Zobrazeno 1 - 10
of 856
pro vyhledávání: '"Data leakage"'
Publikováno v:
智能科学与技术学报, Vol 6, Pp 394-401 (2024)
Large language models(LLM) are leading to a new revolution in artificial intelligence technology. As LLM have the characteristics of platform, mass data dependence, frequent user interaction, and easy to be attacked, the risk of privacy disclosure is
Externí odkaz:
https://doaj.org/article/c29b3e5fd4024b0d8b76df144b79afcd
Publikováno v:
Discover Sustainability, Vol 5, Iss 1, Pp 1-30 (2024)
Abstract Side Channel Attacks (SCAs) present a significant threat to cryptographic security, exploiting unintended emissions from devices like cell phones and transit cards to breach system defenses. This paper introduces a robust framework designed
Externí odkaz:
https://doaj.org/article/2c2ec653a051402bbda1e0804f4c0f4a
Publikováno v:
Вісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, Iss 1 (11), Pp 34-38 (2024)
The only right strategy for businesses and government organizations in Ukraine and other countries that may face aggression is to recognize themselves as a potential target for cyberattacks by the aggressor (both by its government agencies and relate
Externí odkaz:
https://doaj.org/article/8598c0e2e59941058791ff83ef6d41b7
Autor:
Jan Domnik, Alexander Holland
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 2, Pp 167-195 (2024)
In an evolving cybersecurity landscape marked by escalating data breaches and regulatory demands, data leakage prevention (DLP) has emerged as one of several defense mechanisms. This study underscores unresolved foundational issues within DLP, reveal
Externí odkaz:
https://doaj.org/article/f37db81ff87d42d6859eb6e86b01e940
Publikováno v:
IEEE Access, Vol 12, Pp 169879-169895 (2024)
Bearing fault diagnosis is a well-developed field and an active area of research in which the combination of model-free machine learning techniques with vibration data has become a popular approach. However, vibration data from rotating machines has
Externí odkaz:
https://doaj.org/article/ab9a922057b446aeb34f3e1d0e83d2b8
Autor:
Geoffrey Brookshire, Jake Kasper, Nicholas M. Blauch, Yunan Charles Wu, Ryan Glatt, David A. Merrill, Spencer Gerrol, Keith J. Yoder, Colin Quirk, Ché Lucero
Publikováno v:
Frontiers in Neuroscience, Vol 18 (2024)
A growing number of studies apply deep neural networks (DNNs) to recordings of human electroencephalography (EEG) to identify a range of disorders. In many studies, EEG recordings are split into segments, and each segment is randomly assigned to the
Externí odkaz:
https://doaj.org/article/8746e7d329c94692b2cf5f78afbf8ff4
Publikováno v:
Applied Sciences, Vol 14, Iss 17, p 7915 (2024)
Online social networks (OSNs) are fertile ground for information sharing and public relationships. However, the uncontrolled dissemination of information poses a significant risk of the inadvertent disclosure of sensitive information. This poses a no
Externí odkaz:
https://doaj.org/article/f6392f242a7e41cb916a5f17e8b7dc56
Publikováno v:
Energies, Vol 17, Iss 17, p 4358 (2024)
Precise forecasts of carbon prices are crucial for reducing greenhouse gas emissions and promoting sustainable, low-carbon development. To mitigate noise interference in carbon price data, hybrid models integrating data decomposition techniques are c
Externí odkaz:
https://doaj.org/article/dba4eb9ea7d4448bbd70d66ea84b55b8
Autor:
Domonkos Varga
Publikováno v:
Inventions, Vol 9, Iss 4, p 90 (2024)
Wi-Fi channel state information (CSI)-based human action recognition systems have garnered significant interest for their non-intrusive monitoring capabilities. However, the integrity of these systems can be compromised by data leakage, particularly
Externí odkaz:
https://doaj.org/article/78b6febd433b4093a63912f0d70f70c6
Publikováno v:
South African Journal of Information Management, Vol 26, Iss 1, Pp e1-e10 (2024)
Background: Users with knowledge of an organisation can pose risks to Cloud Computing, including current and past employees and external stakeholders with access to the organisation’s cloud. These insiders may engage in intentional or unintentional
Externí odkaz:
https://doaj.org/article/4758a057e5194149a2fe69c164213be8