Searched for: subject%3A%22Secure%255C+multi%255C-party%255C+computation%22
(1 - 9 of 9)
document
Romanov, Danila (author)
Despite evidence that collaborating in the supply chain can reduce inefficiency and result in mutual gain, parties do not wish to collaborate if they have to share their private proprietary information. The main reason for their privacy concern is that the party does not want to lose their competitive advantage by giving away company secrets....
bachelor thesis 2021
document
Erkin, Z. (author)
Recent advances in technology provided a suitable environment for the people in which they can benefit from online services in their daily lives. Despite several advantages, online services also constitute serious privacy risks for their users as the main input to algorithms are privacy sensitive such as demographic information, shopping...
doctoral thesis 2010
document
van Tetering, Daphne (author)
The convenient service offered by credit cards and the technological advances in e-commerce have caused the number of online payment transactions to increase daily. With this rising number, the opportunity for fraudsters to obtain cardholder details via online credit card fraud has also increased. As a result, according to the European Central...
master thesis 2021
document
van der Ende, Dieuwke (author)
Decision-tree evaluation is a widely-used classification approach known for its simplicity and effectiveness. Decision-tree models are shown to be helpful in classifying instances of fraud, malware, or diseases and can be used to make dynamic, flexible access decisions within an access-control system. These applications often require sensitive...
master thesis 2021
document
Lam, Julia (author)
EU banks have a dual obligation to generate and protect assets as a due diligence for their customers, their business longevity, and in accordance with regulatory bodies. The effective use of data presents opportunities for banks to meet their obligations in improving financial risk and also ensuring business growth and continuity in their...
master thesis 2020
document
Tian, Yuhang (author)
In this work, we propose FLVoogd, an updated federated learning method in which servers and clients collaboratively eliminate Byzantine attacks while preserving privacy. In particular, servers use automatic Density-based Spatial Clustering of Applications with Noise (DBSCAN) combined with S2PC to cluster the benign majority without acquiring...
master thesis 2022
document
Dolci, Riccardo (author)
Practical problem: In today's digitally transformed and connected world, data has become a critical strategic corporate resource. In this context, data marketplaces are becoming more popular since they enable wider accessibility and more efficient interaction among companies. Despite this, there are several barriers in sharing data through this...
master thesis 2020
document
Shankar, Aditya (author)
Vertical federated learning’s (VFL) immense potential for time series forecasting in industrial applications such as predictive maintenance and machine control remains untapped. Critical challenges to be addressed in the manufacturing industry include small and noisy datasets, model explainability, and stringent privacy requirements for training...
master thesis 2023
document
Mălan, Abel (author)
Effective large-scale process optimization in manufacturing industries requires close cooperation between different parties of human experts who encode their knowledge of related domains as Bayesian network models. For example, parties in the steel industry must collaboratively use their Bayesian networks on process parameters at the maker,...
master thesis 2023
Searched for: subject%3A%22Secure%255C+multi%255C-party%255C+computation%22
(1 - 9 of 9)