Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Synthetic Data--what, why and how?
This explainer document aims to provide an overview of the current state of the rapidly
expanding work on synthetic data technologies, with a particular focus on privacy. The …
expanding work on synthetic data technologies, with a particular focus on privacy. The …
An operational approach to information leakage
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …
Privacy games: Optimal user-centric data obfuscation
R Shokri - arxiv preprint arxiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
Decomposition instead of self-composition for proving the absence of timing channels
We present a novel approach to proving the absence of timing channels. The idea is to
partition the program's execution traces in such a way that each partition component is …
partition the program's execution traces in such a way that each partition component is …
An operational measure of information leakage
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
Additive and multiplicative notions of leakage, and their capacities
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …
Pointwise maximal leakage
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …
existing notion of maximal leakage, which quantifies the amount of information leaking about …
Qif-verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment
Hardware vulnerabilities are often due to design mistakes because the designer does not
sufficiently consider potential security vulnerabilities at the design stage. As a result, various …
sufficiently consider potential security vulnerabilities at the design stage. As a result, various …
An operational approach to information leakage via generalized gain functions
We introduce a gain function viewpoint of information leakage by proposing maximal-
leakage, a rich class of operationally meaningful leakage measures that subsumes recently …
leakage, a rich class of operationally meaningful leakage measures that subsumes recently …
Hypothesis testing under maximal leakage privacy constraints
The problem of publishing privacy-guaranteed data for hypothesis testing is studied using
the maximal leakage (ML) as a metric for privacy and the type-II error exponent as the utility …
the maximal leakage (ML) as a metric for privacy and the type-II error exponent as the utility …