Array最新文献

筛选
英文 中文
DART: A Solution for decentralized federated learning model robustness analysis DART:分散联合学习模型稳健性分析解决方案
IF 2.3
Array Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100360
{"title":"DART: A Solution for decentralized federated learning model robustness analysis","authors":"","doi":"10.1016/j.array.2024.100360","DOIUrl":"10.1016/j.array.2024.100360","url":null,"abstract":"<div><p>Federated Learning (FL) has emerged as a promising approach to address privacy concerns inherent in Machine Learning (ML) practices. However, conventional FL methods, particularly those following the Centralized FL (CFL) paradigm, utilize a central server for global aggregation, which exhibits limitations such as bottleneck and single point of failure. To address these issues, the Decentralized FL (DFL) paradigm has been proposed, which removes the client–server boundary and enables all participants to engage in model training and aggregation tasks. Nevertheless, as CFL, DFL remains vulnerable to adversarial attacks, notably poisoning attacks that undermine model performance. While existing research on model robustness has predominantly focused on CFL, there is a noteworthy gap in understanding the model robustness of the DFL paradigm. In this paper, a thorough review of poisoning attacks targeting the model robustness in DFL systems, as well as their corresponding countermeasures, are presented. Additionally, a solution called <em>DART</em> is proposed to evaluate the robustness of DFL models, which is implemented and integrated into a DFL platform. Through extensive experiments, this paper compares the behavior of CFL and DFL under diverse poisoning attacks, pinpointing key factors affecting attack spread and effectiveness within the DFL. It also evaluates the performance of different defense mechanisms and investigates whether defense mechanisms designed for CFL are compatible with DFL. The empirical results provide insights into research challenges and suggest ways to improve the robustness of DFL models for future research.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000262/pdfft?md5=435488fb30eb056a2cc218da941ac1cf&pid=1-s2.0-S2590005624000262-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142130225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat intelligence named entity recognition techniques based on few-shot learning 基于少量学习的威胁情报命名实体识别技术
IF 2.3
Array Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100364
{"title":"Threat intelligence named entity recognition techniques based on few-shot learning","authors":"","doi":"10.1016/j.array.2024.100364","DOIUrl":"10.1016/j.array.2024.100364","url":null,"abstract":"<div><p>In today’s digital and internet era, threat intelligence analysis is of paramount importance to ensure network and information security. Named Entity Recognition (NER) is a fundamental task in natural language processing, aimed at identifying and extracting specific types of named entities from text, such as person names, locations, organization names, dates, times, currencies, and more. The quality of entities determines the effectiveness of upper-layer applications such as knowledge graphs. Recently, there has been a scarcity of training data in the threat intelligence field, and single models suffer from poor generalization ability. To address this, we propose a multi-view learning model, named the Few-shot Threat Intelligence Named Entity Recognition Model (FTM). We enhance the fusion method based on FTM, and further propose the FTM-GRU (Gate Recurrent Unit) model. The FTM model is based on the Tri-training algorithm to collaboratively train three few-shot NER models, leveraging the complementary nature of different model views to enable them to capture more threat intelligence domain knowledge at the coding level.FTM-GRU improves the fusion of multiple views. FTM-GRU uses the improved GRU model structure to control the memory and forgetting of view information, and introduces a relevance calculation unit to avoid redundancy of view information while highlighting important semantic features. We label and construct a few-shot Threat Intelligence Dataset (TID), and experiments on TID as well as the publicly available National Vulnerability Database (NVD) validate the effectiveness of our model for NER in the threat intelligence domain. Experimental results demonstrate that our proposed model achieves better recognition results in the task.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000304/pdfft?md5=d191f5b484b3734ea988ad3ecd18a1f3&pid=1-s2.0-S2590005624000304-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous UAV navigation using deep learning-based computer vision frameworks: A systematic literature review 使用基于深度学习的计算机视觉框架进行无人机自主导航:系统性文献综述
IF 2.3
Array Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100361
{"title":"Autonomous UAV navigation using deep learning-based computer vision frameworks: A systematic literature review","authors":"","doi":"10.1016/j.array.2024.100361","DOIUrl":"10.1016/j.array.2024.100361","url":null,"abstract":"<div><p>The increasing use of unmanned aerial vehicles (UAVs) in both military and civilian applications, such as infrastructure inspection, package delivery, and recreational activities, underscores the importance of enhancing their autonomous functionalities. Artificial intelligence (AI), particularly deep learning-based computer vision (DL-based CV), plays a crucial role in this enhancement. This paper aims to provide a systematic literature review (SLR) of Scopus-indexed research studies published from 2019 to 2024, focusing on DL-based CV approaches for autonomous UAV applications. By analyzing 173 studies, we categorize the research into four domains: sensing and inspection, landing, surveillance and tracking, and search and rescue. Our review reveals a significant increase in research utilizing computer vision for UAV applications, with over 39.5 % of studies employing the You Only Look Once (YOLO) framework. We discuss the key findings, including the dominant trends, challenges, and opportunities in the field, and highlight emerging technologies such as in-sensor computing. This review provides valuable insights into the current state and future directions of DL-based CV for autonomous UAVs, emphasizing its growing significance as legislative frameworks evolve to support these technologies.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000274/pdfft?md5=49538d0ae336567b2c721a5cb431f7e9&pid=1-s2.0-S2590005624000274-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and supporting adaptive Complex Data-Intensive Web Systems via XML and the O-O paradigm: The OO-XAHM model 通过 XML 和 O-O 范式为自适应复杂数据密集型网络系统建模和提供支持:OO-XAHM 模型
IF 2.3
Array Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100363
{"title":"Modeling and supporting adaptive Complex Data-Intensive Web Systems via XML and the O-O paradigm: The OO-XAHM model","authors":"","doi":"10.1016/j.array.2024.100363","DOIUrl":"10.1016/j.array.2024.100363","url":null,"abstract":"<div><p>The <em>data model</em> is a critical component of an <em>Adaptive Web System</em> (AWS). The major goals of such a data model are describing the <em>application domain</em> of the AWS and capturing data about the user in order to support the “adaptation effect”. There have been many proposals for data models, principally based on knowledge representation, machine learning, logic and reasoning, and, recently, ontologies. These models are focused on the implementation of the core layer of AWS, that is realizing the adaptation of contents and presentations of the system, but sometimes they are poor with respect to the application domain design. In this paper, we present an extension of the state-of-the-art <em>XML Adaptive Hypermedia Model</em> (XAHM), <em>Object-Oriented XAHM</em> (OO-XAHM) that supports the application domain modeling using an <em>object-oriented approach</em>. We also provide the formal definition of the model, its description via <em>Unified Modeling Language</em> (UML), and its implementation using <em>XML Schema</em>. Finally, we provide a complete case study that focuses the attention on the well-known Italian archaeological site <em>Pompeii</em>.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000298/pdfft?md5=6d2e89f7a240ad4c3e1b8653672e843f&pid=1-s2.0-S2590005624000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142238109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reimagining otitis media diagnosis: A fusion of nested U-Net segmentation with graph theory-inspired feature set 重塑中耳炎诊断:嵌套 U-Net 细分与图论启发特征集的融合
IF 2.3
Array Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100362
{"title":"Reimagining otitis media diagnosis: A fusion of nested U-Net segmentation with graph theory-inspired feature set","authors":"","doi":"10.1016/j.array.2024.100362","DOIUrl":"10.1016/j.array.2024.100362","url":null,"abstract":"<div><p>Otitis media (OM) is a common infection or inflammation of the middle ear causing conductive hearing loss that primarily affects children and may delay speech, language, and cognitive development. OM can manifest itself in different forms, and can be diagnosed using (video) otoscopy (visualizing the tympanic membrane) or (video) pneumatic otoscopy and tympanometry. Accurate diagnosis of OM is challenging due to subtle differences in otoscopic features. This research aims to develop an automated computer-aided design (CAD) system to assist clinicians in diagnosing OM using otoscopy images. The ground truths, generated manually and validated by otolaryngologists, are utilized to train the proposed nested U-Net++ model. Ten clinically relevant gray level co-occurrence matrix (GLCM) and morphological features were extracted from the segmented Region of Interest (ROI) and validated for OM classification based on a statistical significance test. These features serve as input for a Graph Neural Network (GNN) model, the base model in our research. An optimized GNN model is proposed after ablation study of the base model. Three datasets, one private dataset, and two public ones have been used, where the private dataset is utilized for both training and testing, and the public datasets are used to test the robustness of the proposed GNN model only. The proposed GNN model obtained the highest accuracy in diagnosing OM: 99.38 %, 93.51 %, and 91.38 % for the private dataset, public dataset1, and public dataset2, respectively. The proposed methodology and results of this research might enhance clinicians' effectiveness in diagnosing OM.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000286/pdfft?md5=206b3948d729d466a159c76421c4e068&pid=1-s2.0-S2590005624000286-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating machine learning techniques for enhanced glaucoma screening through Pupillary Light Reflex analysis 评估机器学习技术,通过瞳孔光反射分析加强青光眼筛查
IF 2.3
Array Pub Date : 2024-08-02 DOI: 10.1016/j.array.2024.100359
{"title":"Evaluating machine learning techniques for enhanced glaucoma screening through Pupillary Light Reflex analysis","authors":"","doi":"10.1016/j.array.2024.100359","DOIUrl":"10.1016/j.array.2024.100359","url":null,"abstract":"<div><p>Glaucoma is a leading cause of irreversible visual field degradation, significantly impacting ocular health. Timely identification and diagnosis of this condition are critical to prevent vision loss. A range of diagnostic techniques is employed to achieve this, from traditional methods reliant on expert interpretation to modern, fully computerized diagnostic approaches. The integration of computerized systems designed for the early detection and classification of clinical indicators of glaucoma holds immense potential to enhance the accuracy of disease diagnosis. Pupillary Light Reflex (PLR) analysis emerges as a promising avenue for glaucoma screening, mainly due to its cost-effectiveness compared to exams such as Optical Coherence Tomography (OCT), Humphrey Field Analyzer (HFA), and fundoscopic examinations. The noninvasive nature of PLR testing obviates the need for disposable components and agents for pupil dilation. This facilitates multiple successive administrations of the test and enables the possibility of remote execution. This study aimed to improve the automated diagnosis of glaucoma using PLR data, conducting an extensive comparative analysis incorporating neural networks and machine learning techniques. It also compared the performance of different data processing methods, including filtering techniques, feature extraction, data balancing, feature selection, and their effects on classification. The findings offer insights and guidelines for future methodologies in glaucoma screening utilizing pupillary light response signals.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000250/pdfft?md5=17199a115ebd5deefc6427889a273079&pid=1-s2.0-S2590005624000250-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141962481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating industry 4.0 technologies in defense manufacturing: Challenges, solutions, and potential opportunities 将工业 4.0 技术融入国防制造业:挑战、解决方案和潜在机遇
IF 2.3
Array Pub Date : 2024-07-25 DOI: 10.1016/j.array.2024.100358
{"title":"Integrating industry 4.0 technologies in defense manufacturing: Challenges, solutions, and potential opportunities","authors":"","doi":"10.1016/j.array.2024.100358","DOIUrl":"10.1016/j.array.2024.100358","url":null,"abstract":"<div><p>This paper explores the challenges and potential solutions related to data collection, integration, processing, and utilization in defense manufacturing within the context of Industry 4.0. While Industry 4.0 envisions the integration of various technologies to achieve seamless operations in industries, the unique characteristics of defense manufacturing, such as stringent data limitations and security requirements, make direct translation challenging. Through a comprehensive review of academic literature, key themes were identified, including quality control, digitalization, cyber–physical aspects, sustainability, risk management, ownership of information, and security. Drawing from the reviewed publications, potential solutions were distilled into related approaches, such as data governance frameworks, data exchange standards, blockchain, additive manufacturing, transparent digital supply chains, and smart factories. These solutions present opportunities for the Australian defense manufacturing industry to overcome the identified challenges and leverage the benefits of Industry 4.0, including improved quality control, increased efficiency, enhanced security, and optimized supply chains. By embracing these opportunities, the defense manufacturing sector can successfully navigate the complexities of Industry 4.0 and realize its vision of seamless integration for continued growth and success.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000249/pdfft?md5=88e809dec133162fc9e62121f3747668&pid=1-s2.0-S2590005624000249-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141847197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances of AI in image-based computer-aided diagnosis: A review 人工智能在基于图像的计算机辅助诊断方面的进展:综述
IF 2.3
Array Pub Date : 2024-07-06 DOI: 10.1016/j.array.2024.100357
{"title":"Advances of AI in image-based computer-aided diagnosis: A review","authors":"","doi":"10.1016/j.array.2024.100357","DOIUrl":"10.1016/j.array.2024.100357","url":null,"abstract":"<div><p>Over the past two decades, computer-aided detection and diagnosis have emerged as a field of research. The primary goal is to enhance the diagnostic and treatment procedures for radiologists and clinicians in medical image analysis. With the help of big data and advanced artificial intelligence (AI) technologies, such as machine learning and deep learning algorithms, the healthcare system can be made more convenient, active, efficient, and personalized. The primary goal of this literature survey was to present a thorough overview of the most important developments related to computer-aided diagnosis (CAD) systems in medical imaging. This survey is of considerable importance to researchers and professionals in both medical and computer sciences. Several reviews on the specific facets of CAD in medical imaging have been published.</p><p>Nevertheless, the main emphasis of this study was to cover the complete range of capabilities of CAD systems in medical imaging. This review article introduces background concepts used in typical CAD systems in medical imaging by outlining and comparing several methods frequently employed in recent studies. This article also presents a comprehensive and well-structured survey of CAD in medicine, drawing on a meticulous selection of relevant publications. Moreover, it describes the process of handling medical images and introduces state-of-the-art AI-based CAD technologies in medical imaging, along with future directions of CAD. This study indicates that deep learning algorithms are the most effective method to diagnose and detect diseases.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000237/pdfft?md5=ac6bcca26057a0dab0256c9040860764&pid=1-s2.0-S2590005624000237-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141630093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training a language model to learn the syntax of commands 训练语言模型以学习命令语法
IF 2.3
Array Pub Date : 2024-07-03 DOI: 10.1016/j.array.2024.100355
Zafar Hussain , Jukka K. Nurminen , Perttu Ranta-aho
{"title":"Training a language model to learn the syntax of commands","authors":"Zafar Hussain ,&nbsp;Jukka K. Nurminen ,&nbsp;Perttu Ranta-aho","doi":"10.1016/j.array.2024.100355","DOIUrl":"https://doi.org/10.1016/j.array.2024.100355","url":null,"abstract":"<div><p>To protect systems from malicious activities, it is important to differentiate between valid and harmful commands. One way to achieve this is by learning the syntax of the commands, which is a complex task because of the expansive and evolving nature of command syntax. To address this, we harnessed the power of a language model. Our methodology involved constructing a specialized vocabulary from our commands dataset, and training a custom tokenizer with a Masked Language Model head, resulting in the development of a BERT-like language model. This model exhibits proficiency in learning command syntax by predicting masked tokens. In comparative analyses, our language model outperformed the Markov Model in categorizing commands using clustering algorithms (DBSCAN, HDBSCAN, OPTICS). The language model achieved higher Silhouette scores (0.72, 0.88, 0.85) compared to the Markov Model (0.53, 0.25, 0.06) and demonstrated significantly lower noise levels (2.63%, 5.39%, 8.49%) versus the Markov Model’s higher noise rates (9.31%, 29.85%, 50.35%). Further validation with manually crafted syntax and BERTScore assessments consistently produced metrics above 0.90 for precision, recall, and F1-score. Our language model excels at learning command syntax, enhancing protective measures against malicious activities.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000213/pdfft?md5=68aae0cad29d029f8b3ee94e2999445f&pid=1-s2.0-S2590005624000213-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141592737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy impact assessments in the wild: A scoping review 野外隐私影响评估:范围审查
IF 2.3
Array Pub Date : 2024-07-02 DOI: 10.1016/j.array.2024.100356
Leonardo Horn Iwaya , Ala Sarah Alaqra , Marit Hansen , Simone Fischer-Hübner
{"title":"Privacy impact assessments in the wild: A scoping review","authors":"Leonardo Horn Iwaya ,&nbsp;Ala Sarah Alaqra ,&nbsp;Marit Hansen ,&nbsp;Simone Fischer-Hübner","doi":"10.1016/j.array.2024.100356","DOIUrl":"https://doi.org/10.1016/j.array.2024.100356","url":null,"abstract":"<div><p>Privacy Impact Assessments (PIAs) offer a process for assessing the privacy impacts of a project or system. As a privacy engineering strategy, they are one of the main approaches to privacy by design, supporting the early identification of threats and controls. However, there is still a shortage of empirical evidence on their use and proven effectiveness in practice. To better understand the current literature and research, this paper provides a comprehensive Scoping Review (ScR) on the topic of PIAs “in the wild,” following the well-established Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) guidelines. This ScR includes 45 studies, providing an extensive synthesis of the existing body of knowledge, classifying types of research and publications, appraising the methodological quality of primary research, and summarising the positive and negative aspects of PIAs in practice, as reported by those studies. This ScR also identifies significant research gaps (e.g., evidence gaps from contradictory results and methodological gaps from research design deficiencies), future research pathways, and implications for researchers, practitioners, and policymakers developing and using PIA frameworks. As we conclude, there is still a significant need for more primary research on the topic, both qualitative and quantitative. A critical appraisal of qualitative studies revealed deficiencies in the methodological quality, and only four quantitative studies were identified, suggesting that current primary research remains incipient. Nonetheless, PIAs can be regarded as a prominent sub-area in the broader field of empirical privacy engineering, in which further scientific research to support existing practices is needed.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000225/pdfft?md5=fc78c3586c447695244b568609d2c91f&pid=1-s2.0-S2590005624000225-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141604898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信