Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,756,757 papers from all fields of science
Search
Sign In
Create Free Account
Internet leak
Known as:
Leaked to the internet
, Leak (disambiguation)
, Source code leak
Expand
An Internet leak occurs when a party's confidential information is released to the public on the Internet. Various types of information and data can…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Abandonware
AmigaOS
BitTorrent
Concurrent Versions System
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
A Principled Approach to Learning Stochastic Representations for Privacy in Deep Neural Inference
FatemehSadat Mireshghallah
,
Mohammadkazem Taram
,
A. Jalali
,
Ahmed T. Elthakeb
,
D. Tullsen
,
H. Esmaeilzadeh
arXiv.org
2020
Corpus ID: 214693365
INFerence-as-a-Service (INFaaS) in the cloud has enabled the prevalent use of Deep Neural Networks (DNNs) in home automation…
Expand
2017
2017
AndroidLeaker: A Hybrid Checker for Collusive Leak in Android Applications
Zipeng Zhang
,
Xinyu Feng
International Symposium on Software Engineering…
2017
Corpus ID: 38761581
Android phones often carry sensitive personal information such as contact books or physical locations. Such private data can be…
Expand
2014
2014
TM-Score: A Misuseability Weight Measure for Textual Content
A. Vartanian
,
A. Shabtai
IEEE Transactions on Information Forensics and…
2014
Corpus ID: 16926516
In recent years, data leakage prevention solutions became an inherent component of the organizations' security suite. These…
Expand
Review
2013
Review
2013
Современные методы профилактики недостаточности аэростаза при резекции легких
К. Г. Жестков
,
Аркадий Анатольевич Вишневский
,
Ю. С. Есаков
2013
Corpus ID: 74879905
The review of literature presented a modern approach to the problem aerostasis failure after lung resection. Studied and…
Expand
2010
2010
Trusted full disk encryption model based on TPM
Li Jun
,
Yu Huiping
International Conference on Information Science…
2010
Corpus ID: 18856343
With the rapid development of information technologies and the rapid spread of information systems, security of data storage has…
Expand
2010
2010
Closure of prosthetic paravalvular leaks: a long way to go
C. Ruiz
,
H. Cohen
,
Raquel del Valle-Fernández
,
V. Jelnin
,
G. Perk
,
I. Kronzon
2010
Corpus ID: 54717648
Cardiac valve replacement, albeit a well-established and safe procedure, is associated with a significant risk of complications…
Expand
Review
2009
Review
2009
Smart metering: providing the foundation for post meter leakage management
Tracy Clare Britton
,
R. Stewart
,
K. O'Halloran
2009
Corpus ID: 107443791
Any rise in water demand, usually associated with population growth and drought, challenges the water utility to balance this…
Expand
2009
2009
Model-based engine fault detection and isolation
A. Dutka
,
H. Javaherian
,
M. Grimble
American Control Conference
2009
Corpus ID: 20905572
To a large extent, tailpipe emissions are influenced by the accuracy and reliability of the intake manifold sensors and the…
Expand
2005
2005
Wireless Impact and Leak Detection and Location Systems for the ISS and Shuttle Wing Leading Edge
K. Champaigne
,
J. Sumners
IEEE Aerospace Conference
2005
Corpus ID: 24972851
A wireless data acquisition, processing, and communications system for continuous monitoring of critical aerospace structures for…
Expand
1995
1995
An In Vitro Analysis of a One-Way Arterial Check Valve
M. Springer
,
D. Korth
,
P. J. Guiterrez
,
J. Morrow
,
A. Stammers
The Journal of ExtraCorporeal Technology
1995
Corpus ID: 137866708
The utilization of a centrifugal pump during extracorporeal circulation may result in retrograde blood flow through the circuit…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE