Artificial Intelligence Cyber Security Strategy
暂无分享,去创建一个
[1] Enjie Liu,et al. Trustworthiness in the Patient Centred Health Care System , 2013, ISCTCS.
[2] Xiaohua Feng,et al. Challenges in ROS Forensics , 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[3] Sijing Zhang,et al. Mobile Computing and IoT: Radio Spectrum Requirement for Timely and Reliable Message Delivery Over Internet of Vehicles (IoVs) , 2020 .
[4] Vladimir Dyo,et al. Practical Hash-based Anonymity for MAC Addresses , 2020, ICETE.
[5] Alan F. Westin,et al. Special report: legal safeguards to insure privacy in a computer society , 1967, CACM.
[6] Adam Vaughan. The problems with contact-tracing apps , 2020, New Scientist.
[7] Daniel Riccio,et al. Biometric Authentication , 2014, Lecture Notes in Computer Science.
[8] J. Freedman,et al. Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .
[9] Serge Vaudenay,et al. Analysis of DP3T , 2020, IACR Cryptol. ePrint Arch..
[10] Ben Coppin,et al. Artificial Intelligence Illuminated , 2004 .
[11] S. Margulis. Privacy as a Social Issue and Behavioral Concept , 2003 .
[12] Hannes Federrath,et al. Hashing of personally identifiable information is not sufficient , 2018, Sicherheit.
[13] Garrett A. Johnson,et al. Consumer Privacy Choice in Online Advertising: Who Opts Out and at What Cost to Industry? , 2020, Mark. Sci..
[14] Xiaohua Feng,et al. Computer Laws Consideration on Smart City Data Planning of Chongli 2022 , 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[15] Alfred C. Weaver,et al. Biometric authentication , 2006, Computer.
[16] Josh Patterson,et al. Deep Learning: A Practitioner's Approach , 2017 .
[17] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .