Essays about: "white-box"

Showing result 1 - 5 of 23 essays containing the word white-box.

  1. 1. Towards Building Privacy-Preserving Language Models: Challenges and Insights in Adapting PrivGAN for Generation of Synthetic Clinical Text

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Atena Nazem; [2023]
    Keywords : Generative Adversarial Networks; privacy-preserving language models; clinical text data; reinforcement learning; synthetic data;

    Abstract : The growing development of artificial intelligence (AI), particularly neural networks, is transforming applications of AI in healthcare, yet it raises significant privacy concerns due to potential data leakage. As neural networks memorise training data, they may inadvertently expose sensitive clinical data to privacy breaches, which can engender serious repercussions like identity theft, fraud, and harmful medical errors. READ MORE

  2. 2. Harmonisk strömsimulering i inverterbaserade värmepumpar

    University essay from Umeå universitet/Institutionen för fysik

    Author : Alexander Magnusson; [2023]
    Keywords : Current harmonics; inverter-driven compressor; black box simulation;

    Abstract : An electrical distribution network supplies power to many households at a time. Each house has various types of electrical appliances which consume different levels of power depending on its function and the load it supplies. An ideal case would be when no appliances cause power disturbances, however, in reality, many electrical appliances (e.g. READ MORE

  3. 3. Guidelines for white box penetration testing wired devices in secure network environments

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Daniel Le Vandolph; [2023]
    Keywords : Penetration test; security assessment; white box; secure network; framework; methodology; guidelines;

    Abstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE

  4. 4. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  5. 5. EXPLORING TEST CASE DESIGN APPROACHES FOR META-LEARNING MODELS

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Farzaneh Alsadat Seyedshahi; [2022]
    Keywords : Meta-learning; Test;

    Abstract : Meta-learning, which allows individuals to learn from a collection of algorithms, is currently one of the most essential and cutting-edge deep-learning issues. Because of their widespread applicability, these algorithms are inextricably linked to essential systems and human lives, and the necessity to test and debug such crucial systems is apparent. READ MORE