Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1038/jp.2009.141 | DOI Listing |
PLoS One
January 2025
Department of Computer Science and Engineering at Hanyang University ERICA, Ansan-si, Gyeonggi-do, South Korea.
Privacy-preserving record linkage (PPRL) technology, crucial for linking records across datasets while maintaining privacy, is susceptible to graph-based re-identification attacks. These attacks compromise privacy and pose significant risks, such as identity theft and financial fraud. This study proposes a zero-relationship encoding scheme that minimizes the linkage between source and encoded records to enhance PPRL systems' resistance to re-identification attacks.
View Article and Find Full Text PDFPeerJ Comput Sci
November 2024
Research Center, Future University in Egypt, New Cairo, Egypt.
Neural Netw
December 2024
The School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, China.
Palm-vein has been widely used for biometric recognition due to its resistance to theft and forgery. However, with the emergence of adversarial attacks, most existing palm-vein recognition methods are vulnerable to adversarial image attacks, and to the best of our knowledge, there is still no study specifically focusing on palm-vein image attacks. In this paper, we propose an adversarial palm-vein image attack network that generates highly similar adversarial palm-vein images to the original samples, but with altered palm-identities.
View Article and Find Full Text PDFNeural Netw
December 2024
College of Cyber Security, Jinan University, Guangzhou, China. Electronic address:
In the era of Artificial Intelligence Generated Content (AIGC), face forgery models pose significant security threats. These models have caused widespread negative impacts through the creation of forged products targeting public figures, national leaders, and other Persons-of-interest (POI). To address this, we propose the Face Omron Ring (FOR) to proactively protect the POI from face forgery.
View Article and Find Full Text PDFSci Rep
August 2024
China Mobile Group Shaanxi Company Limited, Xi'an, 710000, China.
At present, social networks have become an indispensable medium in people's daily life and work. However, concerns about personal privacy leakage and identity information theft have also emerged. Therefore, a communication network system based on network slicing is constructed to strengthen the protection of communication network privacy.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!