Tagged articles
5 articles
Page 1 of 1
Woodpecker Software Testing
Woodpecker Software Testing
Apr 18, 2026 · Operations

Why 83% of Test Teams Suffer Data Shortage and How Next‑Gen Test Data Generation Overcomes It

The article examines the growing data shortage in software testing, explains why traditional manual and script‑based data generation fails, and presents four pillars of next‑generation test data generation—data contracts, privacy‑enhanced synthetic techniques, scenario‑aware dynamic supply, and observability—backed by a real e‑commerce case study.

Test Data Generationdata-contractsprivacy-preserving
0 likes · 8 min read
Why 83% of Test Teams Suffer Data Shortage and How Next‑Gen Test Data Generation Overcomes It
Alimama Tech
Alimama Tech
Sep 3, 2025 · Artificial Intelligence

Privacy-Preserving Machine Learning: Balancing Data Utility and Confidentiality

Privacy-Preserving Machine Learning (PPML) integrates cryptographic techniques such as federated learning, differential privacy, homomorphic encryption, and secure multi-party computation to enable model training and inference on encrypted or distributed data, thereby breaking data silos while safeguarding privacy across sectors like healthcare, finance, and advertising.

Federated LearningHomomorphic Encryptionmachine learning
0 likes · 18 min read
Privacy-Preserving Machine Learning: Balancing Data Utility and Confidentiality
AntTech
AntTech
Dec 17, 2024 · Information Security

Jiangxi Secure Computing Summit Launches Industry Chain Initiative to Accelerate Data Security and Value Release

The Jiangxi "Secure Computing Industry Summit" convened on December 17, announcing a collaborative "Secure Computing Industry Chain Co‑construction Action" that unites leading institutions to promote privacy‑preserving computation technologies across finance, healthcare, and public data, aiming to safely unlock the value of data assets.

Industry collaborationJiangxiSecure Computing
0 likes · 7 min read
Jiangxi Secure Computing Summit Launches Industry Chain Initiative to Accelerate Data Security and Value Release
DataFunSummit
DataFunSummit
Sep 14, 2022 · Artificial Intelligence

Vertical Federated XGBoost (XGB) Algorithm: Problem Definition, Secure Training, Optimization, and Prediction

This article presents a comprehensive overview of the vertical federated XGB algorithm, covering its problem definition, secure multi‑party training techniques, performance‑optimizing oblivious permutation methods, and prediction workflow, while evaluating its scalability and efficiency under various network conditions.

XGBoostprivacy-preserving
0 likes · 12 min read
Vertical Federated XGBoost (XGB) Algorithm: Problem Definition, Secure Training, Optimization, and Prediction
Programmer DD
Programmer DD
Jul 3, 2020 · Information Security

Tracking Ad Clicks Without Exposing User Data: A Privacy‑Preserving Approach

This article explains how marketers can use UTM parameters to identify the source of ad clicks, compares click‑based (CPC) and impression‑based (CPM) pricing models, and introduces a cryptographic private‑set‑intersection protocol that lets advertisers and e‑commerce platforms measure ad exposure effects while fully protecting user privacy.

UTM parametersadvertising analyticscryptography
0 likes · 9 min read
Tracking Ad Clicks Without Exposing User Data: A Privacy‑Preserving Approach