Artykuły w czasopismach na temat „Empirical privacy defenses”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Empirical privacy defenses”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Kaplan, Caelin, Chuan Xu, Othmane Marfoq, Giovanni Neglia, and Anderson Santana de Oliveira. "A Cautionary Tale: On the Role of Reference Data in Empirical Privacy Defenses." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 525–48. http://dx.doi.org/10.56553/popets-2024-0031.
Pełny tekst źródłaNakai, Tsunato, Ye Wang, Kota Yoshida, and Takeshi Fujino. "SEDMA: Self-Distillation with Model Aggregation for Membership Privacy." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 494–508. http://dx.doi.org/10.56553/popets-2024-0029.
Pełny tekst źródłaOzdayi, Mustafa Safa, Murat Kantarcioglu, and Yulia R. Gel. "Defending against Backdoors in Federated Learning with Robust Learning Rate." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (2021): 9268–76. http://dx.doi.org/10.1609/aaai.v35i10.17118.
Pełny tekst źródłaPrimus, Eve. "The Problematic Structure of Indigent Defense Delivery." Michigan Law Review, no. 122.2 (2023): 205. http://dx.doi.org/10.36644/mlr.122.2.problematic.
Pełny tekst źródłaWang, Tianhao, Yuheng Zhang, and Ruoxi Jia. "Improving Robustness to Model Inversion Attacks via Mutual Information Regularization." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 13 (2021): 11666–73. http://dx.doi.org/10.1609/aaai.v35i13.17387.
Pełny tekst źródłaSangero, Boaz. "A New Defense for Self-Defense." Buffalo Criminal Law Review 9, no. 2 (2006): 475–559. http://dx.doi.org/10.1525/nclr.2006.9.2.475.
Pełny tekst źródłaChen, Jiyu, Yiwen Guo, Qianjun Zheng, and Hao Chen. "Protect privacy of deep classification networks by exploiting their generative power." Machine Learning 110, no. 4 (2021): 651–74. http://dx.doi.org/10.1007/s10994-021-05951-6.
Pełny tekst źródłaMiao, Lu, Weibo Li, Jia Zhao, Xin Zhou, and Yao Wu. "Differential Private Defense Against Backdoor Attacks in Federated Learning." Frontiers in Computing and Intelligent Systems 9, no. 2 (2024): 31–39. http://dx.doi.org/10.54097/dyt1nn60.
Pełny tekst źródłaAbbasi Tadi, Ali, Saroj Dayal, Dima Alhadidi, and Noman Mohammed. "Comparative Analysis of Membership Inference Attacks in Federated and Centralized Learning." Information 14, no. 11 (2023): 620. http://dx.doi.org/10.3390/info14110620.
Pełny tekst źródłaPERSKY, JOSEPH. "Rawls's Thin (Millean) Defense of Private Property." Utilitas 22, no. 2 (2010): 134–47. http://dx.doi.org/10.1017/s0953820810000051.
Pełny tekst źródłaCherubin, Giovanni. "Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 215–31. http://dx.doi.org/10.1515/popets-2017-0046.
Pełny tekst źródłaSannajust, Aurelie, Mohamed Arouri, and Frederic Teulon. "Motivations Of Public To Private Transactions: An International Empirical Investigation." Journal of Applied Business Research (JABR) 31, no. 1 (2014): 1. http://dx.doi.org/10.19030/jabr.v31i1.8979.
Pełny tekst źródłaWainakh, Aidmar, Fabrizio Ventola, Till Müßig, et al. "User-Level Label Leakage from Gradients in Federated Learning." Proceedings on Privacy Enhancing Technologies 2022, no. 2 (2022): 227–44. http://dx.doi.org/10.2478/popets-2022-0043.
Pełny tekst źródłaWu, Jing, Munawar Hayat, Mingyi Zhou, and Mehrtash Harandi. "Concealing Sensitive Samples against Gradient Leakage in Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (2024): 21717–25. http://dx.doi.org/10.1609/aaai.v38i19.30171.
Pełny tekst źródłaPan, Bin, Shih-Yung Wei, Xuanhua Xu, and Wei-Chiang Hong. "The Impact of Defense Investment on Economic Growth in the Perspective of Time Series." International Journal of Applied Evolutionary Computation 5, no. 4 (2014): 44–58. http://dx.doi.org/10.4018/ijaec.2014100104.
Pełny tekst źródłaZhong, Da, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, and Wendy Hui Wang. "Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks." Proceedings on Privacy Enhancing Technologies 2023, no. 4 (2023): 149–69. http://dx.doi.org/10.56553/popets-2023-0103.
Pełny tekst źródłaLyu, Yifei, Hao Zeng, Jie Wang, and Yuhua Zhang. "Empirical Analysis on Unexpected Information Effect of Monetary Policy and Stock Price Fluctuation: Taking Military and Defense Enterprises as an Example." Discrete Dynamics in Nature and Society 2022 (September 24, 2022): 1–7. http://dx.doi.org/10.1155/2022/5680745.
Pełny tekst źródłaLoureiro MEDEIROS, Rodrigo, and Darc Antonio da Luz COSTA. "SOME CONSIDERATIONS ON DEFENSE INDUSTRIAL BASE (DIB) AND MILITARY LOGISTICS." RINTERPAP - Revista Interdisciplinar de Pesquisas Aplicadas 1, no. 1 (2025): 23–35. https://doi.org/10.47682/2675-6552.v1i1.102.
Pełny tekst źródłaWard, Jeffrey T., and Nathan W. Link. "Financial Sanctions in Pennsylvania." Federal Sentencing Reporter 34, no. 2-3 (2022): 166–72. http://dx.doi.org/10.1525/fsr.2022.34.2-3.166.
Pełny tekst źródłaMoffitt, Robert A. "In Defense of the NSF Economics Program." Journal of Economic Perspectives 30, no. 3 (2016): 213–34. http://dx.doi.org/10.1257/jep.30.3.213.
Pełny tekst źródłaWeiss, Moritz. "From Wealth to Power? The Failure of Layered Reforms in India's Defense Sector." Journal of Global Security Studies 4, no. 4 (2019): 560–78. http://dx.doi.org/10.1093/jogss/ogz036.
Pełny tekst źródłaLlesh, Lleshaj, and Lleshaj Vilson. "MILITARY EXPENDITURE EVALUATION: EMPIRICAL EVIDENCE FROM ALBANIA." Annali d'Italia 42 (April 25, 2023): 16–22. https://doi.org/10.5281/zenodo.7865193.
Pełny tekst źródłaFondevila, Gustavo, and Miguel Quintana-Navarrete. "Pre-trial detention and legal defence in Latin America." International Journal of Law in Context 17, no. 1 (2021): 75–90. http://dx.doi.org/10.1017/s1744552320000440.
Pełny tekst źródłaEspindola, Juan. "Educación privada e impuestos: ¿Es justo el régimen fiscal de las escuelas particulares en México?" education policy analysis archives 24 (November 21, 2016): 118. http://dx.doi.org/10.14507/epaa.24.2531.
Pełny tekst źródłaWang, Xiuling, and Wendy Hui Wang. "Subgraph Structure Membership Inference Attacks against Graph Neural Networks." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 268–90. http://dx.doi.org/10.56553/popets-2024-0116.
Pełny tekst źródłaKumar, Chetan, Riazat Ryan, and Ming Shao. "Adversary for Social Good: Protecting Familial Privacy through Joint Adversarial Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (2020): 11304–11. http://dx.doi.org/10.1609/aaai.v34i07.6791.
Pełny tekst źródłaCohee, Garrett Lane, Jeff Barrows, and Rob Handfield. "Early supplier integration in the US defense industry." Journal of Defense Analytics and Logistics 3, no. 1 (2019): 2–28. http://dx.doi.org/10.1108/jdal-03-2018-0007.
Pełny tekst źródłaAndrade-Neto, João Batista de. "Scientific studies on Krav Maga: state of the art." Sociology International Journal 7, no. 4 (2023): 177–86. http://dx.doi.org/10.15406/sij.2023.07.00341.
Pełny tekst źródłaPerunova, O. "Ensuring gender equality in the workplace in the security and defense sector." Uzhhorod National University Herald. Series: Law 3, no. 84 (2024): 176–81. http://dx.doi.org/10.24144/2307-3322.2024.84.3.26.
Pełny tekst źródłaShmidt, A. A. "Legal Foundations of State Policy on Self-Defense Weapons: In Quest of a Balance between Public and Private Interests." Actual Problems of Russian Law 19, no. 10 (2024): 45–57. http://dx.doi.org/10.17803/1994-1471.2024.167.10.045-057.
Pełny tekst źródła송정현. "A Study on the Growth Engines of Japan's Defense Industry: Empirical Analysis on the Spin-on-Off Effect between Military and Private Industries." Journal of North-east Asian Cultures 1, no. 61 (2019): 311–24. http://dx.doi.org/10.17949/jneac.1.61.201912.018.
Pełny tekst źródłaWang, Xiuling, and Wendy Hui Wang. "GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 165–85. http://dx.doi.org/10.56553/popets-2024-0073.
Pełny tekst źródłaOluwabukunmi Folarin Ogunjinmi. "Cybersecurity in telecommunications: Defending networks against emerging threats." World Journal of Advanced Engineering Technology and Sciences 14, no. 3 (2025): 410–24. https://doi.org/10.30574/wjaets.2025.14.3.0138.
Pełny tekst źródłaHewa Majeed Zangana, Harman Salih Mohammed, and Mamo Muhamad Husain. "Banking Cybersecurity: Safeguarding Financial Information in the Digital Era." Journal of Computers and Digital Business 4, no. 2 (2025): 56–63. https://doi.org/10.56427/jcbd.v4i2.751.
Pełny tekst źródłaMalik, Anum, Kaleem Arshid, Nooruddin Noonari, and Rizwan Munir. "Artificial Intelligence-Driven Cybersecurity Framework Using Machine Learning for Advanced Threat Detection and Prevention." Scholars Journal of Engineering and Technology 13, no. 06 (2025): 401–23. https://doi.org/10.36347/sjet.2025.v13i06.005.
Pełny tekst źródłaLicina, Derek. "Hospital Ships Adrift? Part 1: A Systematic Literature Review Characterizing US Navy Hospital Ship Humanitarian and Disaster Response, 2004-2012." Prehospital and Disaster Medicine 28, no. 3 (2013): 230–38. http://dx.doi.org/10.1017/s1049023x13000149.
Pełny tekst źródłaBodolica, Virginia. "An examination into the markets for corporate control: Evidence on merger and acquisition deals involving Qatari companies." Corporate Ownership and Control 10, no. 4 (2013): 439–53. http://dx.doi.org/10.22495/cocv10i4c5art1.
Pełny tekst źródłaShulga, Olga. "Confidentiality and scam in the internet." University Economic Bulletin, no. 48 (March 30, 2021): 76–91. http://dx.doi.org/10.31470/2306-546x-2021-48-76-91.
Pełny tekst źródłaRafael, Maria Katarina E., and Chris Mai. "Understanding the Burden of Legal Financial Obligations on Indigent Washingtonians." Federal Sentencing Reporter 34, no. 2-3 (2022): 173–74. http://dx.doi.org/10.1525/fsr.2022.34.2-3.173.
Pełny tekst źródłaForés. "Beyond Gathering the ‘Low-Hanging Fruit’ of Green Technology for Improved Environmental Performance: an Empirical Examination of the Moderating Effects of Proactive Environmental Management and Business Strategies." Sustainability 11, no. 22 (2019): 6299. http://dx.doi.org/10.3390/su11226299.
Pełny tekst źródłaLester, J. C. "ELEUTHERIC-CONJECTURAL LIBERTARIANISM: A CONCISE PHILOSOPHICAL EXPLANATION." MEST Journal 10, no. 2 (2022): 111–23. http://dx.doi.org/10.12709/mest.10.10.02.12.
Pełny tekst źródłaDe Pedro, Kris M. Tunac, Ron Avi Astor, Rami Benbenishty, Jose Estrada, Gabrielle R. Dejoie Smith, and Monica Christina Esqueda. "The Children of Military Service Members." Review of Educational Research 81, no. 4 (2011): 566–618. http://dx.doi.org/10.3102/0034654311423537.
Pełny tekst źródłaBekhterev, Sergei L., and Lyudmila N. Bekhtereva. "Early Soviet Regional History in the Fates of Compatriots Through the Example of G.K. Ozhigov’s Biography." RUDN Journal of Russian History 22, no. 3 (2023): 456–69. http://dx.doi.org/10.22363/2312-8674-2023-22-3-456-469.
Pełny tekst źródłaTran, Mai Van, Tuwanont Phattharathanasut, Haymarn Soe Nyunt, Nalinthip Ekapong, and Lewis Young. "Pro-democracy platform advocacy: Resisting Big Tech-mediated authoritarianism in Southeast Asia." Open Research Europe 5 (January 20, 2025): 10. https://doi.org/10.12688/openreseurope.18820.1.
Pełny tekst źródłaTran, Mai Van, Tuwanont Phattharathanasut, Haymarn Soe Nyunt, Nalinthip Ekapong, and Lewis Young. "Pro-democracy platform advocacy: Resisting Big Tech-mediated authoritarianism in Southeast Asia." Open Research Europe 5 (May 8, 2025): 10. https://doi.org/10.12688/openreseurope.18820.2.
Pełny tekst źródłaSchuetze, Benjamin. "Simulating, marketing, and playing war: US–Jordanian military collaboration and the politics of commercial security." Security Dialogue 48, no. 5 (2017): 431–50. http://dx.doi.org/10.1177/0967010617717620.
Pełny tekst źródłaQiao, Yanqi, Dazhuang Liu, Rui Wang, and Kaitai Liang. "Stealthy Backdoor Attack Against Federated Learning Through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage." IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2024 14, no. 4 (2024): 661–72. https://doi.org/10.1109/JETCAS.2024.3450527.
Pełny tekst źródłaGrin'ko, Aleksey. "The rights of the defendant and public interest in proving insanity under the law of New York." Sravnitel noe konstitucionnoe obozrenie 30, no. 3 (2021): 108–24. http://dx.doi.org/10.21128/1812-7126-2021-3-108-124.
Pełny tekst źródłaChen, Xiuli, and Joohan Ryoo. "Strategic Role of Artificial Intelligence for Sustainable Cooperation in Northeast Asia." American Journal of Business Science Philosophy (AJBSP) 1, no. 2 (2025): p170–184. https://doi.org/10.70122/ajbsp.v1i2.19.
Pełny tekst źródłaMagalhães, Tiago De Oliveira. "Sobre certas dissimilaridades entre as Investigações filosóficas de Wittgenstein e o behaviorismo radical de Skinner [On certain dissimilarities between Wittgenstein's Philosophical investigations and Skinner's radical behaviorism]." Princípios: Revista de Filosofia (UFRN) 24, no. 43 (2017): 175. http://dx.doi.org/10.21680/1983-2109.2017v24n43id10297.
Pełny tekst źródła