The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all...The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all data in a central storage point.In the current horizontal federated learning scheme,each participant gets the final jointly trained model.No solution is proposed for scenarios where participants only provide training data in exchange for benefits,but do not care about the final jointly trained model.Therefore,this paper proposes a newboosted tree algorithm,calledRPBT(the originator Rights Protected federated Boosted Tree algorithm).Compared with the current horizontal federal learning algorithm,each participant will obtain the final jointly trained model.RPBT can guarantee that the local data of the participants will not be leaked,while the final jointly trained model cannot be obtained.It is worth mentioning that,from the perspective of the participants,the scheme uses the batch idea to make the participants participate in the training in random batches.Therefore,this scheme is more suitable for scenarios where a large number of participants are jointly modeling.Furthermore,a small number of participants will not actually participate in the joint training process.Therefore,the proposed scheme is more secure.Theoretical analysis and experimental evaluations show that RPBT is secure,accurate and efficient.展开更多
Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through e...Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.展开更多
The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circums...The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circumstances, we must offer the maximum protection of the privacy of the patients. From the point of view of the civil law, the medical institutions or the medical professionals must respect the patients, and protect the patients' privacy, so as to build a more harmonious relationship between the doctors and the patients.展开更多
The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information...The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country.展开更多
A No-Fly Zone(NFZ)is a unique mode of humanitarian intervention which is understudied in international relations.This article focuses on the political dimension of NFZs in international relations and investigates thei...A No-Fly Zone(NFZ)is a unique mode of humanitarian intervention which is understudied in international relations.This article focuses on the political dimension of NFZs in international relations and investigates their implementations by empirically reviewing all three cases of NFZs to date.There may be efforts by intervening states to highlight humanitarian crises among certain targets to secure UN authorization for the NFZs;yet the implementation of NFZs is also driven largely by the security interests of enforcing states.As a result,there is the potential for those states implementing NFZs to transcend legal authorization and sometimes use excessive force,with likely calamitous results for local populations,or in extreme cases,accomplishing regime change by supporting opposition parties in target states.展开更多
This paper highlights the work of collaborating European journalists, who in a series of articles, under the heading "Security for Sale-the Price we pay to protect Europeans", problematise the European Union Funding...This paper highlights the work of collaborating European journalists, who in a series of articles, under the heading "Security for Sale-the Price we pay to protect Europeans", problematise the European Union Funding framework for security technology research, which unfortunately may enhance business opportunities for mass surveillance systems in non-democratic states. Based on a case, involving a research project in which I participated as an ethical adviser, the paper illustrates how a lack of global perspectives constitutes a weakness inherent in methodologies within design ethics, such as Privacy professional idealism (Mitcham 2003), by Design and value sensitive the paper concludes by arguing outlook, which goes beyond the walled gardens oft^e European Union design. Finally, drawing on the notion of in favour of moral activism from a global展开更多
China has established a two-level normative structure AIDS notification system with the AIDS Prevention and control Regulations as the core and local regulations as the supplement The problem is that the local legisla...China has established a two-level normative structure AIDS notification system with the AIDS Prevention and control Regulations as the core and local regulations as the supplement The problem is that the local legislations have different provisions with regard to the subject of notification and whether to adopt mandatory notification, which confronts the implementation of the AIDS notification system and the prevention of AIDS transmission with real difficulties The different attitudes of local legislations to the mandatory notification system for AIDS essentially reflects the dilemma of legislators in balancing the right to privacy of HIV-infected patients and the right to health of their sexual partners from the perspective of rights limitations, this paper aims to conducts interest balance analysis in the aspects of social urgency, public interest, substantive damage and the right to know of others and holds the view that when these two rights conflict with each other, priority should be given to the right to health of HIV-infected patients and their sexual partner as well as public health In terms of specific systems, the AIDS Prevention and control Regulations should establish a mandatory notification system and local legislation should take into consideration of local conditions to make specific provisions on issues of notification subject, notification procedures and confidentiality obligations after notification.展开更多
HIV screening can be used to detect,control and prevent the spread of HIV/AIDS.The attitude towards HIV screening relates to the general trend of human rights protection of AIDS sufferers and infectors.HIV exceptional...HIV screening can be used to detect,control and prevent the spread of HIV/AIDS.The attitude towards HIV screening relates to the general trend of human rights protection of AIDS sufferers and infectors.HIV exceptionalism has been adopted in traditional international practice.That means the specific notified,voluntary consent shall be obtained from examinees before they are screened.However,there is move to abandon HIV exceptionalism in order to detect more infectors and treat AIDS the same as another infectious disease.This has resulted in 'compulsory screening' and 'consent after notification'.In China, 'voluntary' screening, 'real-name detection' and 'compulsory screening' exist in different regions.Thus,it is crucial to identify the legal regulation principle of HIV screening from the perspective of human rights.展开更多
As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s Genera...As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s General Principles of Civil Law and Tort Law. However, in judicial practice, there has been no unified standard in defining a tort of privacy, especially a tort of internet privacy. With the increasing popularity of the internet, torts of internet privacy are becoming more and more rampant and severe. Focusing on "internet hunts", a common tort of internet privacy, this paper examines how to affirm a tortious act of internet privacy, as well as forms of liability. It also expounds the practical judicial issues such as the object of prosecution trials.展开更多
Existing laws have three limitations on transfer of land contractual management right. The survey of 506 farmer households in Zhejiang,Jiangxi and Guangxi provinces indicates that most farmers have the consistent know...Existing laws have three limitations on transfer of land contractual management right. The survey of 506 farmer households in Zhejiang,Jiangxi and Guangxi provinces indicates that most farmers have the consistent knowledge of limitation on " transfer being approved by the party giving out the contract in advance" with legislative requirements,but it is not effectively implemented in actual operation. As to limitation on transferee,no matter in cognition of farmers,or in real transfer process,the transferee is not totally limited to farmers engaged in agricultural production and management. For the constraint that the transferor should have stable non-agricultural occupation or stable income source, most farmers agree,but more than half of the farmers have not confirmed the transfer action in practice.展开更多
The right to claim for damages for infringement is of the character of credit and an object of limitation of action. In case of trademark right infringement, the provision on limitation of action of the General Pr... The right to claim for damages for infringement is of the character of credit and an object of limitation of action. In case of trademark right infringement, the provision on limitation of action of the General Principles of the Civil Law also apply to the trademark proprietor's right to claim for damages for infringement.……展开更多
The legal regulation of racist speech involves limitation on the freedom of speech, which requires prudent trade-offs between freedom and quality. The protection of the freedom of speech, although of great value to a ...The legal regulation of racist speech involves limitation on the freedom of speech, which requires prudent trade-offs between freedom and quality. The protection of the freedom of speech, although of great value to a democratic society, does not include the pro tection of racist speech. The justification for regulating racist speech lies in the impact of racial ly-charged speech, not in the content of the speech itself. The regulation of racist speech should take into consideration thecriteriaofsubjectivemalignancy,necessityandproportionality.Due to their social status and special role in a democratic society, the media and political figures should bear a more stringent duty of care because of the harm and consequences of their racist remarks, which are far greater than those of other groups. During the pandemic, legal regula tion is required regarding remarks of politicians and the media that imply discrimination linked to CoVID-19.展开更多
基金National Natural Science Foundation of China(Grant No.61976064)the National Natural Science Foundation of China(Grant No.62172123).
文摘The problem of data island hinders the application of big data in artificial intelligence model training,so researchers propose a federated learning framework.It enables model training without having to centralize all data in a central storage point.In the current horizontal federated learning scheme,each participant gets the final jointly trained model.No solution is proposed for scenarios where participants only provide training data in exchange for benefits,but do not care about the final jointly trained model.Therefore,this paper proposes a newboosted tree algorithm,calledRPBT(the originator Rights Protected federated Boosted Tree algorithm).Compared with the current horizontal federal learning algorithm,each participant will obtain the final jointly trained model.RPBT can guarantee that the local data of the participants will not be leaked,while the final jointly trained model cannot be obtained.It is worth mentioning that,from the perspective of the participants,the scheme uses the batch idea to make the participants participate in the training in random batches.Therefore,this scheme is more suitable for scenarios where a large number of participants are jointly modeling.Furthermore,a small number of participants will not actually participate in the joint training process.Therefore,the proposed scheme is more secure.Theoretical analysis and experimental evaluations show that RPBT is secure,accurate and efficient.
基金the current result of the “research on the basic category system of contemporary Chinese digital law” (23&ZD154), a major project of the National Social Science Fund of China.
文摘Although the existing legal norms and judicial practic-es can provide basic guidance for the right to personal data portabili-ty, it can be concluded that there are obstacles to the realization of this right through empirical research of the privacy policies of 66 mobile apps, such as whether they have stipulations on the right to personal data portability, whether they are able to derive copies of personal in-formation automatically, whether there are textual examples, whether ID verification is required, whether the copied documents are encrypt-ed, and whether the scope of personal information involved is consis-tent. This gap in practice, on the one hand, reflects the misunderstand-ing of the right to personal data portability, and on the other hand, is a result of the negative externalities, practical costs and technical lim-itations of the right to personal data portability. Based on rethinking the right to data portability, we can somehow solve practical problems concerning the right to personal data portability through multiple measures such as promoting the fulfillment of this right by legislation, optimizing technology-oriented operations, refining response process mechanisms, and enhancing system interoperability.
文摘The development of China's medical industry is very fast, which has provided a great help for people, but in the process, there are also a lot of problems violating the privacy of the patients. Based on these circumstances, we must offer the maximum protection of the privacy of the patients. From the point of view of the civil law, the medical institutions or the medical professionals must respect the patients, and protect the patients' privacy, so as to build a more harmonious relationship between the doctors and the patients.
文摘The development of the technology of network had been of great convenience to get access to information. However, it was undeniable that a bad phenomenon had become even more and more serious that others' information would be obtained by illegal means, and the research on the protection of privacy had increasingly aroused people's concern. The right of privacy not only had the usually outside personality characteristics, but also had a certain characteristics of property. This paper had attempted to study the right of privacy from the perspective of law and economics by interpreting the property in the right of privacy, in order to perfect the protection system of privacy in our country.
基金This article has been sponsored by the Core Research Base Project“The Comparative Study of the States outside the NPT Regime”(project number:11jz004)from Education Department of Shaanxi Provincial Government and two-class General Financial Grant for the China Postdoctoral Science Foundation(Grant No.:2012M521660).
文摘A No-Fly Zone(NFZ)is a unique mode of humanitarian intervention which is understudied in international relations.This article focuses on the political dimension of NFZs in international relations and investigates their implementations by empirically reviewing all three cases of NFZs to date.There may be efforts by intervening states to highlight humanitarian crises among certain targets to secure UN authorization for the NFZs;yet the implementation of NFZs is also driven largely by the security interests of enforcing states.As a result,there is the potential for those states implementing NFZs to transcend legal authorization and sometimes use excessive force,with likely calamitous results for local populations,or in extreme cases,accomplishing regime change by supporting opposition parties in target states.
文摘This paper highlights the work of collaborating European journalists, who in a series of articles, under the heading "Security for Sale-the Price we pay to protect Europeans", problematise the European Union Funding framework for security technology research, which unfortunately may enhance business opportunities for mass surveillance systems in non-democratic states. Based on a case, involving a research project in which I participated as an ethical adviser, the paper illustrates how a lack of global perspectives constitutes a weakness inherent in methodologies within design ethics, such as Privacy professional idealism (Mitcham 2003), by Design and value sensitive the paper concludes by arguing outlook, which goes beyond the walled gardens oft^e European Union design. Finally, drawing on the notion of in favour of moral activism from a global
基金Research on Legalization of Basic Medical Care Service(project approval No.14JZD025)as a key project of research on philosophy and social sciences of the Ministry of Education in 2014
文摘China has established a two-level normative structure AIDS notification system with the AIDS Prevention and control Regulations as the core and local regulations as the supplement The problem is that the local legislations have different provisions with regard to the subject of notification and whether to adopt mandatory notification, which confronts the implementation of the AIDS notification system and the prevention of AIDS transmission with real difficulties The different attitudes of local legislations to the mandatory notification system for AIDS essentially reflects the dilemma of legislators in balancing the right to privacy of HIV-infected patients and the right to health of their sexual partners from the perspective of rights limitations, this paper aims to conducts interest balance analysis in the aspects of social urgency, public interest, substantive damage and the right to know of others and holds the view that when these two rights conflict with each other, priority should be given to the right to health of HIV-infected patients and their sexual partner as well as public health In terms of specific systems, the AIDS Prevention and control Regulations should establish a mandatory notification system and local legislation should take into consideration of local conditions to make specific provisions on issues of notification subject, notification procedures and confidentiality obligations after notification.
文摘HIV screening can be used to detect,control and prevent the spread of HIV/AIDS.The attitude towards HIV screening relates to the general trend of human rights protection of AIDS sufferers and infectors.HIV exceptionalism has been adopted in traditional international practice.That means the specific notified,voluntary consent shall be obtained from examinees before they are screened.However,there is move to abandon HIV exceptionalism in order to detect more infectors and treat AIDS the same as another infectious disease.This has resulted in 'compulsory screening' and 'consent after notification'.In China, 'voluntary' screening, 'real-name detection' and 'compulsory screening' exist in different regions.Thus,it is crucial to identify the legal regulation principle of HIV screening from the perspective of human rights.
文摘As one of the basic human rights, and one confirmed in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights, the right to privacy has been written into China’s General Principles of Civil Law and Tort Law. However, in judicial practice, there has been no unified standard in defining a tort of privacy, especially a tort of internet privacy. With the increasing popularity of the internet, torts of internet privacy are becoming more and more rampant and severe. Focusing on "internet hunts", a common tort of internet privacy, this paper examines how to affirm a tortious act of internet privacy, as well as forms of liability. It also expounds the practical judicial issues such as the object of prosecution trials.
基金Supported by Project of National Social Science Foundation(09CJY054 and 11BJY050)
文摘Existing laws have three limitations on transfer of land contractual management right. The survey of 506 farmer households in Zhejiang,Jiangxi and Guangxi provinces indicates that most farmers have the consistent knowledge of limitation on " transfer being approved by the party giving out the contract in advance" with legislative requirements,but it is not effectively implemented in actual operation. As to limitation on transferee,no matter in cognition of farmers,or in real transfer process,the transferee is not totally limited to farmers engaged in agricultural production and management. For the constraint that the transferor should have stable non-agricultural occupation or stable income source, most farmers agree,but more than half of the farmers have not confirmed the transfer action in practice.
文摘 The right to claim for damages for infringement is of the character of credit and an object of limitation of action. In case of trademark right infringement, the provision on limitation of action of the General Principles of the Civil Law also apply to the trademark proprietor's right to claim for damages for infringement.……
基金a significant progress of Research on Developing a Fairer and More Equitable Global Governance System (Project Approval No. 20AZD104)key program of National Social Science Foundation of China+1 种基金major program of National Social Science Found of ChinaResearch on International Law of Major Public Health Emergencies (Project Approval No. 20&ZD201)。
文摘The legal regulation of racist speech involves limitation on the freedom of speech, which requires prudent trade-offs between freedom and quality. The protection of the freedom of speech, although of great value to a democratic society, does not include the pro tection of racist speech. The justification for regulating racist speech lies in the impact of racial ly-charged speech, not in the content of the speech itself. The regulation of racist speech should take into consideration thecriteriaofsubjectivemalignancy,necessityandproportionality.Due to their social status and special role in a democratic society, the media and political figures should bear a more stringent duty of care because of the harm and consequences of their racist remarks, which are far greater than those of other groups. During the pandemic, legal regula tion is required regarding remarks of politicians and the media that imply discrimination linked to CoVID-19.