Search
Search Results
-
To be forgotten or to be fair: unveiling fairness implications of machine unlearning methods
The right to be forgotten (RTBF) allows individuals to request the removal of personal information from online platforms. Researchers have proposed...
-
A Decision-Making Process to Implement the ‘Right to Be Forgotten’ in Machine Learning
The unprecedented scale at which personal data is used to train machine learning (ML) models is a motivation to examine the ways in which it can be... -
The Right to Privacy 1914–1948 The Lost Years
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by the two world wars of the...
-
‘Right to Be Forgotten’: Analyzing the Impact of Forgetting Data Using K-NN Algorithm in Data Stream Learning
New international regulations concerning personal management data guarantee the ‘Right to Be Forgotten’. One might request to have their data erased... -
Federated Unlearning and Server Right to Forget: Handling Unreliable Client Contributions
In the context of federated learning, the concept of federated unlearning has emerged, aiming to realize the “right to be forgotten”. The current... -
Can the Right to Explanation in GDPR Be a Remedy for Algorithmic Discrimination?
Since the birth of computation with Alan Turing, a kind of “excellence/extraordinary” and “objectivity” has been attributed to algorithmic... -
Why Patient Data Cannot Be Easily Forgotten?
Rights provisioned within data protection regulations, permit patients to request that knowledge about their information be eliminated by data... -
The Impact of the ‘Right to Be Forgotten’ on Algorithmic Fairness
Enterprises may often deal with situations in which they cannot use a part of their data for machine learning: (1) Privacy laws grant users to... -
Can Federated Models Be Rectified Through Learning Negative Gradients?
Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from... -
Formalizing Data Deletion in the Context of the Right to Be Forgotten
The right of an individual to request the deletion of their personal data by an entity that might be storing it – referred to as the right to be... -
Can Authoritative Governments Abuse the Right to Access?
The right to access is a great tool provided by the GDPR to empower data subjects with their data. However, it needs to be implemented properly... -
How to Reset the vCenter Root Password
Sometimes, dealing with credentials for infrastructure elements such as vCenter Server can be difficult when the root password is forgotten or... -
The Legal Frameworks of the Right to Request the Deletion of Personal Data in the EU, the U.S. and Japan and the Right to Be Forgotten: A Study Focusing on Search Businesses
The issue of the “right to be forgotten” presents a modern problem with regard to a person’s right to request search engine providers for the... -
Five Virtues to Be Digitized Norms
The COVID-19 pandemic also revealed lacks of moralities of the citizens in some countries. As mentioned before, it can discover the answer to sustain... -
Web of Science Core Collection’s coverage expansion: the forgotten Arts & Humanities Citation Index?
The expansion of Web of Science Core Collection (WoSCC) over the recent years has partially accounted for the “norm” of growth of research output in...
-
How to Forget Clients in Federated Online Learning to Rank?
Data protection legislation like the European Union’s General Data Protection Regulation (GDPR) establishes the right to be forgotten: a user... -
Olympus: a GDPR compliant blockchain system
Blockchain has been gaining significant interest in several domains. However, this technology also raises relevant challenges, namely in terms of...
-
Machine Unlearning Methodology Based on Stochastic Teacher Network
The rise of the phenomenon of the “right to be forgotten” has prompted research on machine unlearning, which grants data owners the right to actively... -
A Review on Machine Unlearning
Recently, an increasing number of laws have governed the useability of users’ privacy. For example, Article 17 of the General Data Protection...