-
1
Public interest vs private profit : striking the right balance in media ownership and control
Published 2008Get full text
Get full text
Conference Paper -
2
Utilizing virtual Singapore platform to quantify benefits of autonomous vehicles
Published 2021Get full text
Get full text
Conference Paper -
3
Increased Wage Inequality via ICTs: Making a Case for Human Capital Investment
Published 2017“…We advocate for further research to measure the impact of worker ownership in enterprises on productivity growth, and hence equality objectives.…”
Get full text
Get full text
Conference Paper -
4
Dip pen nanolithography and its potential for nanoelectronics
Published 2012“…Its main advantages are very high resolution, the unique capability to deposit many different materials directly onto a substrate and low cost of ownership. We present here new research and development efforts that demonstrate the potential of DPN as a tool to produce nanoelectronic devices and circuits. …”
Get full text
Get full text
Conference Paper -
5
Non-blind audio-watermarking using compression-expansion of signals
Published 2009“…As such, the possession of the original signal becomes important in the proof of ownership. In this paper, a non-blind audio-watermarking method is proposed. …”
Get full text
Get full text
Conference Paper -
6
Using EV Battery Packs for Vehicle-to-Grid Applications: An Economic Analysis
Published 2016“…Incentives through V2G can lead to reduced EV ownership cost, thus increasing their acceptance and overall penetration. …”
Get full text
Get full text
Conference Paper -
7
Fingerprinting deep neural networks - a DeepFool approach
Published 2021“…In this paper, we utilize the geometry characteristics inherited in the DeepFool algorithm to extract data points near the classification boundary of the target model for ownership verification. As the fingerprint is extracted after the training process has been completed, the original achievable classification accuracy will not be compromised. …”
Get full text
Conference Paper -
8
A buyer-traceable DNN model IP protection method against piracy and misappropriation
Published 2022“…The data-augmented images with a wrong label associated with a buyer are injected into the training dataset. The ownership and distributorship of a backdoor-trained user model can be validated by querying the suspect model with a set of composite triggers. …”
Get full text
Conference Paper