Journal articles on the topic 'Empirical privacy defenses'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Empirical privacy defenses.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kaplan, Caelin, Chuan Xu, Othmane Marfoq, Giovanni Neglia, and Anderson Santana de Oliveira. "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 525–48. http://dx.doi.org/10.56553/popets-2024-0031.
Full textNakai, Tsunato, Ye Wang, Kota Yoshida, and Takeshi Fujino. "SEDMA: Self-Distillation with Model Aggregation for Membership Privacy." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 494–508. http://dx.doi.org/10.56553/popets-2024-0029.
Full textOzdayi, Mustafa Safa, Murat Kantarcioglu, and Yulia R. Gel. "Defending against Backdoors in Federated Learning with Robust Learning Rate." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (2021): 9268–76. http://dx.doi.org/10.1609/aaai.v35i10.17118.
Full textPrimus, Eve. "The Problematic Structure of Indigent Defense Delivery." Michigan Law Review, no. 122.2 (2023): 205. http://dx.doi.org/10.36644/mlr.122.2.problematic.
Full textWang, Tianhao, Yuheng Zhang, and Ruoxi Jia. "Improving Robustness to Model Inversion Attacks via Mutual Information Regularization." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 13 (2021): 11666–73. http://dx.doi.org/10.1609/aaai.v35i13.17387.
Full textSangero, Boaz. "A New Defense for Self-Defense." Buffalo Criminal Law Review 9, no. 2 (2006): 475–559. http://dx.doi.org/10.1525/nclr.2006.9.2.475.
Full textChen, Jiyu, Yiwen Guo, Qianjun Zheng, and Hao Chen. "Protect privacy of deep classification networks by exploiting their generative power." Machine Learning 110, no. 4 (2021): 651–74. http://dx.doi.org/10.1007/s10994-021-05951-6.
Full textMiao, Lu, Weibo Li, Jia Zhao, Xin Zhou, and Yao Wu. "Differential Private Defense Against Backdoor Attacks in Federated Learning." Frontiers in Computing and Intelligent Systems 9, no. 2 (2024): 31–39. http://dx.doi.org/10.54097/dyt1nn60.
Full textAbbasi Tadi, Ali, Saroj Dayal, Dima Alhadidi, and Noman Mohammed. "Comparative Analysis of Membership Inference Attacks in Federated and Centralized Learning." Information 14, no. 11 (2023): 620. http://dx.doi.org/10.3390/info14110620.
Full textPERSKY, JOSEPH. "Rawls's Thin (Millean) Defense of Private Property." Utilitas 22, no. 2 (2010): 134–47. http://dx.doi.org/10.1017/s0953820810000051.
Full textCherubin, Giovanni. "Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 215–31. http://dx.doi.org/10.1515/popets-2017-0046.
Full textSannajust, Aurelie, Mohamed Arouri, and Frederic Teulon. "Motivations Of Public To Private Transactions: An International Empirical Investigation." Journal of Applied Business Research (JABR) 31, no. 1 (2014): 1. http://dx.doi.org/10.19030/jabr.v31i1.8979.
Full textWainakh, Aidmar, Fabrizio Ventola, Till Müßig, et al. "User-Level Label Leakage from Gradients in Federated Learning." Proceedings on Privacy Enhancing Technologies 2022, no. 2 (2022): 227–44. http://dx.doi.org/10.2478/popets-2022-0043.
Full textWu, Jing, Munawar Hayat, Mingyi Zhou, and Mehrtash Harandi. "Concealing Sensitive Samples against Gradient Leakage in Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (2024): 21717–25. http://dx.doi.org/10.1609/aaai.v38i19.30171.
Full textPan, Bin, Shih-Yung Wei, Xuanhua Xu, and Wei-Chiang Hong. "The Impact of Defense Investment on Economic Growth in the Perspective of Time Series." International Journal of Applied Evolutionary Computation 5, no. 4 (2014): 44–58. http://dx.doi.org/10.4018/ijaec.2014100104.
Full textZhong, Da, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, and Wendy Hui Wang. "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks." Proceedings on Privacy Enhancing Technologies 2023, no. 4 (2023): 149–69. http://dx.doi.org/10.56553/popets-2023-0103.
Full textLyu, Yifei, Hao Zeng, Jie Wang, and Yuhua Zhang. "Empirical Analysis on Unexpected Information Effect of Monetary Policy and Stock Price Fluctuation: Taking Military and Defense Enterprises as an Example." Discrete Dynamics in Nature and Society 2022 (September 24, 2022): 1–7. http://dx.doi.org/10.1155/2022/5680745.
Full textLoureiro MEDEIROS, Rodrigo, and Darc Antonio da Luz COSTA. "SOME CONSIDERATIONS ON DEFENSE INDUSTRIAL BASE (DIB) AND MILITARY LOGISTICS." RINTERPAP - Revista Interdisciplinar de Pesquisas Aplicadas 1, no. 1 (2025): 23–35. https://doi.org/10.47682/2675-6552.v1i1.102.
Full textWard, Jeffrey T., and Nathan W. Link. "Financial Sanctions in Pennsylvania." Federal Sentencing Reporter 34, no. 2-3 (2022): 166–72. http://dx.doi.org/10.1525/fsr.2022.34.2-3.166.
Full textMoffitt, Robert A. "In Defense of the NSF Economics Program." Journal of Economic Perspectives 30, no. 3 (2016): 213–34. http://dx.doi.org/10.1257/jep.30.3.213.
Full textWeiss, Moritz. "From Wealth to Power? The Failure of Layered Reforms in India's Defense Sector." Journal of Global Security Studies 4, no. 4 (2019): 560–78. http://dx.doi.org/10.1093/jogss/ogz036.
Full textLlesh, Lleshaj, and Lleshaj Vilson. "MILITARY EXPENDITURE EVALUATION: EMPIRICAL EVIDENCE FROM ALBANIA." Annali d'Italia 42 (April 25, 2023): 16–22. https://doi.org/10.5281/zenodo.7865193.
Full textFondevila, Gustavo, and Miguel Quintana-Navarrete. "Pre-trial detention and legal defence in Latin America." International Journal of Law in Context 17, no. 1 (2021): 75–90. http://dx.doi.org/10.1017/s1744552320000440.
Full textEspindola, Juan. "Educación privada e impuestos: ¿Es justo el régimen fiscal de las escuelas particulares en México?" education policy analysis archives 24 (November 21, 2016): 118. http://dx.doi.org/10.14507/epaa.24.2531.
Full textWang, Xiuling, and Wendy Hui Wang. "Subgraph Structure Membership Inference Attacks against Graph Neural Networks." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 268–90. http://dx.doi.org/10.56553/popets-2024-0116.
Full textKumar, Chetan, Riazat Ryan, and Ming Shao. "Adversary for Social Good: Protecting Familial Privacy through Joint Adversarial Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (2020): 11304–11. http://dx.doi.org/10.1609/aaai.v34i07.6791.
Full textCohee, Garrett Lane, Jeff Barrows, and Rob Handfield. "Early supplier integration in the US defense industry." Journal of Defense Analytics and Logistics 3, no. 1 (2019): 2–28. http://dx.doi.org/10.1108/jdal-03-2018-0007.
Full textAndrade-Neto, João Batista de. "Scientific studies on Krav Maga: state of the art." Sociology International Journal 7, no. 4 (2023): 177–86. http://dx.doi.org/10.15406/sij.2023.07.00341.
Full textPerunova, O. "Ensuring gender equality in the workplace in the security and defense sector." Uzhhorod National University Herald. Series: Law 3, no. 84 (2024): 176–81. http://dx.doi.org/10.24144/2307-3322.2024.84.3.26.
Full textShmidt, A. A. "Legal Foundations of State Policy on Self-Defense Weapons: In Quest of a Balance between Public and Private Interests." Actual Problems of Russian Law 19, no. 10 (2024): 45–57. http://dx.doi.org/10.17803/1994-1471.2024.167.10.045-057.
Full text송정현. "A Study on the Growth Engines of Japan's Defense Industry: Empirical Analysis on the Spin-on-Off Effect between Military and Private Industries." Journal of North-east Asian Cultures 1, no. 61 (2019): 311–24. http://dx.doi.org/10.17949/jneac.1.61.201912.018.
Full textWang, Xiuling, and Wendy Hui Wang. "GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 165–85. http://dx.doi.org/10.56553/popets-2024-0073.
Full textOluwabukunmi Folarin Ogunjinmi. "Cybersecurity in telecommunications: Defending networks against emerging threats." World Journal of Advanced Engineering Technology and Sciences 14, no. 3 (2025): 410–24. https://doi.org/10.30574/wjaets.2025.14.3.0138.
Full textHewa Majeed Zangana, Harman Salih Mohammed, and Mamo Muhamad Husain. "Banking Cybersecurity: Safeguarding Financial Information in the Digital Era." Journal of Computers and Digital Business 4, no. 2 (2025): 56–63. https://doi.org/10.56427/jcbd.v4i2.751.
Full textMalik, Anum, Kaleem Arshid, Nooruddin Noonari, and Rizwan Munir. "Artificial Intelligence-Driven Cybersecurity Framework Using Machine Learning for Advanced Threat Detection and Prevention." Scholars Journal of Engineering and Technology 13, no. 06 (2025): 401–23. https://doi.org/10.36347/sjet.2025.v13i06.005.
Full textLicina, Derek. "Hospital Ships Adrift? Part 1: A Systematic Literature Review Characterizing US Navy Hospital Ship Humanitarian and Disaster Response, 2004-2012." Prehospital and Disaster Medicine 28, no. 3 (2013): 230–38. http://dx.doi.org/10.1017/s1049023x13000149.
Full textBodolica, Virginia. "An examination into the markets for corporate control: Evidence on merger and acquisition deals involving Qatari companies." Corporate Ownership and Control 10, no. 4 (2013): 439–53. http://dx.doi.org/10.22495/cocv10i4c5art1.
Full textShulga, Olga. "Confidentiality and scam in the internet." University Economic Bulletin, no. 48 (March 30, 2021): 76–91. http://dx.doi.org/10.31470/2306-546x-2021-48-76-91.
Full textRafael, Maria Katarina E., and Chris Mai. "Understanding the Burden of Legal Financial Obligations on Indigent Washingtonians." Federal Sentencing Reporter 34, no. 2-3 (2022): 173–74. http://dx.doi.org/10.1525/fsr.2022.34.2-3.173.
Full textForés. "Beyond Gathering the ‘Low-Hanging Fruit’ of Green Technology for Improved Environmental Performance: an Empirical Examination of the Moderating Effects of Proactive Environmental Management and Business Strategies." Sustainability 11, no. 22 (2019): 6299. http://dx.doi.org/10.3390/su11226299.
Full textLester, J. C. "ELEUTHERIC-CONJECTURAL LIBERTARIANISM: A CONCISE PHILOSOPHICAL EXPLANATION." MEST Journal 10, no. 2 (2022): 111–23. http://dx.doi.org/10.12709/mest.10.10.02.12.
Full textDe Pedro, Kris M. Tunac, Ron Avi Astor, Rami Benbenishty, Jose Estrada, Gabrielle R. Dejoie Smith, and Monica Christina Esqueda. "The Children of Military Service Members." Review of Educational Research 81, no. 4 (2011): 566–618. http://dx.doi.org/10.3102/0034654311423537.
Full textBekhterev, Sergei L., and Lyudmila N. Bekhtereva. "Early Soviet Regional History in the Fates of Compatriots Through the Example of G.K. Ozhigov’s Biography." RUDN Journal of Russian History 22, no. 3 (2023): 456–69. http://dx.doi.org/10.22363/2312-8674-2023-22-3-456-469.
Full textTran, Mai Van, Tuwanont Phattharathanasut, Haymarn Soe Nyunt, Nalinthip Ekapong, and Lewis Young. "Pro-democracy platform advocacy: Resisting Big Tech-mediated authoritarianism in Southeast Asia." Open Research Europe 5 (January 20, 2025): 10. https://doi.org/10.12688/openreseurope.18820.1.
Full textTran, Mai Van, Tuwanont Phattharathanasut, Haymarn Soe Nyunt, Nalinthip Ekapong, and Lewis Young. "Pro-democracy platform advocacy: Resisting Big Tech-mediated authoritarianism in Southeast Asia." Open Research Europe 5 (May 8, 2025): 10. https://doi.org/10.12688/openreseurope.18820.2.
Full textSchuetze, Benjamin. "Simulating, marketing, and playing war: US–Jordanian military collaboration and the politics of commercial security." Security Dialogue 48, no. 5 (2017): 431–50. http://dx.doi.org/10.1177/0967010617717620.
Full textQiao, Yanqi, Dazhuang Liu, Rui Wang, and Kaitai Liang. "Stealthy Backdoor Attack Against Federated Learning Through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage." IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2024 14, no. 4 (2024): 661–72. https://doi.org/10.1109/JETCAS.2024.3450527.
Full textGrin'ko, Aleksey. "The rights of the defendant and public interest in proving insanity under the law of New York." Sravnitel noe konstitucionnoe obozrenie 30, no. 3 (2021): 108–24. http://dx.doi.org/10.21128/1812-7126-2021-3-108-124.
Full textChen, Xiuli, and Joohan Ryoo. "Strategic Role of Artificial Intelligence for Sustainable Cooperation in Northeast Asia." American Journal of Business Science Philosophy (AJBSP) 1, no. 2 (2025): p170–184. https://doi.org/10.70122/ajbsp.v1i2.19.
Full textMagalhães, Tiago De Oliveira. "Sobre certas dissimilaridades entre as Investigações filosóficas de Wittgenstein e o behaviorismo radical de Skinner [On certain dissimilarities between Wittgenstein's Philosophical investigations and Skinner's radical behaviorism]." Princípios: Revista de Filosofia (UFRN) 24, no. 43 (2017): 175. http://dx.doi.org/10.21680/1983-2109.2017v24n43id10297.
Full text