Showing 1 - 16 results of 16 for search '"data protection"', query time: 0.07s Refine Results
  1. 1

    Data protection with unlearnable examples by Ma, Xiaoyu

    Published 2024
    Subjects:
    Get full text
    Final Year Project (FYP)
  2. 2

    Privacy and data protection campaign for businesses. by Chia, Jiet Ling., Lee, Joanna Peiru., Seah, Jaclynn Su Yen.

    Published 2008
    “…Privacy and data protection is an area that is often overlooked or regarded as unimportant by Singaporean businesses. …”
    Get full text
    Final Year Project (FYP)
  3. 3
  4. 4

    Using fear appeals to promote data protection on social media by Kesuma Kwee, Erika Amelia, Chan, Faith, Lee, Pei Shan, Tan, Jaz-Ley

    Published 2019
    “…In this study, an online experiment was conducted to investigate how fear appeals work in promoting the adoption of data protection behaviour on social media using the Extended Parallel Process Model (EPPM). …”
    Get full text
    Final Year Project (FYP)
  5. 5

    Enhancing data protection and parcel security in crowd-shipping platforms: user perspectives and system ramifications by Tang, Edmund Kwee Kong

    Published 2023
    “…Drawing upon both survey insights and external sources, this research explores major data protection incidents and security breaches in the crowd-shipping sector in Singapore. …”
    Get full text
    Final Year Project (FYP)
  6. 6

    Data obfuscation by logic synthesis by Tan, Stella Pei Fen

    Published 2016
    “…Even though there are no definite guarantees in data protection, it is possible to devise a complex data obfuscation technique to make retrieving the data from scratch time consuming and impractical. …”
    Get full text
    Final Year Project (FYP)
  7. 7

    Prediction and inference in uncertain times and places by Chia, Darryl Shen Yang

    Published 2024
    “…Coordinates of locations are sometimes jittered in publicly available geostatistical datasets for privacy reasons such as data protection. This paper aims to analyse the effect of jittering on the actual measurements recorded at each location by using a few spatial interpolation methods on simulated data and actual data. …”
    Get full text
    Final Year Project (FYP)
  8. 8

    Modeling of remote backup system by Chan, Kwun Hok.

    Published 2009
    “…On the remote site, the administrators or engineers will perform data protection to ensure near-zero data loss in the event of a disaster. …”
    Get full text
    Final Year Project (FYP)
  9. 9

    Automated abuse detection of privacy policy by Tan, Soo Yong

    Published 2021
    “…Therefore, privacy policies are intended to describe their data privacy practices and in recent years, there have been regulatory restrictions such as the General Data Protection Regulation (GDPR) that serves as a guideline for such practices. …”
    Get full text
    Final Year Project (FYP)
  10. 10

    Design of an SRAM-based physical unclonable function system by Liu, Chao Qun

    Published 2015
    “…Safety has been a critical concern in traditional data protection schemes. Placing the secret key in non-volatile memory makes protecting the key difficult and expensive if not impossible. …”
    Get full text
    Final Year Project (FYP)
  11. 11

    A survey of cybersecurity laws and a web-based visualization system of survey results by Lim, Cedric

    Published 2019
    “…The results of which showed that Privacy, Data Protection, Internet Regulation, Anti- Phishing/Spam and Encryption laws play an extremely important part in cybersecurity. …”
    Get full text
    Final Year Project (FYP)
  12. 12

    TrueGPT: can you privately extract algorithms from ChatGPT in tabular classification? by Soegeng, Hans Farrell

    Published 2024
    “…We validate the approach on 8 public tabular datasets, adding a user option to activate privacy-preserving feature to ensure owner data protection.…”
    Get full text
    Final Year Project (FYP)
  13. 13

    Learn cryptography encryption and decryption by building convolutional neural networks (CNNs) by Cai, Yu

    Published 2023
    “…The results have shown that it is achievable and with huge potential in data protection.…”
    Get full text
    Final Year Project (FYP)
  14. 14

    IP video surveillance storage system by Gani, Bram Prawira

    Published 2015
    “…Erasure coding is a method of data protection that splits data into smaller pieces and stored with additional redundancy pieces. …”
    Get full text
    Final Year Project (FYP)
  15. 15

    Smart sensing with edge intelligence for autonomous structural health monitoring by Khual, Thang Khan

    Published 2023
    “…Despite its benefits of better data protection and offloading data storage to edge devices while offering comparable performance, the FL based learning framework still needs improvements. …”
    Get full text
    Final Year Project (FYP)
  16. 16

    Agent designer by Li, Siyao

    Published 2015
    “…Those limitations, including limited access, difficult deployment, inflexibility in user operations, design workflows against typical Goal Net methodology workflows, and lack of data protection, have inhibited widespread adoption of Goal Net methodology. …”
    Get full text
    Final Year Project (FYP)