal costs and...master thesis 2021
Pages
- 1
- 2