Searched for: subject%3A%22privacy%22
(1 - 20 of 302)

Pages

document
Xu, J. (author)
Deep Neural Networks (DNNs) have found extensive applications across diverse fields, such as image classification, speech recognition, and natural language processing. However, their susceptibility to various adversarial attacks, notably the backdoor attack, has repeatedly been demonstrated in recent years. <br/>The backdoor attack aims to...
doctoral thesis 2025
document
Slokom, M. (author)
In the field of machine learning (ML), the goal is to leverage algorithmic models to generate predictions, transforming raw input data into valuable insights. However, the ML pipeline, consisting of input data, models, and output data, is susceptible to various vulnerabilities and attacks. These attacks include re-identification, attribute...
doctoral thesis 2024
document
Wang, R. (author)
Federated Learning (FL) is a revolutionary approach to machine learning that enables collaborative model training among multiple parties without exposing sensitive data. Introduced by Google in 2016, FL taps into the wealth of data generated by edge devices while prioritizing user privacy and minimizing communication costs. Its applications span...
doctoral thesis 2024
document
Khattat, Mostafa (author)
Threshold signatures play a crucial role in the security of blockchain applications. An efficient threshold signature can be applied to enhance the security of wallets and transactions by enforcing multi-device-based authentication, as this requires adversaries to compromise more devices to recover the key. Additionally, threshold signatures can...
master thesis 2024
document
Stokkink, Q.A. (author)
The digital world is evolving toward representing - and serving the interconnection of - natural persons. Instead of depending on the intrastructure of Big Tech companies and governments, users can cooperate and use their hardware to form public infrastructure. Instead of existing by virtue of a reference in some institution's database, users...
doctoral thesis 2024
document
van der Wel, Iris (author)
Data-driven health research, specifically the development of AI models, is hampered by poor data availability and associated administrative burdens, caused complex and fragmented data protection regulation. To reap the benefits of using high quality health data, while safeguarding data protection of patients, the synthetic data generation is...
master thesis 2024
document
van Gend, Thijmen (author)
Privacy-enhancing technologies (PETs) have historically been used for safeguarding individual privacy from both public and private interference. But lately, tech companies have started using PETs as one instrument for the expansion of their power over different actors, as appears to be unfolding in the case of Amazon’s Sidewalk service: a United...
master thesis 2024
document
Coggins, T.N. (author)
In the introduction of this thesis, I contend that robot ethics, as a research field, generally treats privacy as the appropriate distribution of information, and therefore overlooks privacy concerns raised by robots beyond this conceptualization’s purview. I illustrate this contention by evaluating a hypothetical case involving a household...
doctoral thesis 2024
document
Kouwenhoven, Robin (author)
Foremost among the challenges of the Bitcoin blockchain is the scalability bottleneck. To address this issue, the Lightning Network, a payment channel network, was created. Lightning is a payment channel network that is source-routed and uses onion routing, like Tor. However, unlike Tor, the routing path is determined by optimizing a cost...
master thesis 2024
document
Out, Annabelle (author)
This project explores the prospects for interior design in a dual purpose train that can run both day and night for improved utilization and comfort.<br/><br/>Contemporary trains are categorized as either exclusively for daytime or nighttime use. Their interiors limit them to specific temporal contexts. For instance, in daytime trains,...
master thesis 2024
document
Bestebreur, Timon (author)
The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic is handled. Researchers have proposed an extension to the internet,...
master thesis 2024
document
Van Opstal, Quinten (author)
Federated learning provides a lot of opportunities, especially with the built-in privacy considerations. There is however one attack that might compromise the utility of federated learning: backdoor attacks [14]. There are already some existing defenses, like flame [13] but they are computationally expensive [14]. This paper evaluates a version...
bachelor thesis 2024
document
Ghasia, Zahra (author)
The use of Electronic Health Records (EHRs) has seen a breakthrough in clinical research for personalized treatments (Hamburg &amp; Collins, 2010.) Despite the potential advantages of vast EHR data available, constraints of privacy and legislation hinder its use (Rieke et al., 2020.) Health data exists in an interconnected healthcare system ...
master thesis 2024
document
Li, Martin (author)
In recent years, the rapid advancements in big data, machine learning, and artificial intelligence have led to a corresponding rise in privacy concerns. One of the solutions to address these concerns is federated learning. In this thesis, we will look at the setting of vertical federated learning based on tree models. We have built a system that...
master thesis 2024
document
Li, Qiongxiu (author), Gundersen, Jaron Skovsted (author), Lopuhaa-Zwakenberg, Milan (author), Heusdens, R. (author)
Privacy-preserving distributed average consensus has received significant attention recently due to its wide applicability. Based on the achieved performances, existing approaches can be broadly classified into perfect accuracy-prioritized approaches such as secure multiparty computation (SMPC), and worst-case privacy-prioritized approaches...
journal article 2024
document
Musick, Geoff (author), Duan, Wen (author), Najafian, S. (author), Sengupta, Subhasree (author), Flathmann, Christopher (author), Knijnenburg, Bart (author), McNeese, Nathan (author)
Newly-formed teams often encounter the challenge of members coming together to collaborate on a project without prior knowledge of each other’s working and communication styles. This lack of familiarity can lead to conflicts and misunderstandings, hindering effective teamwork. Derived from research in social recommender systems, team...
journal article 2024
document
Li, Meng (author), Shen, Yanzhe (author), Ye, Guixin (author), He, Jialing (author), Zheng, Xin (author), Zhang, Zijian (author), Zhu, Liehuang (author), Conti, M. (author)
Digital forensics is crucial to fight crimes around the world. Decentralized Digital Forensics (DDF) promotes it to another level by channeling the power of blockchain into digital investigations. In this work, we focus on the privacy and security of DDF. Our motivations arise from (1) how to track an anonymous- and-malicious data user who...
journal article 2024
document
Li, T. (author), Xu, L. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
With the fast development of e-commerce, there is a higher demand for timely delivery. Logistic companies want to send receivers a more accurate arrival prediction to improve customer satisfaction and lower customer retention costs. One approach is to share (near) real-time location data with recipients, but this also introduces privacy and...
conference paper 2024
document
Grataloup, Albin (author), Jonas, Stefan (author), Meyer, A. (author)
Federated learning has recently emerged as a privacy-preserving distributed machine learning approach. Federated learning enables collaborative training of multiple clients and entire fleets without sharing the involved training datasets. By preserving data privacy, federated learning has the potential to overcome the lack of data sharing in...
review 2024
document
Miller, S.R.M. (author), Bossomaier, Terry (author)
The advent of the Internet, exponential growth in computing power, and rapid developments in artificial intelligence have raised numerous cybersecurity-related ethical questions in various domains. The dual use character of cybertechnology-that it can be used to provide great benefits to humankind but can also do great harm-means that business ...
book 2024
Searched for: subject%3A%22privacy%22
(1 - 20 of 302)

Pages