Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 842 matches
- 2024
- Samuel Wairimu, Leonardo Horn Iwaya, Lothar Fritsch, Stefan Lindskog:
On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review. IEEE Access 12: 19625-19650 (2024) - Anatoliy A. Gruzd, Ángel Hernández-García:
A balancing act: how risk mitigation strategies employed by users explain the privacy paradox on social media. Behav. Inf. Technol. 43(1): 21-39 (2024) - Jiacheng Xu, Chengxiang Tan:
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks. Comput. Secur. 137: 103565 (2024) - Christopher B. Landis, Joshua A. Kroll:
Mitigating Inference Risks with the NIST Privacy Framework. Proc. Priv. Enhancing Technol. 2024(1): 217-231 (2024) - Wenjin Jin:
Security and privacy of digital economic risk assessment system based on cloud computing and blockchain. Soft Comput. 28(3): 2753-2768 (2024) - Hongyang Yan, Anli Yan, Li Hu, Jiaming Liang, Haibo Hu:
MTL-Leak: Privacy Risk Assessment in Multi-Task Learning. IEEE Trans. Dependable Secur. Comput. 21(1): 204-215 (2024) - Jian-Peng Chang, Hong-Liang Zheng, Abbas Mardani, Witold Pedrycz, Zhen-Song Chen:
Evaluating Holistic Privacy Risk Posed by Smart Home Ecosystem: A Capability-Oriented Model Accommodating Epistemic Uncertainty and Wisdom of Crowds. IEEE Trans. Engineering Management 71: 5372-5390 (2024) - Ratiros Phaenthong, Sudsanguan Ngamsuriyaroj:
Analyzing Security and Privacy Risks in Android Video Game Applications. AINA (6) 2024: 307-319 - Borna Kalhor, Sanchari Das:
Evaluating the Security and Privacy Risk Postures of Virtual Assistants. ICISSP 2024: 154-161 - Emmanuel Dare Alalade, Mohammed Mahyoub, Ashraf Matrawy:
Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach. CoRR abs/2401.09519 (2024) - Mahrokh Abdollahi Lorestani, Thilina Ranbaduge, Thierry Rakotoarivelo:
Privacy risk in GeoData: A survey. CoRR abs/2402.03612 (2024) - Zhenlong Liu, Lei Feng, Huiping Zhuang, Xiaofeng Cao, Hongxin Wei:
Mitigating Privacy Risk in Membership Inference by Convex-Concave Loss. CoRR abs/2402.05453 (2024) - Samantha Aziz, Oleg Komogortsev:
Assessing the Privacy Risk of Cross-Platform Identity Linkage using Eye Movement Biometrics. CoRR abs/2402.08655 (2024) - Ece Gumusel, Kyrie Zhixuan Zhou, Madelyn Rose Sanfilippo:
User Privacy Harms and Risks in Conversational AI: A Proposed Framework. CoRR abs/2402.09716 (2024) - Xinjian Luo, Yangfan Jiang, Fei Wei, Yuncheng Wu, Xiaokui Xiao, Beng Chin Ooi:
Exploring Privacy and Fairness Risks in Sharing Diffusion Models: An Adversarial Perspective. CoRR abs/2402.18607 (2024) - Chaoyi Zhu, Jiayi Tang, Hans Brouwer, Juan F. Pérez, Marten van Dijk, Lydia Y. Chen:
Quantifying and Mitigating Privacy Risks for Tabular Generative Models. CoRR abs/2403.07842 (2024) - Zhangheng Li, Junyuan Hong, Bo Li, Zhangyang Wang:
Shake to Leak: Fine-tuning Diffusion Models Can Amplify the Generative Privacy Risk. CoRR abs/2403.09450 (2024) - 2023
- Zheng Li:
On the privacy risks of machine learning models. Saarland University, Saarbrücken, Germany, 2023 - Stephan Wiefling:
Usability, security, and privacy of risk-based authentication. Ruhr University Bochum, Germany, 2023 - He Xinlei:
Privacy risk assessment of emerging machine learning paradigms. Saarland University, Saarbrücken, Germany, 2023 - Antonin Voyez:
Privacy risk analysis of large-scale temporal data : application to electricity consumption data. (Analyse des risques liés à la publication de données temporelles : application aux données de consommation électriques). University of Rennes 1, France, 2023 - Sakib Shahriar, Sonal Allana, Seyed Mehdi Hazratifard, Rozita Dara:
A Survey of Privacy Risks and Mitigation Strategies in the Artificial Intelligence Life Cycle. IEEE Access 11: 61829-61854 (2023) - Janine L. Spears, Ali Padyab:
Privacy risk in contact tracing systems. Behav. Inf. Technol. 42(2): 174-195 (2023) - Milad Taleby Ahvanooey, Mark Xuefang Zhu, Shiyan Ou, Hassan Dana Mazraeh, Wojciech Mazurczyk, Kim-Kwang Raymond Choo, Chuan Li:
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms. Comput. Secur. 130: 103263 (2023) - Nakia Grayson, Ronald Pulivarti, Bronwyn Hodges, Kevin Littlefield, Jeremy Miller, Chris Peloquin, Julie Snyder, Sue Wang, Ryan Williams:
Mitigating Privacy and Cybersecurity Risks Affecting Telehealth Remote Patient Monitoring Ecosystems. Computer 56(9): 50-61 (2023) - Murat Kantarcioglu:
A Risk-Aware Paradigm for Privacy-Preserving Machine Learning. IEEE Data Eng. Bull. 46(1): 4-8 (2023) - Yan Cheng, Shue Mei, Weijun Zhong, Xing Gao:
Managing consumer privacy risk: The effects of privacy breach insurance. Electron. Commer. Res. 23(2): 807-841 (2023) - Changnan Jiang, Chunhe Xia, Zhuodong Liu, Tianbo Wang:
FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems. Entropy 25(7): 1053 (2023) - Yanjun Zuo:
Big data and big risk: a four-factor framework for big data security and privacy. Int. J. Bus. Inf. Syst. 42(2): 224-242 (2023) - Ajay Sharma, Sumit Bhatt, Shyam Sundar Kapri, Anuj:
An examination of adoption of cash on delivery payment method among e-shoppers in India: role of perceived security, risk, privacy and trust. Int. J. Electron. Bus. 18(4): 373-391 (2023)
skipping 812 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 12:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint