Discover more insights into Sensitive Information

Keywords frequently search together with Sensitive Information

Narrow sentence examples with built-in keyword filters

Sensitive Information sentence examples within side channel attack



Retrieving Input from Touch Interfaces via Acoustic Emanations



Abacus: Precise Side-Channel Analysis


Sensitive Information sentence examples within data may contain



Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference



Effects of Normalization on Rotation Based Perturbation Techniques for Privacy Preservation


Sensitive Information sentence examples within Contain Sensitive Information



Enabling Proxy-Free Privacy-Preserving and Federated Crowdsourcing by Using Blockchain



Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference




Sensitive Information sentence examples within Protect Sensitive Information



Trustworthy Image Fusion with Deep Learning for Wireless Applications



Participative Decision Making and the Sharing of Benefits: Laws, ethics, and data protection for building extended global communities


Sensitive Information sentence examples within Leaking Sensitive Information



Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS -



Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers


Sensitive Information sentence examples within Leak Sensitive Information



Efficient DLP-visor: An efficient hypervisor-based DLP



Retrieving Input from Touch Interfaces via Acoustic Emanations


Sensitive Information sentence examples within Highly Sensitive Information



A PROACTIVE APPROACH TO NETWORK FORENSICS INTRUSION (DENIAL OF SERVICE FLOOD ATTACK) USING DYNAMIC FEATURES, SELECTION AND CONVOLUTION NEURAL NETWORK



An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks


Sensitive Information sentence examples within Steal Sensitive Information



HinPhish: An Effective Phishing Detection Approach Based on Heterogeneous Information Networks



Detection of Web Attacks via PART Classifier


Sensitive Information sentence examples within Reveal Sensitive Information



Differentially Private ADMM for Regularized Consensus Optimization



Private Multi-Group Aggregation


Sensitive Information sentence examples within Protecting Sensitive Information



A Comparative Analysis of Arabic Text Steganography



INVESTIGATING ATTRIBUTE RISKS AND CONSTRUCTING LINKAGE ERROR MODELS FOR PROBABILISTICALLY-LINKED DATA


Sensitive Information sentence examples within Provide Sensitive Information



Using the Think-Aloud Method to Assess the Feasibility and Acceptability of Network Canvas Among Black Men Who Have Sex With Men and Transgender Persons: Qualitative Analysis



Health vs. privacy? The risk-risk tradeoff in using COVID-19 contact-tracing apps


Sensitive Information sentence examples within Disclose Sensitive Information



A Utility-Optimized Mechanism for Private Data Aggregation



AMVchain: authority management mechanism on blockchain-based voting systems


Sensitive Information sentence examples within Obtain Sensitive Information



Feature Selection for Machine Learning-based Phishing Websites Detection



A Preventive and Detective Model for Phishing Attack in Small and Medium Size Businesses


Sensitive Information sentence examples within Potentially Sensitive Information



Plasma Proteomes Can Be Reidentifiable and Potentially Contain Personally Sensitive and Incidental Findings



Privacy-Preserving Voice Anti-Spoofing Using Secure Multi-Party Computation


Sensitive Information sentence examples within Revealing Sensitive Information



AMPPERE: A Universal Abstract Machine for Privacy-Preserving Entity Resolution Evaluation



Research Review on the Application of Homomorphic Encryption in Database Privacy Protection


Sensitive Information sentence examples within Infer Sensitive Information



Abacus: Precise Side-Channel Analysis



Towards Language-Based Mitigation of Traffic Analysis Attacks


Sensitive Information sentence examples within Collect Sensitive Information



A trust management system for fog computing services



A stream position performance analysis model based on DDoS attack detection for cluster-based routing in VANET


Sensitive Information sentence examples within Include Sensitive Information



A Study of Securing Healthcare Big Data using DNA Encoding based ECC



A Qualitative Research on the Impact and Challenges of Cybercrimes


Sensitive Information sentence examples within Extract Sensitive Information



Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach



Does BERT Pretrained on Clinical Notes Reveal Sensitive Data?


Sensitive Information sentence examples within Exposing Sensitive Information



α-MON: Traffic Anonymizer for Passive Monitoring



Privacy protection for Wi-Fi location positioning systems


Sensitive Information sentence examples within Share Sensitive Information



Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage



ShareDNA: a smartphone app to facilitate family communication of genetic results


Sensitive Information sentence examples within Sharing Sensitive Information



Node-Node Data Exchange in IoT Devices Using Twofish and DHE



P208 Exploring the data-sharing ecosystem in HIV care: healthcare professionals’ beliefs and practices


Sensitive Information sentence examples within Obtaining Sensitive Information



Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia



The use of ellipse-based estimator as a sub-key distinguisher for Side-Channel Analysis


Sensitive Information sentence examples within Secure Sensitive Information



Intelligent Botnet Detection Approach in Modern Applications



Anonymization of german legal court rulings


Sensitive Information sentence examples within Disclosing Sensitive Information



Conflicting goals and obligations: Tensions affecting communication in pediatric oncology.



Cybersecurity Attacks: Regulatory and Practical Approach Towards Preventing Data Breach and Cyber-Attacks in USA


Sensitive Information sentence examples within Securing Sensitive Information



Improving Data Security using Compression Integrated Pixel Interchange Model with Efficient Encryption Technique



Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning


Sensitive Information sentence examples within Containing Sensitive Information



ADePT: Auto-encoder based Differentially Private Text Transformation



A Combined Approach for a Privacy-Aware Digital Forensic Investigation in Enterprises


Sensitive Information sentence examples within Related Sensitive Information



Mobility-Aware Prefetching and Replacement Scheme for Location-Based Services



Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts


Sensitive Information sentence examples within Exchange Sensitive Information



A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care



An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services


Sensitive Information sentence examples within Privacy Sensitive Information



Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool



Adversarial Disentanglement of Speaker Representation for Attribute-Driven Privacy Preservation


Sensitive Information sentence examples within Extracting Sensitive Information



Remote Power Side-Channel Attacks on BNN Accelerators in FPGAs



Stealing Machine Learning Parameters via Side Channel Power Attacks


Sensitive Information sentence examples within Preserving Sensitive Information



An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems



PROVISIONING LARGE-SCALED DATA WITH PARAMETERIZED QUERY PLANS: A CASE STUDY


Sensitive Information sentence examples within Hide Sensitive Information



PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing



Hiding sensitive information in eHealth datasets


Sensitive Information sentence examples within Providing Sensitive Information



The Relationship Between Patients’ Perceived Health Status and Trust Propensity and Privacy Calculus



Study of buried interfaces in Fe/Si multilayer by hard x‐ray emission spectroscopy


Sensitive Information sentence examples within Personal Sensitive Information



Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment



Privacy-Preserving Neural Network Inference Framework via Homomorphic Encryption and SGX


Sensitive Information sentence examples within Hiding Sensitive Information



Security protocol of sensitive high utility itemset hiding in shared IoT environments



GA-PPARM: constraint-based objective function and genetic algorithm for privacy preserved association rule mining


Sensitive Information sentence examples within Store Sensitive Information



Sneaking into Mobile



Ethical Issues in Social Work and Technology


Sensitive Information sentence examples within Sending Sensitive Information



Prevention and Detection of SQL Injection Attacks Using Generic Decryption



SYNTHG: Mimicking RDF Graphs Using Tensor Factorization


Sensitive Information sentence examples within Acces Sensitive Information



Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model



Collaborative Visual Analysis with Multi-level Information Sharing Using a Wall-Size Display and See-Through HMDs


Sensitive Information sentence examples within Targeting Sensitive Information



Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator



Towards a Fine-Grained Access Control Mechanism for Privacy Protection and Policy Conflict Resolution


Sensitive Information sentence examples within Derive Sensitive Information



Privacy Laws and Privacy by Design Schemes for the Internet of Things



Envisioning Tool Support for Designing Privacy-Aware Internet of Thing Applications


Sensitive Information sentence examples within User Sensitive Information



A Secure Multi Factor User Authentication Framework for Electronic Payment System



Logisticschain: A Blockchain-Based Secure Storage Scheme for Logistics Data


Sensitive Information sentence examples within Hold Sensitive Information



Deep restricted and additive homomorphic ElGamal privacy preservations over big healthcare data



An Intelligent Three-Level Digital Watermarking Method for Document Protection


Sensitive Information sentence examples within Maintain Sensitive Information



Realizing privacy aspects in blockchain networks



Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications


Sensitive Information sentence examples within Expose Sensitive Information



An Empirical Analysis of Hazardous Uses of Android Shared Storage



When Models Learn Too Much


Sensitive Information sentence examples within Variou Sensitive Information



A differential privacy based probabilistic mechanism for mobility datasets releasing



RGB Image Encryption using Hill Algorithm and Chaos System


Sensitive Information sentence examples within Time Sensitive Information



Robust Improvement of the Age of Information by Adaptive Packet Coding



Impact of Communication Method and Timeliness on Student and Faculty Perception of Professionalism and Value.


Sensitive Information sentence examples within Discover Sensitive Information



Research on the Computer Informatization in Multimedia Public Opinion Monitoring



De-identification is Insufficient to Protect Student Privacy, or – What Can a Field Trip Reveal?


Sensitive Information sentence examples within Gather Sensitive Information



Exploring the differences between men’s and women’s perceptions of gender-based violence in rural Tajikistan: a qualitative study



Phishing Website Detection Using Random Forest and Support Vector Machine: A Comparison


Sensitive Information sentence examples within Communicating Sensitive Information



Global Perspective on Telemedicine for Parkinson’s Disease



Parkinson/movement disorders



Sensitive Information
Encyclopedia