|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|
|
|
|
Ali Abbasi Tadi, Saroj Dayal, Dima Alhadidi and Noman Mohammed
The vulnerability of machine learning models to membership inference attacks, which aim to determine whether a specific record belongs to the training dataset, is explored in this paper. Federated learning allows multiple parties to independently train a...
ver más
|
|
|
|
|
|
|
Alessandro Bocci, Stefano Forti, Roberto Guanciale, Gian-Luigi Ferrari and Antonio Brogi
The security of Cloud applications is a major concern for application developers and operators. Protecting users? data confidentiality requires methods to avoid leakage from vulnerable software and unreliable Cloud providers. Recently, trusted execution ...
ver más
|
|
|
|
|
|
|
Juncheng Mi and Guoqin Huang
Direct-drive electro-hydraulic servo valves are widely used in the aerospace industry, in the military, and in remote sensing control, but there is little research and discussion on their performance degradation and service life prediction. Based on prev...
ver más
|
|
|
|
|
|
|
Zacharias Anastasakis, Terpsichori-Helen Velivassaki, Artemis Voulkidis, Stavroula Bourou, Konstantinos Psychogyios, Dimitrios Skias and Theodore Zahariadis
Federated Learning is identified as a reliable technique for distributed training of ML models. Specifically, a set of dispersed nodes may collaborate through a federation in producing a jointly trained ML model without disclosing their data to each othe...
ver más
|
|
|
|
|
|
|
Gaia Gambarelli and Aldo Gangemi
The pervasiveness of dialogue systems and virtual conversation applications raises an important theme: the potential of sharing sensitive information, and the consequent need for protection. To guarantee the subject?s right to privacy, and avoid the leak...
ver más
|
|
|
|
|
|
|
Johanna Merisalu, Jonas Sundell and Lars Rosén
Construction below the ground surface and underneath the groundwater table is often associated with groundwater leakage and drawdowns in the surroundings which subsequently can result in a wide variety of risks. To avoid groundwater drawdown-associated d...
ver más
|
|
|
|
|
|
|
Ann E. A. Blomberg, Ivar-Kristian Waarum, Christian Totland and Espen Eek
Carbon capture and storage (CCS) could significantly contribute to reducing greenhouse gas emissions and reaching international climate goals. In this process, CO2 is captured and injected into geological formations for permanent storage. The injected pl...
ver más
|
|
|
|
|
|
|
Anne Tuomela, Anna-Kaisa Ronkanen, Pekka M. Rossi, Anssi Rauhala, Harri Haapasalo and Kauko Kujala
Geomembranes are used worldwide as basin liners in tailings ponds to decrease the permeability of the foundation and prevent further transportation of harmful contaminants and contaminated water. However, leakage into the environment and damage to the ge...
ver más
|
|
|
|
|
|
|
Contantin BRATIANU
Pág. 593 - 607
In the knowledge economy, knowledge becomes a strategic resource for any company contributing significantly to achieving its competitive advantage. Knowledge risk is associated with any knowledge activity which is done under the pressure of uncertainty. ...
ver más
|
|
|
|