Essays about: "information leakage"

Showing result 1 - 5 of 107 essays containing the words information leakage.

  1. 1. Case Study: Assessing the Security of a ZigBee Smart HomeNetwork

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Robal Saker; Obaida Abu Issa; [2024]
    Keywords : ZigBee; vulnerabilities; smart home; technical user; non-technical user;

    Abstract : Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. READ MORE

  2. 2. Digital Front End Algorithms for Sub-Band Full Duplex

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Midhat Rizvi; Khaled Al-Khateeb; [2023]
    Keywords : Adjacent Channel Leakage Ratio; Bit Error Rate; Clipping and Filtering; Crest Factor Reduction; Digital front end; Digital Pre-Distortion Error Vector Magnitude; Frequency Division Duplex; Power Amplifier; Peak to Average Power Ratio; Peak Cancellation Crest Factor Reduction; Sub Band Full Duplex; Self-Interference Cancellation; Signal-to-Interference Noise Ratio; Signal-to-Noise Ratio; Turbo Clipping; Time Division Duplex; Technology and Engineering;

    Abstract : Sub-band full duplex is a new communication scheme technology, where a single frequency band is partitioned into sub-bands for downlink (DL) and up-link(UL) transmissions, and both can take place simultaneously. The idea behind the sub-band full duplex development is to improve the throughput, and coverage and reduce the latency of the UL communication by allowing the UL reception during the DL transmission. READ MORE

  3. 3. Status Mapping of tank to grave management of Low-GWP refrigerants.

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Sandra Parra Gimeno; [2023]
    Keywords : Refrigerant; Blends; Synthetic low-GWP refrigerant; Natural refrigerant; Global Warming Potential GWP ; Tank-to-grave; Interviews.; Köldmedier; Blandning; Globalt uppvärmningspotential GWP ; Låg-GWP köldmedier; Naturligt köldmedier; installation till destruktion; Intervjuer.;

    Abstract : Refrigeration plays a vital role today in various residential, commercial, and industrial processes, requiring refrigerants to facilitate the cooling or heating processes. Over time, refrigerants have undergone significant changes to meet technological, social, environmental, and economic needs. READ MORE

  4. 4. Towards Building Privacy-Preserving Language Models: Challenges and Insights in Adapting PrivGAN for Generation of Synthetic Clinical Text

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Atena Nazem; [2023]
    Keywords : Generative Adversarial Networks; privacy-preserving language models; clinical text data; reinforcement learning; synthetic data;

    Abstract : The growing development of artificial intelligence (AI), particularly neural networks, is transforming applications of AI in healthcare, yet it raises significant privacy concerns due to potential data leakage. As neural networks memorise training data, they may inadvertently expose sensitive clinical data to privacy breaches, which can engender serious repercussions like identity theft, fraud, and harmful medical errors. READ MORE

  5. 5. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE