Essays about: "white-box"
Showing result 1 - 5 of 23 essays containing the word white-box.
-
1. Towards Building Privacy-Preserving Language Models: Challenges and Insights in Adapting PrivGAN for Generation of Synthetic Clinical Text
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : The growing development of artificial intelligence (AI), particularly neural networks, is transforming applications of AI in healthcare, yet it raises significant privacy concerns due to potential data leakage. As neural networks memorise training data, they may inadvertently expose sensitive clinical data to privacy breaches, which can engender serious repercussions like identity theft, fraud, and harmful medical errors. READ MORE
-
2. Harmonisk strömsimulering i inverterbaserade värmepumpar
University essay from Umeå universitet/Institutionen för fysikAbstract : An electrical distribution network supplies power to many households at a time. Each house has various types of electrical appliances which consume different levels of power depending on its function and the load it supplies. An ideal case would be when no appliances cause power disturbances, however, in reality, many electrical appliances (e.g. READ MORE
-
3. Guidelines for white box penetration testing wired devices in secure network environments
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the security of systems by conducting penetration tests. There are several large and established frameworks for doing so, and they tend to focus on complicated large systems with multiple endpoints, devices, and network layers. READ MORE
-
4. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE
-
5. EXPLORING TEST CASE DESIGN APPROACHES FOR META-LEARNING MODELS
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Meta-learning, which allows individuals to learn from a collection of algorithms, is currently one of the most essential and cutting-edge deep-learning issues. Because of their widespread applicability, these algorithms are inextricably linked to essential systems and human lives, and the necessity to test and debug such crucial systems is apparent. READ MORE