Zobrazeno 1 - 10
of 8 372
pro vyhledávání: '"ComputingMilieux_LEGALASPECTSOFCOMPUTING"'
Autor:
Niels ten Oever
Publikováno v:
Globalizations, 20(1), 184-200. Taylor and Francis Ltd.
This paper explores how a deeply embedded norm can be used to exert power and control in the governance of distributed infrastructures, such as the Internet. Through the lens of norm conflict, I analyse a case of resistance against the introduction o
Autor:
Y. Kasiviswanadham, Ch.V. Bhargavi, Pushpa Priyanka palesetti, K. Kranthi Kumar, D.V.S.N.V. Indira
Publikováno v:
Materials Today: Proceedings. 80:2406-2410
Nowadays criminal activities are growing at an exponential rate. Crime prevention by effective identification of criminals is the main issue before the police and on the other hand, the availability of police officers is inadequate. There are various
Publikováno v:
IEEE Transactions on Pattern Analysis and Machine Intelligence. 44:6122-6139
With substantial amount of time, resources and human (team) efforts invested to explore and develop successful deep neural networks (DNN), there emerges an urgent need to protect these inventions from being illegally copied, redistributed, or abused
Autor:
Qian Wang
Publikováno v:
Computational Intelligence and Neuroscience. 2022:1-7
A security violation is referred to as a personal data breach when it leads to unintentional and unlawful destruction, loss, alteration, unauthorized disclosure, or access to personal data that has been communicated, stored, or otherwise processed in
Autor:
Zhongzong Yan, He Wen
Publikováno v:
IEEE Transactions on Instrumentation and Measurement. 71:1-28
Electricity theft has been a growing concern for the smart grid. It can be defined as illegal customers use energy from electric utilities without a contract or manipulate their meter readings to pay less or not pay electricity bill. Over the past de
Publikováno v:
IEEE Transactions on Services Computing. 15:346-360
While the Internet is open by design, it is still the case that users can be subject to censorship by governments or enterprises in accessing services and data. In this paper we propose SEnD, a fully-distributed censorship circumvention system built
Publikováno v:
IEEE Transactions on Multimedia. 24:3429-3441
Generating falsified faces by artificial intelligence, widely known as DeepFake, attracted attention worldwide since 2017. Given the potential threat brought by this novel technique, forensics researchers dedicated themselves to detect the video forg
Autor:
K. Aldriwish
Publikováno v:
Engineering, Technology & Applied Science Research, Vol 11, Iss 6 (2021)
Internet of Things (IoT) -based systems need to be up to date on cybersecurity threats. The security of IoT networks is challenged by software piracy and malware attacks, and much important information can be stolen and used for cybercrimes. This pap
Autor:
Xianyun Ge
Publikováno v:
Scientific Programming, Vol 2021 (2021)
In recent years, blockchain technology has become a hot topic in various industries. With the development and maturity of blockchain technology, it has been applied to finance, law, etc., with its advantages of decentralization, openness, information
Publikováno v:
IEEE/CAA Journal of Automatica Sinica. 8:1891-1900
Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting. However, the difficulties it introduces into the supervision of the vote counting, as well as its need for a concurrent guara