- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0001000002000000
- More
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Aab, A. (1)
-
Aar, G. van (1)
-
Aartsen, M. G. (1)
-
Abbott, B. P. (1)
-
Abbott, R. (1)
-
Abbott, T. D. (1)
-
Abbott, T. M. (1)
-
Abdalla, H. (1)
-
Abe, F. (1)
-
Abeysekara, A. U. (1)
-
Abramo, L. R. (1)
-
Abramowski, A. (1)
-
Abreu, P. (1)
-
Acernese, F. (1)
-
Acero, F. (1)
-
Ackermann, M. (1)
-
Ackley, K. (1)
-
Adams, C. (1)
-
Adams, J. (1)
-
Adams, S. M. (1)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Privacy is a key principle for developing ethical AI technologies, but how does including AI technologies in products and services change privacy risks? We constructed a taxonomy of AI privacy risks by an- alyzing 321 documented AI privacy incidents. We codifed how the unique capabilities and requirements of AI technologies described in those incidents generated new privacy risks, exacerbated known ones, or otherwise did not meaningfully alter the risk. We present 12 high-level privacy risks that AI technologies either newly created (e.g., exposure risks from deepfake pornography) or exacerbated (e.g., surveillance risks from collecting training data). One upshot of our work is that incorporating AI technologies into a product can alter the privacy risks it entails. Yet, current approaches to privacy-preserving AI/ML (e.g., federated learning, diferential pri- vacy, checklists) only address a subset of the privacy risks arising from the capabilities and data requirements of AI.more » « less
-
Ramp, S. R.; Yang, Y. ‐J.; Jan, S.; Chang, M. ‐H.; Davis, K. A.; Sinnett, G.; Bahr, F. L.; Reeder, D. B.; Ko, D. S.; Pawlak, G. (, Journal of Geophysical Research: Oceans)Abstract Large nonlinear internal solitary waves (NLIWs) are known to transit west northwest across the northeastern South China Sea from generation sites around the two‐ridge system in the Luzon Strait. The waves are important because their energy flux and dissipation are several orders of magnitude larger than the surrounding ocean. The wave transit has been well studied up to about the 100 m isobath but observations in shallower water have been scarce. Using oceanographic moorings and an innovative distributed temperature sensing optical cable, the NLIW transformations were observed from 2000 to 2 m on the flanks of Dongsha Atoll (Pratas Reef). Possible outcomes included reflection, refraction around the island, wave breaking, and penetration into shallow water. Upslope penetration depended on incident wave amplitude and direction as well as the local stratification.more » « less
-
Abbott, B. P.; Abbott, R.; Abbott, T. D.; Acernese, F.; Ackley, K.; Adams, C.; Adams, T.; Addesso, P.; Adhikari, R. X.; Adya, V. B.; et al (, The Astrophysical Journal)
An official website of the United States government
