Searched for: subject%3A%22Privacy%22
(1 - 20 of 89)

Pages

document
de Jong, J. (author), Kamphorst, B. (author), Kroes, S. (author)
We present a differentially private extension of the block coordinate descent algorithm by means of objective perturbation. The algorithm iteratively performs linear regression in a federated setting on vertically partitioned data. In addition to a privacy guarantee, we derive a utility guarantee; a tolerance parameter indicates how much the...
article 2022
document
Rooij S.B. van, (author), Bouma, H. (author), van Mil, J.D. (author), ten Hove, R.J.M. (author)
The increasing complexity of security challenges requires Law Enforcement Agencies (LEAs) to have improved analysis capabilities, e.g., with the use of Artificial Intelligence (AI). However, it is challenging to make large enough high-quality training and testing datasets available to the community that is developing AI tools to support LEAs in...
conference paper 2022
document
Spini, G. (author), Mancini, E. (author), Attema, T. (author), Abspoel, M. (author), de Gier, J. (author), Fehr, S. (author), Veugen, T. (author), van Heesch, M. (author), Worm, D. (author), de Luca, A. (author), Cramer, R. (author), Sloot, P.M.A. (author)
BackgroundHIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments based on clinical trials and expert knowledge. The usability of some CDSSs for HIV treatment would be significantly improved by using the...
article 2022
document
de Boer, M.H.T. (author), Vethman, S. (author), Bakker, R.M. (author), Adhikari, A. (author), Marcus, M.J.H. (author), de Greeff, J. (author), van der Waa1, J. (author), Schoonderwoerd, T.A.J. (author), Tolios, I. (author), van Zoelen, E.M. (author), Hillerström, F.H.J. (author), Kamphorst, B.J. (author)
conference paper 2022
document
Kamphorst, B. (author), Rooijakkers, T. (author), Veugen, T. (author), Cellamare, M. (author), Knoors, D. (author)
article 2022
document
le Feber, M. (author), Jadoenathmisier, T. (author), Goede, H. (author), Kuijpers, E. (author), Pronk, A. (author)
Will sensor-based exposure assessment be the future in workplace settings? Static instruments with embedded sensors are already applied to monitor levels of dangerous substances-in the context of acute health effects-at critical locations. However, with wearable, lightweight, miniaturized (low-cost) sensors developing quickly, much more is...
article 2021
document
Veugen, P.J.M. (author), Kamphorst, B (author), van de L'Isle, N. (author), van Egmond, M.B. (author)
We show how multiple data-owning parties can collabora tively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a...
conference paper 2021
document
van Egmond, M.B. (author), Spini, G. (author), van der Galien, O. (author), IJpma, A. (author), Veugen, P.J.M. (author), Kaaij, W. (author), Sangers, A. (author), Rooijakkers, T. (author), Langenkamp, P. (author), Kamphorst, B. (author), van de L'Isle, N. (author), Kooij-Janic, M. (author)
Background: Recent developments in machine learning have shown its potential impact for clinical use such as risk prediction, prognosis, and treatment selection. However, relevant data are often scattered across diferent stakehold ers and their use is regulated, e.g. by GDPR or HIPAA. As a concrete use-case, hospital Erasmus MC and health...
article 2021
document
van Haaften, W. (author), Sangers, A. (author), Engers, T. (author), Djafari, s. (author)
Analysing combined data sets can result in signifi cant added value for many organisations, but the GDPR has put strict constraints on processing personal data. Anonymization by using Multi-Party Computation (MPC) however may off er organizations some relief of the perceived burden of GDPR under specifi c conditions. In this paper, we will...
conference paper 2020
document
Bachlechner, D. (author), van Leishout, M.J. (author), Timan, T. (author)
Privacy has long been perceived as a hindrance to innovation. It has been considered to raise costs for data governance without providing real benefits. However, the attitude of various stakeholders towards the relationship between privacy and innovation has started to change. Privacy is increasingly embraced as an enabler of innovation, given...
bookPart 2020
document
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)
Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...
conference paper 2020
document
van der Sanden, B. (author), Vasenev, A. (author)
conference paper 2020
document
Kraaij, W. (author), Verberne, S. (author), Koldijk, S. (author), de Korte, E. (author), van Dantzig, S. (author), Sappelli, M. (author), Shoaib, M. (author), Bosems, S. (author), Achterkamp, R. (author), Bonomi, A. (author), Schavemaker, J. (author), Hulsebosch, B. (author), Wabeke, T. (author), Vollenbroek-Hutten, M. (author), Neerincx, M. (author), Sinderen, M. (author)
Recent advances in wearable sensor technology and smartphones enable simple and affordable collection of personal analytics. This paper reflects on the lessons learned in the SWELL project that addressed the design of user-centered ICT applications for self-management of vitality in the domain of knowledge workers. These workers often have a...
article 2020
document
Lefeber, M. (author)
Sensoren genereren data en met digitale data kun je veel automatiseren. De mogelijkheden van data based kunstmatige intelligentie lijken oneindig. Maar kunnen sensoren oak bijdragen aan een gezonde en veilige werkplek? En hoe zit het met de ethiek en de privacy? Vakmedianet
article 2020
document
Riva, G.M. (author), Vasenev, A. (author), Zannone, N. (author)
The processing of personal data is becoming a key business factor, especially for high-tech system industries such as automotive and healthcare service providers. To protect such data, the European Union (EU) has introduced the General Data Protection Regulation (GDPR), with the aim to standardize and strengthen data protection policies across...
conference paper 2020
document
Liu, L.C. (author), Sileno, G. (author), van Engers, T. (author)
The combination of smart contracts with blockchain technology enables the authentication of the contract and limits the risks of non-compliance. In principle, smart contracts can be processed more efficiently compared to traditional paper-based contracts. However, current smart contracts have very limited capabilities with respect to normative...
conference paper 2020
document
van Binsbergen, L.T. (author), Liu, L.C. (author), van Doesburg, R. (author), van Engers, T. (author)
conference paper 2020
document
mohajeri Parizi, M. (author), Sileno, G. (author), van Engers, T. (author)
Computational agents based upon the belief-desire-intention (BDI) architecture generally use reactive rules to trigger the execution of plans. For various reasons, certain plans might be preferred over others at design time. Most BDI agents platforms use hard-coding these preferences in some form of the static ordering of the reactive rules, but...
conference paper 2019
document
Honig, J.J. (author), Everts, M.H. (author), Huisman, M. (author)
Solidity smart contracts operate in a hostile environment, which introduces the need for the adequate application of testing techniques to ensure mitigation of the risk of a security incident. Mutation testing is one such technique. It allows for the evaluation of the efficiency of a test suite in detecting faults in a program, allowing...
conference paper 2019
document
Lloyd, C. (author), Mannucci, T. (author), Bouma, H. (author), Schutte, K. (author), Huizing, A. (author)
In recent years advances in machine learning methods such as deep learning has led to significant improvements in our ability to track people and vehicles, and to recognise specific individuals. Such technology has enormous potential to enhance the performance of image-based security systems. However, wide-spread use of such technology has...
conference paper 2019
Searched for: subject%3A%22Privacy%22
(1 - 20 of 89)

Pages