Showing 621 - 640 results of 645 for search '"personal identity"', query time: 0.14s Refine Results
  1. 621

    Privacy leakage risk assessment for reversible neural network by Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU

    Published 2023-08-01
    “…In recent years, deep learning has emerged as a crucial technology in various fields.However, the training process of deep learning models often requires a substantial amount of data, which may contain private and sensitive information such as personal identities and financial or medical details.Consequently, research on the privacy risk associated with artificial intelligence models has garnered significant attention in academia.However, privacy research in deep learning models has mainly focused on traditional neural networks, with limited exploration of emerging networks like reversible networks.Reversible neural networks have a distinct structure where the upper information input can be directly obtained from the lower output.Intuitively, this structure retains more information about the training data, potentially resulting in a higher risk of privacy leakage compared to traditional networks.Therefore, the privacy of reversible networks was discussed from two aspects: data privacy leakage and model function privacy leakage.The risk assessment strategy was applied to reversible networks.Two classical reversible networks were selected, namely RevNet and i-RevNet.And four attack methods were used accordingly, namely membership inference attack, model inversion attack, attribute inference attack, and model extraction attack, to analyze privacy leakage.The experimental results demonstrate that reversible networks exhibit more serious privacy risks than traditional neural networks when subjected to membership inference attacks, model inversion attacks, and attribute inference attacks.And reversible networks have similar privacy risks to traditional neural networks when subjected to model extraction attack.Considering the increasing popularity of reversible neural networks in various tasks, including those involving sensitive data, it becomes imperative to address these privacy risks.Based on the analysis of the experimental results, potential solutions were proposed which can be applied to the development of reversible networks in the future.…”
    Get full text
    Article
  2. 622

    A qualitative study on the internal response of medical students during the transgender healthcare education: a focus on professional identity by Seung Yeon Jeon, Hyun Bae Yoon, Jee Eun Park, Sun Young Lee, Jung won Yoon

    Published 2022-12-01
    “…Results By attending the transgender healthcare education program, students have shown three types of inner response—confusion, acceptance, and negotiation. The students’ personal identities and professional identities influenced these responses. …”
    Get full text
    Article
  3. 623

    AKUNTANSI KEPERILAKUAN ISTRI DI MATA SUAMI by Alsyahrani Raditya Putri, Krisno Septyan

    Published 2023-09-01
    “…Theory and Practical Implications - Recognition will shape a person's identity so that a husband's background in accounting and finance should not trap how he views his wife. …”
    Get full text
    Article
  4. 624

    ANALISIS SISTEM ANTRIAN PADA KONDISI TIME DEPENDENT DAN MULTI PHASE (Studi Kasus di Kantor Imigrasi Kelas I Yogyakarta) by , INDAH PUSPITASARI, , Nur Aini Masruroh, S.T., M.Sc., Ph.D.

    Published 2014
    “…The high human needs in making a cross country trip also led to high demand for making of a person's identity while abroad such as passport, residence permit, letter immigration status, and so forth. …”
    Thesis
  5. 625

    Security system using biometric technology: Design and implementation of voice recognition system (VRS) by A. Rashid, Rozeha, Mahalin, Nur Hija, Sarijari, Mohd. Adib, Abdul Aziz, Ahmad Aizuddin

    Published 2008
    “…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. A voice match will produce logic '1' while a mismatch, logic '0'. …”
    Get full text
    Conference or Workshop Item
  6. 626

    Navigating drug use, cessation, and recovery: a retrospective case notes review among sexual minority men at a community-based service in Singapore by Tzy Hyi Wah, Adeline Jia Xin Ong, Kuhanesan N. C. Naidu, Syaza Hanafi, Kelvin Tan, Alaric Tan, Tricia Jia Jing Ong, Eleanor Ong, Daniel Weng Siong Ho, Mythily Subramaniam, Maha Yewtuck See, Rayner Kay Jin Tan

    Published 2024-04-01
    “…Additionally, managing one’s recovery was marked by four significant sub-themes: (a) uncovering personal identities, (b) losing motivation and drive, (c) overcoming obstacles, and (d) preparing for aftercare. …”
    Get full text
    Article
  7. 627

    Secure Message Handling in Vehicular Energy Networks Using Blockchain and Artificially Intelligent IPFS by Muhammad Umar Javed, Abid Jamal, Eman H. Alkhammash, Myriam Hadjouni, Saeed Ali Bahaj, Nadeem Javaid

    Published 2022-01-01
    “…In the underlying work, the problems faced during message dissemination in the conventional Vehicular Energy Networks (VENs) like lack of security, breach of personal identities, absence of trust between vehicle owners, etc., are tackled. …”
    Get full text
    Article
  8. 628

    Developing the intersectionality supplemented Consolidated Framework for Implementation Research (CFIR) and tools for intersectionality considerations by Isabel B. Rodrigues, Christine Fahim, Yasmin Garad, Justin Presseau, Alison M. Hoens, Jessica Braimoh, Diane Duncan, Lora Bruyn-Martin, Sharon E. Straus

    Published 2023-11-01
    “…We developed recommendations and prompts to help researchers consider how personal identities and power structures may affect the facilitators and inhibitors of behavior change and the implementation of subsequent interventions. …”
    Get full text
    Article
  9. 629

    Cultura escolar, cultura surda e construção de identidades na escola School culture, deaf culture and identity construction within the school context by Liana Salmeron Botelho De Paula

    Published 2009-12-01
    “…<br>The present paper intends to analyze the issue of school culture, deaf culture and the influence both factors present in the construction of the deaf person's identity within the school context. The aim is to identify relevant aspects that connect, regulate or direct relations within the school and the impact they have in constituting the deaf student's sense of self. …”
    Get full text
    Article
  10. 630

    Home Here, Home There: The lives and Landscape within High-tech Trans-Pacific Commuter Culture by Shenglin Chang

    Published 2004-12-01
    “…Within the last two decades the issue of 'home identity' (how a home reflects a person's identity) has been an emerging topic within contemporary intellectual discourse in fields as diverse as Asian-American studies, anthropology, cultural geography, cultural studies, literary criticism and landscape architecture. …”
    Get full text
    Article
  11. 631
  12. 632

    Enhancing Individual Worker Risk Awareness: A Location-Based Safety Check System for Real-Time Hazard Warnings in Work-Zones by Younggi Hong, Jaeho Cho

    Published 2023-12-01
    “…A safety check system based on location tracking combining personal quick response code (QR code) recognition and computer vision technology to automatically identify workers’ personal identities and track their physical location was proposed. …”
    Get full text
    Article
  13. 633

    Applicant qualifications and characteristics in STEM faculty hiring: an analysis of faculty and administrator perspectives by Jue Wu, Torrie Cropps, Canek Moises Luna Phillips, Samara Boyle, Yvette E. Pearson

    Published 2023-06-01
    “…Second, faculty members’ institutional classification, position, and personal identities (e.g., gender, race/ethnicity) had an impact on their evaluation criteria. …”
    Get full text
    Article
  14. 634

    Advancing ECG Biometrics Through Vision Transformers: A Confidence-Driven Approach by Onorato D'angelis, Luca Bacco, Luca Vollero, Mario Merone

    Published 2023-01-01
    “…Over the past two decades, Electrocardiography (ECG) has gained significant momentum in the field of biometrics, offering a compelling alternative for person identity recognition based on physical/biological traits. …”
    Get full text
    Article
  15. 635

    Communicating identity among Malaysian students by Koleth, Rebecca John

    Published 2011
    “…Although students supported „one voice, one country‟, there was a definite movement towards a personalized identity. The „one voice, one country‟ mindset may be idealistic in one sense. …”
    Get full text
    Thesis
  16. 636

    A framework of integrated continuous online learner with fuzzy neural network application in learning environment by Sadikan, Siti Fairuz Nurr

    Published 2021
    “…However, the general method of Personal Identification Number (pin) to verify the user does not guarantee a person's identity, because other people can use it. Even occasional visitors and users tend to pass their tokens or share their passwords with their colleagues to make their work easier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 637
  18. 638

    Death Education among Social Science College Students: The Good, the Bad, and the Unchanged by Jennifer Zorotovich, Adrienne Lynn Cohen

    Published 2022-10-01
    “…Personal identity is often dictated by the social roles a person fulfills (e.g., mother, son, partner, employee, etc.) and these social roles are defined by the greater family unit and surrounding social environments. …”
    Get full text
    Article
  19. 639

    Use of Pentosan Polysulfate in the Local Treatment of Reactive Arthritis in Children by O.A. Danylov, V.F. Rybalchenko, M.O. Talko, S.V. Streltsova

    Published 2016-05-01
    “…To study the action of this drug, we allocated 2 groups: the main (27 people), in which in addition to basic therapy, Thrombocid gel was applied topically, and control one (29 persons), identical in age and sex with the main group, in which we used only basic therapy. …”
    Get full text
    Article
  20. 640

    A mixed-methods approach to understanding the perspectives, experiences, and attitudes of a culturally tailored cognitive behavioral therapy/motivational interviewing intervention... by Ronald M. Cornely, Vinita Subramanya, Ashley Owen, Robin E. McGee, Ambar Kulshreshtha

    Published 2022-05-01
    “…Themes identified in focus groups included (1) intervention group social support through information sharing, (2) mental health and personal identities in diabetes understanding and management, and (3) receptivity to CBT/MI intervention positively impacts self-efficacy through improved health literacy. …”
    Get full text
    Article