Artículos de revistas sobre el tema "Empirical privacy defenses"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Empirical privacy defenses".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Kaplan, Caelin, Chuan Xu, Othmane Marfoq, Giovanni Neglia, and Anderson Santana de Oliveira. "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 525–48. http://dx.doi.org/10.56553/popets-2024-0031.
Texto completoNakai, Tsunato, Ye Wang, Kota Yoshida, and Takeshi Fujino. "SEDMA: Self-Distillation with Model Aggregation for Membership Privacy." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 494–508. http://dx.doi.org/10.56553/popets-2024-0029.
Texto completoOzdayi, Mustafa Safa, Murat Kantarcioglu, and Yulia R. Gel. "Defending against Backdoors in Federated Learning with Robust Learning Rate." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (2021): 9268–76. http://dx.doi.org/10.1609/aaai.v35i10.17118.
Texto completoPrimus, Eve. "The Problematic Structure of Indigent Defense Delivery." Michigan Law Review, no. 122.2 (2023): 205. http://dx.doi.org/10.36644/mlr.122.2.problematic.
Texto completoWang, Tianhao, Yuheng Zhang, and Ruoxi Jia. "Improving Robustness to Model Inversion Attacks via Mutual Information Regularization." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 13 (2021): 11666–73. http://dx.doi.org/10.1609/aaai.v35i13.17387.
Texto completoSangero, Boaz. "A New Defense for Self-Defense." Buffalo Criminal Law Review 9, no. 2 (2006): 475–559. http://dx.doi.org/10.1525/nclr.2006.9.2.475.
Texto completoChen, Jiyu, Yiwen Guo, Qianjun Zheng, and Hao Chen. "Protect privacy of deep classification networks by exploiting their generative power." Machine Learning 110, no. 4 (2021): 651–74. http://dx.doi.org/10.1007/s10994-021-05951-6.
Texto completoMiao, Lu, Weibo Li, Jia Zhao, Xin Zhou, and Yao Wu. "Differential Private Defense Against Backdoor Attacks in Federated Learning." Frontiers in Computing and Intelligent Systems 9, no. 2 (2024): 31–39. http://dx.doi.org/10.54097/dyt1nn60.
Texto completoAbbasi Tadi, Ali, Saroj Dayal, Dima Alhadidi, and Noman Mohammed. "Comparative Analysis of Membership Inference Attacks in Federated and Centralized Learning." Information 14, no. 11 (2023): 620. http://dx.doi.org/10.3390/info14110620.
Texto completoPERSKY, JOSEPH. "Rawls's Thin (Millean) Defense of Private Property." Utilitas 22, no. 2 (2010): 134–47. http://dx.doi.org/10.1017/s0953820810000051.
Texto completoCherubin, Giovanni. "Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 215–31. http://dx.doi.org/10.1515/popets-2017-0046.
Texto completoSannajust, Aurelie, Mohamed Arouri, and Frederic Teulon. "Motivations Of Public To Private Transactions: An International Empirical Investigation." Journal of Applied Business Research (JABR) 31, no. 1 (2014): 1. http://dx.doi.org/10.19030/jabr.v31i1.8979.
Texto completoWainakh, Aidmar, Fabrizio Ventola, Till Müßig, et al. "User-Level Label Leakage from Gradients in Federated Learning." Proceedings on Privacy Enhancing Technologies 2022, no. 2 (2022): 227–44. http://dx.doi.org/10.2478/popets-2022-0043.
Texto completoWu, Jing, Munawar Hayat, Mingyi Zhou, and Mehrtash Harandi. "Concealing Sensitive Samples against Gradient Leakage in Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (2024): 21717–25. http://dx.doi.org/10.1609/aaai.v38i19.30171.
Texto completoPan, Bin, Shih-Yung Wei, Xuanhua Xu, and Wei-Chiang Hong. "The Impact of Defense Investment on Economic Growth in the Perspective of Time Series." International Journal of Applied Evolutionary Computation 5, no. 4 (2014): 44–58. http://dx.doi.org/10.4018/ijaec.2014100104.
Texto completoZhong, Da, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, and Wendy Hui Wang. "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks." Proceedings on Privacy Enhancing Technologies 2023, no. 4 (2023): 149–69. http://dx.doi.org/10.56553/popets-2023-0103.
Texto completoLyu, Yifei, Hao Zeng, Jie Wang, and Yuhua Zhang. "Empirical Analysis on Unexpected Information Effect of Monetary Policy and Stock Price Fluctuation: Taking Military and Defense Enterprises as an Example." Discrete Dynamics in Nature and Society 2022 (September 24, 2022): 1–7. http://dx.doi.org/10.1155/2022/5680745.
Texto completoLoureiro MEDEIROS, Rodrigo, and Darc Antonio da Luz COSTA. "SOME CONSIDERATIONS ON DEFENSE INDUSTRIAL BASE (DIB) AND MILITARY LOGISTICS." RINTERPAP - Revista Interdisciplinar de Pesquisas Aplicadas 1, no. 1 (2025): 23–35. https://doi.org/10.47682/2675-6552.v1i1.102.
Texto completoWard, Jeffrey T., and Nathan W. Link. "Financial Sanctions in Pennsylvania." Federal Sentencing Reporter 34, no. 2-3 (2022): 166–72. http://dx.doi.org/10.1525/fsr.2022.34.2-3.166.
Texto completoMoffitt, Robert A. "In Defense of the NSF Economics Program." Journal of Economic Perspectives 30, no. 3 (2016): 213–34. http://dx.doi.org/10.1257/jep.30.3.213.
Texto completoWeiss, Moritz. "From Wealth to Power? The Failure of Layered Reforms in India's Defense Sector." Journal of Global Security Studies 4, no. 4 (2019): 560–78. http://dx.doi.org/10.1093/jogss/ogz036.
Texto completoLlesh, Lleshaj, and Lleshaj Vilson. "MILITARY EXPENDITURE EVALUATION: EMPIRICAL EVIDENCE FROM ALBANIA." Annali d'Italia 42 (April 25, 2023): 16–22. https://doi.org/10.5281/zenodo.7865193.
Texto completoFondevila, Gustavo, and Miguel Quintana-Navarrete. "Pre-trial detention and legal defence in Latin America." International Journal of Law in Context 17, no. 1 (2021): 75–90. http://dx.doi.org/10.1017/s1744552320000440.
Texto completoEspindola, Juan. "Educación privada e impuestos: ¿Es justo el régimen fiscal de las escuelas particulares en México?" education policy analysis archives 24 (November 21, 2016): 118. http://dx.doi.org/10.14507/epaa.24.2531.
Texto completoWang, Xiuling, and Wendy Hui Wang. "Subgraph Structure Membership Inference Attacks against Graph Neural Networks." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 268–90. http://dx.doi.org/10.56553/popets-2024-0116.
Texto completoKumar, Chetan, Riazat Ryan, and Ming Shao. "Adversary for Social Good: Protecting Familial Privacy through Joint Adversarial Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (2020): 11304–11. http://dx.doi.org/10.1609/aaai.v34i07.6791.
Texto completoCohee, Garrett Lane, Jeff Barrows, and Rob Handfield. "Early supplier integration in the US defense industry." Journal of Defense Analytics and Logistics 3, no. 1 (2019): 2–28. http://dx.doi.org/10.1108/jdal-03-2018-0007.
Texto completoAndrade-Neto, João Batista de. "Scientific studies on Krav Maga: state of the art." Sociology International Journal 7, no. 4 (2023): 177–86. http://dx.doi.org/10.15406/sij.2023.07.00341.
Texto completoPerunova, O. "Ensuring gender equality in the workplace in the security and defense sector." Uzhhorod National University Herald. Series: Law 3, no. 84 (2024): 176–81. http://dx.doi.org/10.24144/2307-3322.2024.84.3.26.
Texto completoShmidt, A. A. "Legal Foundations of State Policy on Self-Defense Weapons: In Quest of a Balance between Public and Private Interests." Actual Problems of Russian Law 19, no. 10 (2024): 45–57. http://dx.doi.org/10.17803/1994-1471.2024.167.10.045-057.
Texto completo송정현. "A Study on the Growth Engines of Japan's Defense Industry: Empirical Analysis on the Spin-on-Off Effect between Military and Private Industries." Journal of North-east Asian Cultures 1, no. 61 (2019): 311–24. http://dx.doi.org/10.17949/jneac.1.61.201912.018.
Texto completoWang, Xiuling, and Wendy Hui Wang. "GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 165–85. http://dx.doi.org/10.56553/popets-2024-0073.
Texto completoOluwabukunmi Folarin Ogunjinmi. "Cybersecurity in telecommunications: Defending networks against emerging threats." World Journal of Advanced Engineering Technology and Sciences 14, no. 3 (2025): 410–24. https://doi.org/10.30574/wjaets.2025.14.3.0138.
Texto completoHewa Majeed Zangana, Harman Salih Mohammed, and Mamo Muhamad Husain. "Banking Cybersecurity: Safeguarding Financial Information in the Digital Era." Journal of Computers and Digital Business 4, no. 2 (2025): 56–63. https://doi.org/10.56427/jcbd.v4i2.751.
Texto completoMalik, Anum, Kaleem Arshid, Nooruddin Noonari, and Rizwan Munir. "Artificial Intelligence-Driven Cybersecurity Framework Using Machine Learning for Advanced Threat Detection and Prevention." Scholars Journal of Engineering and Technology 13, no. 06 (2025): 401–23. https://doi.org/10.36347/sjet.2025.v13i06.005.
Texto completoLicina, Derek. "Hospital Ships Adrift? Part 1: A Systematic Literature Review Characterizing US Navy Hospital Ship Humanitarian and Disaster Response, 2004-2012." Prehospital and Disaster Medicine 28, no. 3 (2013): 230–38. http://dx.doi.org/10.1017/s1049023x13000149.
Texto completoBodolica, Virginia. "An examination into the markets for corporate control: Evidence on merger and acquisition deals involving Qatari companies." Corporate Ownership and Control 10, no. 4 (2013): 439–53. http://dx.doi.org/10.22495/cocv10i4c5art1.
Texto completoShulga, Olga. "Confidentiality and scam in the internet." University Economic Bulletin, no. 48 (March 30, 2021): 76–91. http://dx.doi.org/10.31470/2306-546x-2021-48-76-91.
Texto completoRafael, Maria Katarina E., and Chris Mai. "Understanding the Burden of Legal Financial Obligations on Indigent Washingtonians." Federal Sentencing Reporter 34, no. 2-3 (2022): 173–74. http://dx.doi.org/10.1525/fsr.2022.34.2-3.173.
Texto completoForés. "Beyond Gathering the ‘Low-Hanging Fruit’ of Green Technology for Improved Environmental Performance: an Empirical Examination of the Moderating Effects of Proactive Environmental Management and Business Strategies." Sustainability 11, no. 22 (2019): 6299. http://dx.doi.org/10.3390/su11226299.
Texto completoLester, J. C. "ELEUTHERIC-CONJECTURAL LIBERTARIANISM: A CONCISE PHILOSOPHICAL EXPLANATION." MEST Journal 10, no. 2 (2022): 111–23. http://dx.doi.org/10.12709/mest.10.10.02.12.
Texto completoDe Pedro, Kris M. Tunac, Ron Avi Astor, Rami Benbenishty, Jose Estrada, Gabrielle R. Dejoie Smith, and Monica Christina Esqueda. "The Children of Military Service Members." Review of Educational Research 81, no. 4 (2011): 566–618. http://dx.doi.org/10.3102/0034654311423537.
Texto completoBekhterev, Sergei L., and Lyudmila N. Bekhtereva. "Early Soviet Regional History in the Fates of Compatriots Through the Example of G.K. Ozhigov’s Biography." RUDN Journal of Russian History 22, no. 3 (2023): 456–69. http://dx.doi.org/10.22363/2312-8674-2023-22-3-456-469.
Texto completoTran, Mai Van, Tuwanont Phattharathanasut, Haymarn Soe Nyunt, Nalinthip Ekapong, and Lewis Young. "Pro-democracy platform advocacy: Resisting Big Tech-mediated authoritarianism in Southeast Asia." Open Research Europe 5 (January 20, 2025): 10. https://doi.org/10.12688/openreseurope.18820.1.
Texto completoTran, Mai Van, Tuwanont Phattharathanasut, Haymarn Soe Nyunt, Nalinthip Ekapong, and Lewis Young. "Pro-democracy platform advocacy: Resisting Big Tech-mediated authoritarianism in Southeast Asia." Open Research Europe 5 (May 8, 2025): 10. https://doi.org/10.12688/openreseurope.18820.2.
Texto completoSchuetze, Benjamin. "Simulating, marketing, and playing war: US–Jordanian military collaboration and the politics of commercial security." Security Dialogue 48, no. 5 (2017): 431–50. http://dx.doi.org/10.1177/0967010617717620.
Texto completoQiao, Yanqi, Dazhuang Liu, Rui Wang, and Kaitai Liang. "Stealthy Backdoor Attack Against Federated Learning Through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage." IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2024 14, no. 4 (2024): 661–72. https://doi.org/10.1109/JETCAS.2024.3450527.
Texto completoGrin'ko, Aleksey. "The rights of the defendant and public interest in proving insanity under the law of New York." Sravnitel noe konstitucionnoe obozrenie 30, no. 3 (2021): 108–24. http://dx.doi.org/10.21128/1812-7126-2021-3-108-124.
Texto completoChen, Xiuli, and Joohan Ryoo. "Strategic Role of Artificial Intelligence for Sustainable Cooperation in Northeast Asia." American Journal of Business Science Philosophy (AJBSP) 1, no. 2 (2025): p170–184. https://doi.org/10.70122/ajbsp.v1i2.19.
Texto completoMagalhães, Tiago De Oliveira. "Sobre certas dissimilaridades entre as Investigações filosóficas de Wittgenstein e o behaviorismo radical de Skinner [On certain dissimilarities between Wittgenstein's Philosophical investigations and Skinner's radical behaviorism]." Princípios: Revista de Filosofia (UFRN) 24, no. 43 (2017): 175. http://dx.doi.org/10.21680/1983-2109.2017v24n43id10297.
Texto completo