The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all...The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all data in a central storage point.In the current horizontal federated learning scheme,each participant gets the final jointly trained model.No solution is proposed for scenarios where participants only provide training data in exchange for benefits,but do not care about the final jointly trained model.Therefore,this paper proposes a newboosted tree algorithm,calledRPBT(the originator Rights Protected federated Boosted Tree algorithm).Compared with the current horizontal federal learning algorithm,each participant will obtain the final jointly trained model.RPBT can guarantee that the local data of the participants will not be leaked,while the final jointly trained model cannot be obtained.It is worth mentioning that,from the perspective of the participants,the scheme uses the batch idea to make the participants participate in the training in random batches.Therefore,this scheme is more suitable for scenarios where a large number of participants are jointly modeling.Furthermore,a small number of participants will not actually participate in the joint training process.Therefore,the proposed scheme is more secure.Theoretical analysis and experimental evaluations show that RPBT is secure,accurate and efficient.展开更多
The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circums...The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circumstances, we must offer the maximum protection of the privacy of the patients. From the point of view of the civil law, the medical institutions or the medical professionals must respect the patients, and protect the patients' privacy, so as to build a more harmonious relationship between the doctors and the patients.展开更多
The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information...The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country.展开更多
As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s Genera...As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s General Principles of Civil Law and Tort Law. However, in judicial practice, there has been no unified standard in defining a tort of privacy, especially a tort of internet privacy. With the increasing popularity of the internet, torts of internet privacy are becoming more and more rampant and severe. Focusing on "internet hunts", a common tort of internet privacy, this paper examines how to affirm a tortious act of internet privacy, as well as forms of liability. It also expounds the practical judicial issues such as the object of prosecution trials.展开更多
Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through e...Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.展开更多
基金National Natural Science Foundation of China(Grant No.61976064)the National Natural Science Foundation of China(Grant No.62172123).
文摘The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all data in a central storage point.In the current horizontal federated learning scheme,each participant gets the final jointly trained model.No solution is proposed for scenarios where participants only provide training data in exchange for benefits,but do not care about the final jointly trained model.Therefore,this paper proposes a newboosted tree algorithm,calledRPBT(the originator Rights Protected federated Boosted Tree algorithm).Compared with the current horizontal federal learning algorithm,each participant will obtain the final jointly trained model.RPBT can guarantee that the local data of the participants will not be leaked,while the final jointly trained model cannot be obtained.It is worth mentioning that,from the perspective of the participants,the scheme uses the batch idea to make the participants participate in the training in random batches.Therefore,this scheme is more suitable for scenarios where a large number of participants are jointly modeling.Furthermore,a small number of participants will not actually participate in the joint training process.Therefore,the proposed scheme is more secure.Theoretical analysis and experimental evaluations show that RPBT is secure,accurate and efficient.
文摘The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circumstances, we must offer the maximum protection of the privacy of the patients. From the point of view of the civil law, the medical institutions or the medical professionals must respect the patients, and protect the patients' privacy, so as to build a more harmonious relationship between the doctors and the patients.
文摘The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country.
文摘As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s General Principles of Civil Law and Tort Law. However, in judicial practice, there has been no unified standard in defining a tort of privacy, especially a tort of internet privacy. With the increasing popularity of the internet, torts of internet privacy are becoming more and more rampant and severe. Focusing on "internet hunts", a common tort of internet privacy, this paper examines how to affirm a tortious act of internet privacy, as well as forms of liability. It also expounds the practical judicial issues such as the object of prosecution trials.
基金the current result of the “research on the basic category system of contemporary Chinese digital law” (23&ZD154), a major project of the National Social Science Fund of China.
文摘Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.