Tag

data leakage

0 views collected around this technical thread.

Efficient Ops
Efficient Ops
Feb 20, 2025 · Information Security

How a Maintenance Staff Leak Exposed Security Gaps and How to Prevent It

A recent case where a maintenance worker exploited device‑management flaws to steal confidential files for foreign spies highlights the need for heightened vigilance, strict self‑discipline, and prompt reporting, offering practical steps to safeguard against similar security breaches.

data leakageincident responseinformation security
0 likes · 4 min read
How a Maintenance Staff Leak Exposed Security Gaps and How to Prevent It
Java Architect Essentials
Java Architect Essentials
Feb 21, 2024 · Information Security

Student Information Leakage via Unauthenticated API in a University System

The article details a security case where an unauthenticated university API allowed an attacker to enumerate and download thousands of students' personal data by manipulating pagination parameters after discovering default credentials from a leaked PDF.

API enumerationVulnerability Analysisdata leakage
0 likes · 7 min read
Student Information Leakage via Unauthenticated API in a University System
DataFunTalk
DataFunTalk
Dec 12, 2023 · Artificial Intelligence

Challenges and Considerations of Recommendation Systems: Evaluation, Data Leakage, and the Role of Large Models

This article examines recommendation system problem definitions, differences between academia and industry, offline evaluation pitfalls and data leakage issues, data construction challenges with datasets like MovieLens, and evaluates whether large language models can serve as effective solutions for modern recommendation tasks.

Recommendation systemsdata leakagelarge language models
0 likes · 20 min read
Challenges and Considerations of Recommendation Systems: Evaluation, Data Leakage, and the Role of Large Models
DataFunSummit
DataFunSummit
Oct 23, 2023 · Artificial Intelligence

Large Models in Recommendation Systems: Evaluation Challenges, Data Leakage, and Practical Considerations

This article examines how large language models fit into recommendation systems by discussing problem definitions, offline evaluation pitfalls such as data leakage, dataset construction issues exemplified by MovieLens, and the practical limits of using LLMs as a universal solution.

MovieLensRecommendation systemsdata leakage
0 likes · 18 min read
Large Models in Recommendation Systems: Evaluation Challenges, Data Leakage, and Practical Considerations
DataFunSummit
DataFunSummit
Feb 14, 2023 · Information Security

Digital Watermarking Techniques for Data Leakage Traceability and Protection

This article presents a comprehensive overview of digital watermarking, covering its history, evaluation metrics, various media implementations, challenges posed by AI, and practical applications—especially in e‑commerce—to protect data throughout its lifecycle and enable effective leakage tracing.

data leakagedatabase watermarkdigital watermarking
0 likes · 16 min read
Digital Watermarking Techniques for Data Leakage Traceability and Protection
IT Services Circle
IT Services Circle
Mar 31, 2022 · Information Security

Mobile Browsers Read Clipboard Data and Expose Plaintext Passwords, CCTV Report Shows

A CCTV investigation revealed that some mobile browsers and integrated third‑party SDKs silently read users’ clipboard, capturing bank account numbers, passwords and other personal data in plaintext even when running in the background, highlighting serious privacy risks under China’s Personal Information Protection Law.

CCTVClipboardMobile Security
0 likes · 3 min read
Mobile Browsers Read Clipboard Data and Expose Plaintext Passwords, CCTV Report Shows
DataFunTalk
DataFunTalk
Jan 26, 2022 · Information Security

Digital Watermarking for Data Leakage Tracing: Techniques, Applications, and Challenges

This article examines the rapid growth of China’s digital economy, the escalating risk of data leaks, and how digital watermarking—across images, text, and databases—can be applied to trace leaks, protect privacy, and address practical challenges in e‑commerce environments.

E-commercedata leakagedatabase watermark
0 likes · 15 min read
Digital Watermarking for Data Leakage Tracing: Techniques, Applications, and Challenges
DataFunSummit
DataFunSummit
Jan 18, 2022 · Information Security

Digital Watermarking for Data Leakage Traceability: Techniques, Applications, and Challenges

The article explores the rapid growth of China's digital economy, the escalating risk of data leaks, and how digital watermarking—across images, text, and databases—can be employed to trace leakage sources, protect e‑commerce data, and address practical challenges in security implementations.

E-commercedata leakagedatabase watermark
0 likes · 15 min read
Digital Watermarking for Data Leakage Traceability: Techniques, Applications, and Challenges
Java Architect Essentials
Java Architect Essentials
Dec 11, 2021 · Information Security

Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe

In today's big‑data era, excessive stress leads many to seek relief through risky online activities, but unauthorized app permissions and visits to dubious sites can expose personal information, so users must stay vigilant, limit permissions, avoid harmful sites, and use security tools to protect their mobile privacy.

Mobile Securitybig datadata leakage
0 likes · 6 min read
Protecting Mobile Privacy in the Big Data Era: Risks of Data Leakage and How to Stay Safe
DataFunTalk
DataFunTalk
Apr 24, 2020 · Artificial Intelligence

Common Pitfalls in Recommendation Systems: Metrics, Exploration‑Exploitation, and Offline‑Online Discrepancies

The article surveys typical challenges in recommendation systems, including ambiguous evaluation metrics, the trade‑off between precise algorithms and user experience, the exploration‑exploitation dilemma, and why offline AUC improvements often lead to online CTR/CPM drops due to data leakage, feature inconsistency, and distribution shifts.

AUCctrdata leakage
0 likes · 14 min read
Common Pitfalls in Recommendation Systems: Metrics, Exploration‑Exploitation, and Offline‑Online Discrepancies
Tencent Advertising Technology
Tencent Advertising Technology
Jun 25, 2017 · Artificial Intelligence

Interview with ‘拔萝卜’: Lessons Learned from the Tencent Social Ads Algorithm Competition

In this interview, a solo female participant from Shanghai Jiao Tong University shares her experience, challenges, and technical insights—including feature engineering, memory management, and model tuning with XGBoost and LightGBM—gained while competing in the Tencent Social Ads algorithm contest.

Model TuningTencentXGBoost
0 likes · 5 min read
Interview with ‘拔萝卜’: Lessons Learned from the Tencent Social Ads Algorithm Competition
Architects' Tech Alliance
Architects' Tech Alliance
Mar 27, 2017 · Information Security

How Companies Track Personal Data and Ways to Protect Your Online Privacy

The article explains how various companies use technologies such as ultrasonic audio, facial recognition, smart TV monitoring, and image analysis to collect personal data, outlines the common pathways of information leakage, and offers practical advice for safeguarding online privacy.

data leakageinformation securitypersonal data
0 likes · 10 min read
How Companies Track Personal Data and Ways to Protect Your Online Privacy