-
621
Privacy leakage risk assessment for reversible neural network
Published 2023-08-01“…In recent years, deep learning has emerged as a crucial technology in various fields.However, the training process of deep learning models often requires a substantial amount of data, which may contain private and sensitive information such as personal identities and financial or medical details.Consequently, research on the privacy risk associated with artificial intelligence models has garnered significant attention in academia.However, privacy research in deep learning models has mainly focused on traditional neural networks, with limited exploration of emerging networks like reversible networks.Reversible neural networks have a distinct structure where the upper information input can be directly obtained from the lower output.Intuitively, this structure retains more information about the training data, potentially resulting in a higher risk of privacy leakage compared to traditional networks.Therefore, the privacy of reversible networks was discussed from two aspects: data privacy leakage and model function privacy leakage.The risk assessment strategy was applied to reversible networks.Two classical reversible networks were selected, namely RevNet and i-RevNet.And four attack methods were used accordingly, namely membership inference attack, model inversion attack, attribute inference attack, and model extraction attack, to analyze privacy leakage.The experimental results demonstrate that reversible networks exhibit more serious privacy risks than traditional neural networks when subjected to membership inference attacks, model inversion attacks, and attribute inference attacks.And reversible networks have similar privacy risks to traditional neural networks when subjected to model extraction attack.Considering the increasing popularity of reversible neural networks in various tasks, including those involving sensitive data, it becomes imperative to address these privacy risks.Based on the analysis of the experimental results, potential solutions were proposed which can be applied to the development of reversible networks in the future.…”
Get full text
Article -
622
A qualitative study on the internal response of medical students during the transgender healthcare education: a focus on professional identity
Published 2022-12-01“…Results By attending the transgender healthcare education program, students have shown three types of inner response—confusion, acceptance, and negotiation. The students’ personal identities and professional identities influenced these responses. …”
Get full text
Article -
623
AKUNTANSI KEPERILAKUAN ISTRI DI MATA SUAMI
Published 2023-09-01“…Theory and Practical Implications - Recognition will shape a person's identity so that a husband's background in accounting and finance should not trap how he views his wife. …”
Get full text
Article -
624
ANALISIS SISTEM ANTRIAN PADA KONDISI TIME DEPENDENT DAN MULTI PHASE (Studi Kasus di Kantor Imigrasi Kelas I Yogyakarta)
Published 2014“…The high human needs in making a cross country trip also led to high demand for making of a person's identity while abroad such as passport, residence permit, letter immigration status, and so forth. …”
Thesis -
625
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…Verification algorithm is developed using MATLAB (SIMULINK) function blocks which is capable of authenticating a person's identity by his or her voice pattern. A voice match will produce logic '1' while a mismatch, logic '0'. …”
Get full text
Conference or Workshop Item -
626
Navigating drug use, cessation, and recovery: a retrospective case notes review among sexual minority men at a community-based service in Singapore
Published 2024-04-01“…Additionally, managing one’s recovery was marked by four significant sub-themes: (a) uncovering personal identities, (b) losing motivation and drive, (c) overcoming obstacles, and (d) preparing for aftercare. …”
Get full text
Article -
627
Secure Message Handling in Vehicular Energy Networks Using Blockchain and Artificially Intelligent IPFS
Published 2022-01-01“…In the underlying work, the problems faced during message dissemination in the conventional Vehicular Energy Networks (VENs) like lack of security, breach of personal identities, absence of trust between vehicle owners, etc., are tackled. …”
Get full text
Article -
628
Developing the intersectionality supplemented Consolidated Framework for Implementation Research (CFIR) and tools for intersectionality considerations
Published 2023-11-01“…We developed recommendations and prompts to help researchers consider how personal identities and power structures may affect the facilitators and inhibitors of behavior change and the implementation of subsequent interventions. …”
Get full text
Article -
629
Cultura escolar, cultura surda e construção de identidades na escola School culture, deaf culture and identity construction within the school context
Published 2009-12-01“…<br>The present paper intends to analyze the issue of school culture, deaf culture and the influence both factors present in the construction of the deaf person's identity within the school context. The aim is to identify relevant aspects that connect, regulate or direct relations within the school and the impact they have in constituting the deaf student's sense of self. …”
Get full text
Article -
630
Home Here, Home There: The lives and Landscape within High-tech Trans-Pacific Commuter Culture
Published 2004-12-01“…Within the last two decades the issue of 'home identity' (how a home reflects a person's identity) has been an emerging topic within contemporary intellectual discourse in fields as diverse as Asian-American studies, anthropology, cultural geography, cultural studies, literary criticism and landscape architecture. …”
Get full text
Article -
631
-
632
Enhancing Individual Worker Risk Awareness: A Location-Based Safety Check System for Real-Time Hazard Warnings in Work-Zones
Published 2023-12-01“…A safety check system based on location tracking combining personal quick response code (QR code) recognition and computer vision technology to automatically identify workers’ personal identities and track their physical location was proposed. …”
Get full text
Article -
633
Applicant qualifications and characteristics in STEM faculty hiring: an analysis of faculty and administrator perspectives
Published 2023-06-01“…Second, faculty members’ institutional classification, position, and personal identities (e.g., gender, race/ethnicity) had an impact on their evaluation criteria. …”
Get full text
Article -
634
Advancing ECG Biometrics Through Vision Transformers: A Confidence-Driven Approach
Published 2023-01-01“…Over the past two decades, Electrocardiography (ECG) has gained significant momentum in the field of biometrics, offering a compelling alternative for person identity recognition based on physical/biological traits. …”
Get full text
Article -
635
Communicating identity among Malaysian students
Published 2011“…Although students supported „one voice, one country‟, there was a definite movement towards a personalized identity. The „one voice, one country‟ mindset may be idealistic in one sense. …”
Get full text
Thesis -
636
A framework of integrated continuous online learner with fuzzy neural network application in learning environment
Published 2021“…However, the general method of Personal Identification Number (pin) to verify the user does not guarantee a person's identity, because other people can use it. Even occasional visitors and users tend to pass their tokens or share their passwords with their colleagues to make their work easier. …”
Get full text
Get full text
Get full text
Thesis -
637
Designing national identity : recent capitols in the post-colonial world
Published 2005Get full text
Thesis -
638
Death Education among Social Science College Students: The Good, the Bad, and the Unchanged
Published 2022-10-01“…Personal identity is often dictated by the social roles a person fulfills (e.g., mother, son, partner, employee, etc.) and these social roles are defined by the greater family unit and surrounding social environments. …”
Get full text
Article -
639
Use of Pentosan Polysulfate in the Local Treatment of Reactive Arthritis in Children
Published 2016-05-01“…To study the action of this drug, we allocated 2 groups: the main (27 people), in which in addition to basic therapy, Thrombocid gel was applied topically, and control one (29 persons), identical in age and sex with the main group, in which we used only basic therapy. …”
Get full text
Article -
640
A mixed-methods approach to understanding the perspectives, experiences, and attitudes of a culturally tailored cognitive behavioral therapy/motivational interviewing intervention...
Published 2022-05-01“…Themes identified in focus groups included (1) intervention group social support through information sharing, (2) mental health and personal identities in diabetes understanding and management, and (3) receptivity to CBT/MI intervention positively impacts self-efficacy through improved health literacy. …”
Get full text
Article