all InfoSec news
Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints. (arXiv:2201.03948v3 [cs.IT] UPDATED)
Aug. 2, 2022, 1:20 a.m. | Onur Günlü
cs.CR updates on arXiv.org arxiv.org
The problem of reliable function computation is extended by imposing privacy,
secrecy, and storage constraints on a remote source whose noisy measurements
are observed by multiple parties. The main additions to the classic function
computation problem include 1) privacy leakage to an eavesdropper is measured
with respect to the remote source rather than the transmitting terminals'
observed sequences; 2) the information leakage to a fusion center with respect
to the remote source is considered as a new privacy leakage metric; …
More from arxiv.org / cs.CR updates on arXiv.org
One-shot Empirical Privacy Estimation for Federated Learning
1 day, 6 hours ago |
arxiv.org
Transferability Ranking of Adversarial Examples
1 day, 6 hours ago |
arxiv.org
A survey on hardware-based malware detection approaches
1 day, 6 hours ago |
arxiv.org
Explainable Ponzi Schemes Detection on Ethereum
1 day, 6 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Security Engineers
@ D. E. Shaw Research | New York City
Security Officer Level 1 (L1)
@ NTT DATA | Virginia, United States of America
Alternance - Analyste VOC - Cybersécurité - Île-De-France
@ Sopra Steria | Courbevoie, France
Senior Security Researcher, SIEM
@ Huntress | Remote US or Remote CAN
Cyber Security Engineer Lead
@ ASSYSTEM | Bridgwater, United Kingdom