Tag

privacy

0 views collected around this technical thread.

DataFunTalk
DataFunTalk
May 24, 2025 · Artificial Intelligence

Why Apple and WeChat’s AI Rollouts Are Slower Than Expected

The article analyses how privacy concerns, data‑security priorities and an application‑first strategy cause both Apple’s Apple Intelligence and WeChat’s AI features to lag behind hype, examining product decisions, technical constraints, and the potential future of AI agents within these ecosystems.

AI integrationAppleWeChat
0 likes · 13 min read
Why Apple and WeChat’s AI Rollouts Are Slower Than Expected
IT Services Circle
IT Services Circle
May 20, 2025 · Information Security

Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity

This article presents six practical data‑desensitization methods—including string replacement, encryption, database masking, cache‑based replacement, dynamic AOP masking, and K‑anonymity—explains their principles, shows Java implementations, compares security, performance, and reversibility, and offers concrete recommendations for protecting sensitive fields such as phone numbers and ID cards.

Javadata maskingencryption
0 likes · 8 min read
Six Common Data Masking Techniques: From Simple String Replacement to K‑Anonymity
AntTech
AntTech
Mar 31, 2025 · Artificial Intelligence

Ant Group Papers Accepted at ICLR 2025: Summaries and Links

The article presents the abstracts, publication types, links, and research areas of seventeen Ant Group papers accepted at ICLR 2025, covering topics such as embodied robot co‑design, efficient distributed training for large language models, optimization via LLMs, character animation, interactive frame interpolation, KV‑cache management, and privacy‑preserving Transformers.

AI researchAnt GroupICLR2025
0 likes · 23 min read
Ant Group Papers Accepted at ICLR 2025: Summaries and Links
AntTech
AntTech
Mar 1, 2025 · Artificial Intelligence

ScaleOT: Privacy‑Utility‑Scalable Offsite‑Tuning with Dynamic LayerReplace and Selective Rank Compression

The ScaleOT framework introduces a privacy‑preserving offsite‑tuning pipeline for large language models that combines importance‑aware dynamic layer replacement with selective rank compression, enabling flexible model compression, near‑lossless fine‑tuning, and strong privacy guarantees across diverse downstream tasks.

LLMadaptermodel compression
0 likes · 16 min read
ScaleOT: Privacy‑Utility‑Scalable Offsite‑Tuning with Dynamic LayerReplace and Selective Rank Compression
AntTech
AntTech
Feb 26, 2025 · Artificial Intelligence

Ant Group’s 18 Accepted Papers at AAAI 2025: Summaries and Highlights

This article presents concise English summaries of the 18 Ant Group papers accepted at AAAI 2025, covering topics such as privacy‑preserving large‑model tuning, knowledge‑graph integration, AI‑generated image detection, multi‑task learning, generative retrieval, role‑playing evaluation, and video hallucination mitigation.

AAAI 2025AI evaluationVideo Hallucination
0 likes · 29 min read
Ant Group’s 18 Accepted Papers at AAAI 2025: Summaries and Highlights
AntTech
AntTech
Dec 11, 2024 · Artificial Intelligence

Ant Group’s Selected NeurIPS 2024 Papers: Summaries and Highlights

This article presents a curated overview of fifteen Ant Group research papers accepted at NeurIPS 2024, covering topics such as large language models, knowledge graphs, recommendation systems, privacy-preserving inference, and multimodal learning, with abstracts, paper types, links, and key contributions highlighted.

Ant GroupArtificial IntelligenceNeurIPS2024
0 likes · 32 min read
Ant Group’s Selected NeurIPS 2024 Papers: Summaries and Highlights
DataFunTalk
DataFunTalk
Nov 17, 2024 · Artificial Intelligence

Federated Learning and Data Security in the Era of Large Models: Research Overview and the FLAIR Platform

This presentation reviews recent research on data security and utilization in the large‑model era, covering privacy‑preserving federated learning, knowledge‑transfer techniques, prototype‑based modeling, multi‑model fusion methods such as FuseGen, and introduces the federated knowledge computing platform FLAIR for both horizontal and vertical federated scenarios.

FLAIRFederated LearningLarge Models
0 likes · 19 min read
Federated Learning and Data Security in the Era of Large Models: Research Overview and the FLAIR Platform
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Nov 15, 2024 · Backend Development

Implementing a View‑Once Image Feature with Spring Boot and MySQL

This guide explains how to design and build a privacy‑focused, view‑once image sharing system using Spring Boot, MySQL, Thymeleaf, and optional cloud storage, covering requirements analysis, architecture, environment setup, code implementation, security considerations, performance optimizations, testing, and deployment.

Image BurnMySQLSpring Boot
0 likes · 15 min read
Implementing a View‑Once Image Feature with Spring Boot and MySQL
Tencent Advertising Technology
Tencent Advertising Technology
Oct 23, 2024 · Artificial Intelligence

FedMix: Boosting Vertical Federated Learning with Data Mixture

This paper introduces FedMix, a method that enhances vertical federated learning by mixing aligned and unaligned data, theoretically demonstrating the value of unaligned data and empirically achieving over 10% ROI improvement and significant AUC gains while keeping computational and communication overhead low.

Federated Learningdata mixtureprivacy
0 likes · 11 min read
FedMix: Boosting Vertical Federated Learning with Data Mixture
DeWu Technology
DeWu Technology
Oct 16, 2024 · Mobile Development

iOS Dynamic Privacy Function Call Stack Symbolization Optimization Plan

To meet tightening privacy regulations, the team is optimizing iOS dynamic privacy checks by replacing the CPU‑intensive +[NSThread callStackSymbols] method with a low‑overhead, non‑blocking stack‑symbolization solution that maintains compliance testing speed and prevents device slowdown during large‑scale automated gray‑release scans.

BSBacktraceLoggerDynamic DetectionStack Analysis
0 likes · 22 min read
iOS Dynamic Privacy Function Call Stack Symbolization Optimization Plan
Java Tech Enthusiast
Java Tech Enthusiast
Oct 9, 2024 · Backend Development

Understanding Logical Deletion and Data Compliance in Backend Services

The article explains how many backend services use logical deletion—simply flagging or masking user data instead of physically removing it—to appear compliant with standards like China's GB/T 35273, while highlighting risks such as continued e‑bike control, fraud detection challenges, and missed logout handling.

ComplianceGB/T 35273Logical Deletion
0 likes · 3 min read
Understanding Logical Deletion and Data Compliance in Backend Services
Architect
Architect
May 5, 2024 · Artificial Intelligence

The Rise of Small Language Models (SLM) and Their Impact on AI Development

Amidst a growing trend that narrows performance gaps between large and small language models, researchers highlight the efficiency, adaptability, and specialized advantages of small language models (SLM), while also discussing the high costs, hallucinations, and security concerns that still challenge large‑scale LLMs.

AI EfficiencyEdge ComputingLLM
0 likes · 9 min read
The Rise of Small Language Models (SLM) and Their Impact on AI Development
Java Tech Enthusiast
Java Tech Enthusiast
Jan 21, 2024 · Information Security

Security Risks of Exposing Your Public IP Address

Exposing your public IP address can invite DDoS floods, vulnerability scanning, privacy breaches, and targeted phishing or malware attacks, so you should protect it with firewalls, regular updates, secure VPN connections, and by avoiding public disclosure on social platforms.

DDoSfirewallinformation security
0 likes · 3 min read
Security Risks of Exposing Your Public IP Address
Zhuanzhuan Tech
Zhuanzhuan Tech
Jan 10, 2024 · Information Security

Log Desensitization Practices and APT‑Based Automatic toString Generation in Java

This article describes how ZhaiZhai implements log desensitization for personal data protection using a reusable Java utility class, JSON serializer customizations with Jackson, and an annotation‑processing tool that automatically generates masked toString methods, while also discussing operational challenges and future plans.

Javaannotation-processingapt
0 likes · 13 min read
Log Desensitization Practices and APT‑Based Automatic toString Generation in Java
php中文网 Courses
php中文网 Courses
Jan 8, 2024 · Artificial Intelligence

Setting Up and Using LocalAI as an Open‑Source Alternative to the ChatGPT API

LocalAI is an open‑source, cost‑effective alternative to the ChatGPT API that lets you download and run thousands of language models locally via Docker or compiled binaries, offering privacy, customization, and easy integration into projects through a compatible API.

AI inferenceAPIDocker
0 likes · 7 min read
Setting Up and Using LocalAI as an Open‑Source Alternative to the ChatGPT API
AntTech
AntTech
Dec 22, 2023 · Information Security

2023 Security and Trustworthy Computing Research Summary – 14 Papers Accepted at Top International Conferences

In late 2023, Ant Group and academic partners reported fourteen security‑focused research papers accepted at top venues such as USENIX Security, ACM CCS, and USENIX ATC, covering privacy‑preserving computation, secure two‑party GBDT training, macOS kernel fuzzing, privacy‑preserving ML frameworks, Rust OOM handling, and more.

MPCResearchcryptography
0 likes · 18 min read
2023 Security and Trustworthy Computing Research Summary – 14 Papers Accepted at Top International Conferences
php中文网 Courses
php中文网 Courses
Nov 30, 2023 · Information Security

ChatGPT Repeat Prompt Vulnerability Exposes Sensitive Personal Information

Researchers discovered that prompting ChatGPT with repeated words can cause the model to leak private data such as phone numbers and email addresses, highlighting a serious repeat‑prompt vulnerability that reveals substantial personally identifiable information from its training corpus.

ChatGPTPIIResearch
0 likes · 3 min read
ChatGPT Repeat Prompt Vulnerability Exposes Sensitive Personal Information
php中文网 Courses
php中文网 Courses
Nov 10, 2023 · Artificial Intelligence

OpenAI Announces Data Partnership Program for Public and Private Training Datasets

OpenAI revealed a new data partnership initiative to collect large‑scale public and private datasets across multiple modalities, aiming to improve AI model safety and usefulness by incorporating diverse, hard‑to‑access human‑generated content while respecting privacy and intent.

AI Training DataData PartnershipModel Improvement
0 likes · 3 min read
OpenAI Announces Data Partnership Program for Public and Private Training Datasets
IT Services Circle
IT Services Circle
Oct 26, 2023 · Information Security

Weibo Introduces Front‑Page Real‑Name Display and Visitor Record Feature: Privacy Implications

Weibo has begun testing a front‑page real‑name system for high‑follower accounts and a visitor‑record function limited to premium members, sparking user backlash over privacy concerns, debates about platform monetisation, and discussions of the broader impact on social media behaviour.

Weiboinformation securityprivacy
0 likes · 6 min read
Weibo Introduces Front‑Page Real‑Name Display and Visitor Record Feature: Privacy Implications
macrozheng
macrozheng
Oct 19, 2023 · Information Security

How to Perform Fuzzy Search on Encrypted Phone Numbers in MySQL

This article explores multiple strategies for enabling fuzzy search on encrypted phone numbers, including in‑memory caching, database decryption functions, segment‑wise storage, and dedicated fuzzy‑search fields, comparing their trade‑offs in performance, memory usage, and data consistency.

Database DesignMySQLbackend
0 likes · 10 min read
How to Perform Fuzzy Search on Encrypted Phone Numbers in MySQL