Journal articles on the topic 'Privacy leak'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy leak.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fan, Le-Jun, Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng, and Chuang Lin. "Privacy Petri Net and Privacy Leak Software." Journal of Computer Science and Technology 30, no. 6 (2015): 1318–43. http://dx.doi.org/10.1007/s11390-015-1601-7.
Full textFan, Lejun, Yuanzhuo Wang, Xiaolong Jin, Jingyuan Li, Xueqi Cheng, and Shuyuan Jin. "Comprehensive Quantitative Analysis on Privacy Leak Behavior." PLoS ONE 8, no. 9 (2013): e73410. http://dx.doi.org/10.1371/journal.pone.0073410.
Full textValecha, Rohit, Shambhu Upadhyaya, and H. Raghav Rao. "An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI)." Journal of the Association for Information Systems 22, no. 4 (2021): 1007–36. http://dx.doi.org/10.17705/1jais.00687.
Full textJing, Tao, Qiancheng Chen, and Yingkun Wen. "A Probabilistic Privacy Preserving Strategy for Word-of-Mouth Social Networks." Wireless Communications and Mobile Computing 2018 (July 8, 2018): 1–12. http://dx.doi.org/10.1155/2018/6031715.
Full textLuo, Xiaohui. "A Method for Privacy-Safe Synthetic Health Data." Academic Journal of Science and Technology 10, no. 1 (2024): 445–50. http://dx.doi.org/10.54097/f7fjss40.
Full textTandon, Rajat, Pithayuth Charnsethikul, Ishank Arora, Dhiraj Murthy, and Jelena Mirkovic. "I know what you did on Venmo: Discovering privacy leaks in mobile social payments." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 200–221. http://dx.doi.org/10.56553/popets-2022-0069.
Full textVivekanandam, B., and Midhunchakkaravarthy. "Preventive Measures for the Impacts of Social Media Networks in Security and Privacy - A Review." Journal of ISMAC 3, no. 4 (2022): 291–300. http://dx.doi.org/10.36548/jismac.2021.4.001.
Full textWang, Xiaolei, and Yuexiang Yang. "PrivacyContext: identifying malicious mobile privacy leak using program context." International Journal of Information and Computer Security 11, no. 6 (2019): 562. http://dx.doi.org/10.1504/ijics.2019.10024486.
Full textWang, Xiaolei, and Yuexiang Yang. "PrivacyContext: identifying malicious mobile privacy leak using program context." International Journal of Information and Computer Security 11, no. 6 (2019): 562. http://dx.doi.org/10.1504/ijics.2019.103054.
Full textHeeger, Julian, Simon Bugert, Waldemar Berchtold, Alexander Gruler, and Martin Steinebach. "Privacy preserving leak detection in peer-to-peer communication." Electronic Imaging 35, no. 4 (2023): 377——1–377–6. http://dx.doi.org/10.2352/ei.2023.35.4.mwsf-377.
Full textDang, Hung, Tien Tuan Anh Dinh, Ee-Chien Chang, and Beng Chin Ooi. "Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute." Proceedings on Privacy Enhancing Technologies 2017, no. 3 (2017): 21–38. http://dx.doi.org/10.1515/popets-2017-0026.
Full textTomasin, Stefano, Marco Centenaro, Gonzalo Seco-Granados, Stefan Roth, and Aydin Sezgin. "Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond." Sensors 21, no. 15 (2021): 5176. http://dx.doi.org/10.3390/s21155176.
Full textCho, Beumjin, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, and Jong Kim. "Prevention of cross-update privacy leaks on android." Computer Science and Information Systems 15, no. 1 (2018): 111–37. http://dx.doi.org/10.2298/csis170728047c.
Full textKim, Youngho, Tae Oh, and Jeongnyeo Kim. "Analyzing User Awareness of Privacy Data Leak in Mobile Applications." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/369489.
Full textWu, Xiang, Huanhuan Wang, Minyu Shi, Aming Wang, and Kaijian Xia. "DNA Motif Finding Method Without Protection Can Leak User Privacy." IEEE Access 7 (2019): 152076–87. http://dx.doi.org/10.1109/access.2019.2947261.
Full textSylfia, Alfrida, I. Gusti Ngurah Adyana, Mohammad Fahrial Amrullah, and Hendra Djaja. "Tanggungjawab Yuridis PT. Tokopedia atas Kebocoran Data Pribadi dan Privasi Konsumen Dalam Transaksi Online." Bhirawa Law Journal 2, no. 1 (2021): 21–27. http://dx.doi.org/10.26905/blj.v2i1.5850.
Full textWunderlich, Dominik, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau, and Thorsten Strufe. "On the Privacy–Utility Trade-Off in Differentially Private Hierarchical Text Classification." Applied Sciences 12, no. 21 (2022): 11177. http://dx.doi.org/10.3390/app122111177.
Full textHartmann, Valentin, Vincent Bindschaedler, Alexander Bentkamp та Robert West. "Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds". Proceedings on Privacy Enhancing Technologies 2022, № 3 (2022): 222–46. http://dx.doi.org/10.56553/popets-2022-0070.
Full textLi, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.
Full textSun, Zhenlong, Jing Yang, and Xiaoye Li. "Differentially Private Singular Value Decomposition for Training Support Vector Machines." Computational Intelligence and Neuroscience 2022 (March 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/2935975.
Full textZhang, Zhong, and Minho Shin. "mPrivacy: A Privacy Policy Engine and Safeguard Mechanism in Mobile Devices." Applied Sciences 11, no. 24 (2021): 11629. http://dx.doi.org/10.3390/app112411629.
Full textZhao, Shuang, Shuhui Chen, and Ziling Wei. "Statistical Feature-Based Personal Information Detection in Mobile Network Traffic." Wireless Communications and Mobile Computing 2022 (July 6, 2022): 1–17. http://dx.doi.org/10.1155/2022/5085200.
Full textDesfontaines, Damien, Andreas Lochbihler, and David Basin. "Cardinality Estimators do not Preserve Privacy." Proceedings on Privacy Enhancing Technologies 2019, no. 2 (2019): 26–46. http://dx.doi.org/10.2478/popets-2019-0018.
Full textZhu, Ye, Yongjian Fu, and Huirong Fu. "Preserving Privacy in Time Series Data Mining." International Journal of Data Warehousing and Mining 7, no. 4 (2011): 64–85. http://dx.doi.org/10.4018/jdwm.2011100104.
Full textMa, Haiyun, and Zhonglin Zhang. "A New Private Information Encryption Method in Internet of Things under Cloud Computing Environment." Wireless Communications and Mobile Computing 2020 (September 15, 2020): 1–9. http://dx.doi.org/10.1155/2020/8810987.
Full textNaga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.
Full textSchafer, Burkhard. "D-waste: Data disposal as challenge for waste management in the Internet of Things." International Review of Information Ethics 22 (December 1, 2014): 101–7. http://dx.doi.org/10.29173/irie122.
Full textSchafer, Burkhard. "D-waste: Data disposal as challenge for waste management in the Internet of Things." International Review of Information Ethics 22 (December 1, 2014): 101–7. http://dx.doi.org/10.29173/irie131.
Full textPrakash, A. John, and B. Lydia Elizabeth. "Pindex: Private multi-linked index for encrypted document retrieval." PLOS ONE 16, no. 8 (2021): e0256223. http://dx.doi.org/10.1371/journal.pone.0256223.
Full textSharma, Sanjay Kumar, and Manish Manoria. "Secure Cloud Database Architecture for Data Leak Detection and Public Auditing using AES Algorithm." International Journal of Emerging Research in Management and Technology 7, no. 1 (2018): 40. http://dx.doi.org/10.23956/ijermt.v7i1.22.
Full textEnglehardt, Steven, Jeffrey Han, and Arvind Narayanan. "I never signed up for this! Privacy implications of email tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 109–26. http://dx.doi.org/10.1515/popets-2018-0006.
Full textMöllers, Frederik. "Energy-Efficient Dummy Traffic Generation for Home Automation Systems." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 376–93. http://dx.doi.org/10.2478/popets-2020-0078.
Full textElkordy, Ahmed Roushdy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, and Salman Avestimehr. "How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?" Proceedings on Privacy Enhancing Technologies 2023, no. 1 (2023): 510–26. http://dx.doi.org/10.56553/popets-2023-0030.
Full textAsgiani, Piping, Chriswardani Suryawati, and Farid Agushybana. "A literature review: Security Aspects in the Implementation of Electronic Medical Records in Hospitals." MEDIA ILMU KESEHATAN 10, no. 2 (2022): 161–66. http://dx.doi.org/10.30989/mik.v10i2.561.
Full textEtemad, Mohammad, Alptekin Küpçü, Charalampos Papamanthou, and David Evans. "Efficient Dynamic Searchable Encryption with Forward Privacy." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 5–20. http://dx.doi.org/10.1515/popets-2018-0002.
Full textXiang, Yue, Dixin Luo, and Hongteng Xu. "Privacy-Preserved Evolutionary Graph Modeling via Gromov-Wasserstein Autoregression." Proceedings of the AAAI Conference on Artificial Intelligence 37, no. 12 (2023): 14566–74. http://dx.doi.org/10.1609/aaai.v37i12.26703.
Full textPang, Luning. "Research on the Privacy Security of Face Recognition Technology." Computational Intelligence and Neuroscience 2022 (January 25, 2022): 1–10. http://dx.doi.org/10.1155/2022/7882294.
Full textFeng, Ruijue, Zhidong Wang, Zhifeng Li, et al. "A Hybrid Cryptography Scheme for NILM Data Security." Electronics 9, no. 7 (2020): 1128. http://dx.doi.org/10.3390/electronics9071128.
Full textWang, Lin, Lei Yang, Mingchuan Zhang, Jianxin Zhang, Zhibin Cao, and Qingtao Wu. "Private Computing Offloading in Edge Cloud via Collaborative Online Learning." Wireless Communications and Mobile Computing 2022 (July 14, 2022): 1–13. http://dx.doi.org/10.1155/2022/7444916.
Full textZhang, Pu Han, Jing Zhe Li, Shuai Shao, and Peng Wang. "PDroid: Detecting Privacy Leakage on Android." Applied Mechanics and Materials 556-562 (May 2014): 2658–62. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2658.
Full text., Munikrishnan. "Data Leak Localization and Prevention using LDN." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 519–22. http://dx.doi.org/10.22214/ijraset.2023.54993.
Full textAlmadhoun, Nour, Erman Ayday, and Özgür Ulusoy. "Inference attacks against differentially private query results from genomic datasets including dependent tuples." Bioinformatics 36, Supplement_1 (2020): i136—i145. http://dx.doi.org/10.1093/bioinformatics/btaa475.
Full textLi, Rong, Wei Zhang, Lifa Wu, Yunfei Tang, and Xinguang Xie. "ZPA: A Smart Home Privacy Analysis System Based on ZigBee Encrypted Traffic." Wireless Communications and Mobile Computing 2023 (January 31, 2023): 1–16. http://dx.doi.org/10.1155/2023/6731783.
Full textKang, Haiyan, Yanhang Xiao, and Jie Yin. "An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks." Security and Communication Networks 2021 (April 23, 2021): 1–11. http://dx.doi.org/10.1155/2021/5518220.
Full textCho-Hsun Lu, Cho-Hsun Lu, Yen-Hung Chen Cho-Hsun Lu, and Pi-Tzong Jan Yen-Hung Chen. "The Privacy Trap of Digital Transformation: The Existence and the Implication." 網際網路技術學刊 23, no. 1 (2022): 063–71. http://dx.doi.org/10.53106/160792642022012301006.
Full textJaiswal, Mimansa, and Emily Mower Provost. "Privacy Enhanced Multimodal Neural Representations for Emotion Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (2020): 7985–93. http://dx.doi.org/10.1609/aaai.v34i05.6307.
Full textGruber, Moritz, Christian Höfig, Maximilian Golla, Tobias Urban, and Matteo Große-Kampmann. "“We may share the number of diaper changes”: A Privacy and Security Analysis of Mobile Child Care Applications." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 394–414. http://dx.doi.org/10.56553/popets-2022-0078.
Full textRathore, Shailendra, Yi Pan, and Jong Hyuk Park. "BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network." Sustainability 11, no. 14 (2019): 3974. http://dx.doi.org/10.3390/su11143974.
Full textXiong, Junli, and Huayi Huang. "Research on Information Leakage Tracking Algorithms in Online Social Networks." Computational Intelligence and Neuroscience 2022 (October 4, 2022): 1–11. http://dx.doi.org/10.1155/2022/5634385.
Full textLi, Xiaochen, Weiran Liu, Jian Lou, et al. "Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory." Proceedings of the ACM on Management of Data 2, no. 1 (2024): 1–27. http://dx.doi.org/10.1145/3639285.
Full text