12,030 Hits in 5.9 sec

Analyzing Information Leakage of Updates to Natural Language Models [article]

Marc Brockschmidt, Boris Köpf, Olga Ohrimenko, Andrew Paverd, Victor Rühle, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin
2020 arXiv   pre-print
We propose two new metrics---differential score and differential rank---for analyzing the leakage due to updates of natural language models.  ...  We show that a differential analysis of language model snapshots before and after an update can reveal a surprising amount of detailed information about changes in the training data.  ...  Concretely, we analyze whether including a large enough additional dataset D extra in an update can prevent leakage of information about the rest of the data used.  ... 
arXiv:1912.07942v3 fatcat:dbkzvycmzzejdipfndzzmkxibq

Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions

Yufei Zhao, Liqun Yang, Zhoujun Li, Longtao He, Yipeng Zhang
2021 IEEE Access  
To this end, we establish a privacy model for each extension, which contains the sensitive information permitted to be used and servers authorized to communicate with.  ...  We further conduct a comprehensive analysis of the results including calculating the precision, recall, accuracy, and F1 score for each type of leakage, and show the information leaked by different extension  ...  Since there is no clear boundary in Chinese, we need to complete Chinese natural language processing(NLP) through Chinese word segmentation.  ... 
doi:10.1109/access.2021.3063814 fatcat:d5n2cwaz2bgbfce4bxyde24p64

A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices

Xiang Yu, Zhihong Tian, Jing Qiu, Feng Jiang
2018 Wireless Communications and Mobile Computing  
Our approach updates cluster graph structure based on CBDLP (Data Leakage Protection Based on Context) model by computing the importance of confidential terms and the terms within the range of their context  ...  However, with the high dimensionality and redundancy of text data, it is difficult to detect the documents which contain confidential contents accurately.  ...  Acknowledgments The research is supported by the National Natural Science Foundation of China under Grant nos. 61871140 and 61572153.  ... 
doi:10.1155/2018/5823439 fatcat:fq7p6uj6wzck3htzovkuinsxs4

Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model [chapter]

Joël Alwen, Yevgeniy Dodis, Daniel Wichs
2009 Lecture Notes in Computer Science  
Moreover, our schemes can be flexibly extended to the Bounded-Retrieval Model, allowing us to tolerate very large absolute amount of adversarial leakage (potentially many gigabytes of information), only  ...  Lastly, we show that our schemes allow for repeated "invisible updates" of the secret key, allowing us to tolerate up to bits of leakage in between any two updates, and an unlimited amount of leakage overall  ...  To do so, we must first decide on an appropriate model of what information the adversary can learn during a leakage attack.  ... 
doi:10.1007/978-3-642-03356-8_3 fatcat:xadyh4kh5fdxvc3v2aky4qwbby

The Exclusive Search Engine Designed for Personalized Second Language Chinese Learner

Chen Lin, Xu Yan
2012 International Journal of Education and Management Engineering  
In this paper, the characteristics and demand of the current second language acquisition will be analyzed, and then the details of the three parts of precision and efficiency provided to the second language  ...  It focuses on three detail parts: extraction of individual information of learners, extraction of Web pages, acquisition of the data of Web database.  ...  to achieve the information extraction. 5) Improving on the ontology and natural language processing.  ... 
doi:10.5815/ijeme.2012.11.02 fatcat:jmcn6n4dhjhqvoewzin2trgebi

Transcormer: Transformer for Sentence Scoring with Sliding Language Modeling [article]

Kaitao Song, Yichong Leng, Xu Tan, Yicheng Zou, Tao Qin, Dongsheng Li
2022 arXiv   pre-print
Sentence scoring aims at measuring the likelihood score of a sentence and is widely used in many natural language processing scenarios, like reranking, which is to select the best sentence from multiple  ...  information for the probability estimation of a sentence without considering bidirectional context, which affects the scoring quality; 2) MLM can only estimate the probability of partial tokens at a time  ...  (the tokens before and after it) to avoid any information leakage.  ... 
arXiv:2205.12986v3 fatcat:fwmghxnkazfp7iwafor3nhhr7a

Quantitative Analysis of Secure Information Flow via Probabilistic Semantics

Chunyan Mu, David Clark
2009 2009 International Conference on Availability, Reliability and Security  
The major contribution is an automatic quantitative analyzer based on the leakage definition for such a language.  ...  In this paper, we quantify leakage in terms of information theory and incorporate this computation into probabilistic semantics.  ...  ACKNOWLEDGMENT This research is supported in part by the EPSRC grant EP/C009967/1 Quantitative Information Flow.  ... 
doi:10.1109/ares.2009.88 dblp:conf/IEEEares/MuC09 fatcat:dzcr5gmwzngnniwv7gwz4efu4y

Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification [article]

Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
2020 IACR Cryptology ePrint Archive  
Our approach is based on a Domain Specific Language in which users can write efficient assembly implementations and fine-grained leakage models.  ...  The latter are then used as a basis for formal verification, allowing for the first time formal guarantees for a broad range of device-specific leakage effects not addressed by prior work.  ...  Every detected leakage was analyzed and added to the model, again guided by tests according to [PV17] , until no leakage was detectable anymore.  ... 
dblp:journals/iacr/BartheGGOPP20 fatcat:grapmuk72zgs5f4gpzwlgujnka

Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification

Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
2021 Transactions on Cryptographic Hardware and Embedded Systems  
Our approach is based on a Domain Specific Language in which users can write efficient assembly implementations and fine-grained leakage models.  ...  The latter are then used as a basis for formal verification, allowing for the first time formal guarantees for a broad range of device-specific leakage effects not addressed by prior work.  ...  Higher Education, Research and the Arts within their joint support of the National Research Center for Applied Cybersecurity ATHENE, and by the Emmy Noether Program FA 1320/1-1.  ... 
doi:10.46586/tches.v2021.i2.189-228 fatcat:r73y4qoq65c77pihwo6ovlpwn4

Harvesting and analysis of weak signals for detecting lone wolf terrorists

Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson
2013 Security Informatics  
We also present a number of different technologies which can be used to harvest and analyze pieces of information from Internet that may serve as weak digital traces that can be fused using the suggested  ...  However, these individuals often make use of Internet to spread their beliefs and opinions, and to obtain information and knowledge to plan an attack.  ...  Acknowledgements This research was financially supported by the Swedish Governmental Agency for Innovation Systems (VINNOVA) through the VINNMER program, and by the R&D program of the Swedish Armed Forces  ... 
doi:10.1186/2190-8532-2-11 fatcat:p3twoi2k6fgs7oambhlwtvbzs4

Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment

KM Asif, Sheikh I Ahamed, Nilothpal Talukder
2007 Computer Software and Applications Conference (COMPSAC) Proceedings of the IEEE International  
Availability of information regarding users may lead to privacy violations while communicating with others for services and resources.  ...  Our model exploits the concepts of policies and ordered binary decision diagrams.  ...  Our model will be extensible to focus the metrics of the privacy requirements to suit the specific needs of the applications.  ... 
doi:10.1109/compsac.2007.84 dblp:conf/compsac/AsifAT07 fatcat:hv4kpig6hfafxo7xiojrxlpf7a

Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis [article]

Raúl Pardo, Willard Rafnsson, Christian Probst, Andrzej Wąsowski
2021 arXiv   pre-print
Privug is a tool-supported method to explore information leakage properties of data analytics and anonymization programs.  ...  We show that Privug is accurate, scalable, and applicable to a range of leakage analysis scenarios.  ...  Black-box methods estimate leakage by analyzing a set of input/output pairs of the system.  ... 
arXiv:2011.08742v5 fatcat:mechsiah25fxjdc6hsmbkf25au

Comparative Analysis of Leakage Tools on Scalable Case Studies [chapter]

Fabrizio Biondi, Axel Legay, Jean Quilbeuf
2015 Lecture Notes in Computer Science  
We analyze both case studies with three state-of-the-art information leakage computation tools: LeakWatch, Moped-QLeak, and our tool QUAIL equipped with a new trace analysis algorithm.  ...  Quantitative security techniques have been proven effective to measure the security of systems against various types of attackers.  ...  The language allows the user to program naturally with constants, arrays, and loops, and QUAIL compiles such language in an if-goto Markovian semantics.  ... 
doi:10.1007/978-3-319-23404-5_17 fatcat:7nltogz7vfhwjlxqtrws4kkimu

Breaking the Chain of Gradient Leakage in Vision Transformers [article]

Yahui Liu, Bin Ren, Yue Song, Wei Bi, Nicu Sebe, Wei Wang
2022 arXiv   pre-print
As a side effect, it makes the ViTs tend to be position sensitive and at high risk of privacy leakage.  ...  To deal with the aforementioned contradiction, we propose a simple yet efficient Masked Jigsaw Puzzle (MJP) method to break the chain of gradient leakage in ViTs.  ...  However, this is out of the scope of this paper. We leave these interesting observations to the future work.  ... 
arXiv:2205.12551v1 fatcat:uftss7iguvbexar4phtjetag5q

Development on Gas Leak Detection and Location System Based on Wireless Sensor Networks: A Review

Miss. Sindhu S Kale, Amairullah Khan
2014 International Journal of Engineering Trends and Technoloy  
Main purpose of this system model is to avoid damages and locate the leakage point. These problems can be solved with the help of WSN based on ZIGBEE.  ...  The collected information is sent to the central monitoring unit to update the data. Data are continuously transmitted from ZIGBEE sensor nodes 2 to ZIG-BEE coordinator.  ...  The collected information is sent to the monitoring client or user to update the data. Data packets are continuously transmitted from sensor nodes and communication devices. Andrey Somov et al.  ... 
doi:10.14445/22315381/ijett-v12p260 fatcat:a6ai23r4ejbq7ks5rzlixw2sq4
« Previous Showing results 1 — 15 out of 12,030 results