Tag

data privacy

0 views collected around this technical thread.

AntTech
AntTech
Oct 22, 2024 · Information Security

Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications

The Asterinas open‑source confidential computing stack, released by leading Chinese research institutions and Ant Group, combines HyperEnclave, Occlum, and TrustFlow to provide a secure, nationally‑trusted TEE foundation for cloud, AI, and data‑intensive workloads, addressing the shortcomings of existing commercial TEEs and enabling trustworthy data flow across diverse industries.

AsterinasCloud Securityconfidential computing
0 likes · 8 min read
Asterinas Confidential Computing Platform: Architecture, Core Components, and Real‑World Applications
AntTech
AntTech
Sep 25, 2024 · Information Security

Live Presentation of “Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits” – Paper Highlights and Insights

The announcement introduces the ACM CCS flagship conference, highlights the award‑winning Coral paper that advances malicious secure multi‑party computation with the novel RMFE packing algorithm, and invites readers to a live online session on September 26, 2024 for an in‑depth walkthrough of its theory, technical innovations, and future applications.

ACM CCSCoral FrameworkLive Presentation
0 likes · 4 min read
Live Presentation of “Coral: Maliciously Secure Computation Framework for Packed and Mixed Circuits” – Paper Highlights and Insights
ZhongAn Tech Team
ZhongAn Tech Team
Jun 11, 2024 · Artificial Intelligence

AI and Big Data Developments in Tech News

This article covers recent AI developments, big data challenges, and industry insights including AI course expansions, regulatory discussions, and tech company updates.

AIAI DevelopmentsRegulatory Issues
0 likes · 9 min read
AI and Big Data Developments in Tech News
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
May 7, 2024 · Mobile Development

Implementing Apple Privacy Manifest and SDK Signing for iOS Apps

This guide explains the recent Apple privacy‑manifest requirements, how to create and fill the privacy manifest file in Xcode 15, the key fields involved, and the steps and commands needed to sign third‑party SDKs for iOS app submission after May 1 2024.

App StorePrivacy ManifestSDK Signing
0 likes · 8 min read
Implementing Apple Privacy Manifest and SDK Signing for iOS Apps
JD Retail Technology
JD Retail Technology
Oct 26, 2023 · Artificial Intelligence

Leveraging Large Language Models for Text-to-SQL: Prompt Design and End-to-End Pipeline

This article explains how large language models can be used to convert natural language queries into SQL statements, describes two main approaches—direct generation and fine‑tuned open‑source models—details prompt engineering techniques, and outlines an end‑to‑end pipeline that executes the generated SQL and summarizes results.

ChatGLMLLMPrompt Engineering
0 likes · 7 min read
Leveraging Large Language Models for Text-to-SQL: Prompt Design and End-to-End Pipeline
Airbnb Technology Team
Airbnb Technology Team
Mar 17, 2023 · Information Security

Airbnb Data Privacy and Security Engineering: Automated Data Protection Service Overview

Airbnb’s Data Protection Service unifies privacy and security metadata, offering APIs that automate annotation verification, export and IDL validation, data‑subject‑rights orchestration, and secret‑leak detection, while assigning ownership, minimizing manual effort, and ensuring global, consistent compliance across the platform.

AirbnbCI checksautomated data protection
0 likes · 13 min read
Airbnb Data Privacy and Security Engineering: Automated Data Protection Service Overview
AntTech
AntTech
Sep 23, 2022 · Information Security

Releasing Security Technology Productivity: Building a New Security System for Digital‑Physical Fusion

In this keynote, Ant Group's Vice President Zhao Wenbiao explains how security technology has evolved from a mere digital‑economy ballast into a catalyst that drives data value, outlines four new security characteristics—compliance, large‑scale intelligence, human‑centric responsibility, and ecosystem collaboration—and introduces the IMAGE framework that integrates interactive proactive security, multi‑party computation, AI adversarial intelligence, graph‑based risk prediction, and edge‑cloud coordination to support a holistic, high‑quality digital transformation.

artificial intelligencecloud computingdata privacy
0 likes · 12 min read
Releasing Security Technology Productivity: Building a New Security System for Digital‑Physical Fusion
Architect
Architect
Sep 22, 2022 · Information Security

How to Perform Fuzzy Queries on Encrypted Data

This article examines various techniques for enabling fuzzy search on encrypted data, comparing naïve, conventional, and advanced algorithmic approaches, evaluating their security, performance, and storage trade‑offs, and provides practical implementation guidance and reference resources.

Databasedata privacyencryption
0 likes · 11 min read
How to Perform Fuzzy Queries on Encrypted Data
Airbnb Technology Team
Airbnb Technology Team
Aug 26, 2022 · Information Security

Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection

Airbnb’s second privacy‑security article describes how the Inspekt service automatically classifies personal and sensitive data across diverse stores using regexes, Aho‑Corasick tries, machine‑learning models and custom validators, measures validator quality, and how the Angmar system scans code repositories for secrets via CI checks and pre‑commit hooks, with plans to broaden coverage to more APIs and data stores.

Cloud SecurityMachine LearningSecret Detection
0 likes · 16 min read
Airbnb Data Privacy and Security Engineering: Inspekt Data Classification Service and Angmar Secret Detection
Sohu Tech Products
Sohu Tech Products
Aug 24, 2022 · Information Security

Approaches to Fuzzy Query on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy search, categorizes three implementation strategies—naïve, conventional, and advanced—analyzes their advantages and drawbacks, and recommends practical solutions for secure yet searchable encrypted fields.

Databasedata privacyencryption
0 likes · 10 min read
Approaches to Fuzzy Query on Encrypted Data
Architect's Tech Stack
Architect's Tech Stack
Aug 24, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines the challenges of fuzzy searching encrypted data and presents three categories of solutions—naïve, conventional, and advanced—detailing their implementation ideas, performance trade‑offs, and practical recommendations for secure and efficient query processing.

Databasedata privacyencryption
0 likes · 11 min read
Techniques for Performing Fuzzy Search on Encrypted Data
Java Architect Essentials
Java Architect Essentials
Aug 20, 2022 · Information Security

Techniques for Performing Fuzzy Search on Encrypted Data

This article examines why encrypted data is unfriendly to fuzzy queries, categorizes three implementation approaches—naïve, conventional, and advanced—and evaluates their security, performance, and storage trade‑offs while providing practical code examples and reference resources.

DatabasePerformancealgorithm
0 likes · 10 min read
Techniques for Performing Fuzzy Search on Encrypted Data
IT Services Circle
IT Services Circle
Feb 15, 2022 · Information Security

Analysis of Deepin's "Resignation Tendency Analysis" Service and Its Privacy Implications

The article examines how Deepin's "Resignation Tendency Analysis" service monitors employee online behavior, outlines the features offered, discusses legal and privacy concerns, and presents public reactions and alternative viewpoints on the broader issue of workplace surveillance.

Behavior Analysisdata privacyemployee monitoring
0 likes · 8 min read
Analysis of Deepin's "Resignation Tendency Analysis" Service and Its Privacy Implications
DataFunSummit
DataFunSummit
Nov 6, 2021 · Artificial Intelligence

Federated Learning for Financial Data Sharing: Compliance, Auditable Solutions, and Blockchain‑Enabled Marketplace

This article presents a comprehensive overview of how federated learning can be applied to financial data sharing, covering regulatory pressures, audit‑ready blockchain solutions, privacy‑preserving PSI techniques, incentive‑driven data marketplaces, and future directions for secure, compliant AI deployment in the finance sector.

AIFederated LearningSecure Data Sharing
0 likes · 10 min read
Federated Learning for Financial Data Sharing: Compliance, Auditable Solutions, and Blockchain‑Enabled Marketplace
DataFunSummit
DataFunSummit
Aug 20, 2021 · Artificial Intelligence

Data Privacy and Differential Privacy Techniques in Machine Learning

This article reviews recent data privacy challenges in machine learning, explains the distinction between privacy and security, presents classic attacks and anonymization methods such as K‑anonymity, L‑diversity and T‑closeness, and details differential privacy techniques and their impact on model performance.

Machine Learninganonymizationdata privacy
0 likes · 17 min read
Data Privacy and Differential Privacy Techniques in Machine Learning
AntTech
AntTech
Jan 20, 2021 · Information Security

IEEE Approves First TEE-Based Secure Computing Standard Led by Ant Group

Ant Group has led the IEEE to approve the world’s first standard for secure computing based on Trusted Execution Environments (TEE), outlining framework, functions, and security requirements, and aims to protect data privacy and sensitive code across cloud, blockchain, AI, and other emerging applications.

IEEE Standarddata privacyinformation security
0 likes · 6 min read
IEEE Approves First TEE-Based Secure Computing Standard Led by Ant Group
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Sep 17, 2020 · Big Data

How Big Data Is Used for Price Discrimination and the New Regulations to Stop It

The article explains how big‑data algorithms enable online price discrimination—often called “kill‑familiar” pricing—illustrates real‑world e‑commerce examples, outlines the recently enacted Chinese online tourism regulation prohibiting such practices, and discusses broader data‑privacy and security concerns.

big dataconsumer rightsdata privacy
0 likes · 6 min read
How Big Data Is Used for Price Discrimination and the New Regulations to Stop It
JD Retail Technology
JD Retail Technology
Sep 15, 2020 · Artificial Intelligence

Federated Learning and the 9NFL Platform: Architecture, Features, and Real‑World Applications

This article explains how federated learning addresses data‑island challenges under privacy regulations, introduces JD.com’s 9NFL federated learning platform, details its component‑based, high‑availability, high‑performance architecture, and showcases a successful advertising use case that boosted revenue by over 10%.

AIFederated LearningJD.com
0 likes · 7 min read
Federated Learning and the 9NFL Platform: Architecture, Features, and Real‑World Applications
JD Tech Talk
JD Tech Talk
Jul 3, 2020 · Artificial Intelligence

Federated Learning vs Blockchain: Complementary Technologies and Their Integration

This article compares federated learning and blockchain, explains their shared trust foundation, outlines their distinct applications, and describes two integration patterns that combine privacy‑preserving AI with immutable decentralized ledgers to create new value in the digital economy.

Federated LearningTrustworthy Computingartificial intelligence
0 likes · 10 min read
Federated Learning vs Blockchain: Complementary Technologies and Their Integration
DataFunTalk
DataFunTalk
Apr 17, 2020 · Artificial Intelligence

Data Privacy and Differential Privacy Techniques for Machine Learning

The article reviews the growing importance of data privacy in machine learning, explains privacy concepts and attack vectors, and details anonymization methods such as k‑anonymity, l‑diversity, t‑closeness, as well as differential privacy techniques and their practical applications.

Machine Learningdata privacydifferential privacy
0 likes · 13 min read
Data Privacy and Differential Privacy Techniques for Machine Learning