https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf
ABSTRACT In a global environment where most unfriendly acts between nations fall below the threshold of a use of force, the doctrine of countermeasures can be an important tool for states. However, in the realm of cyber operations, the rules governing the application of countermeasures result in unrealistic constraints on states. Particularly when compared with the much lesser constraints on ...
https://cis.temple.edu/~latecki/Courses/CIS2166-Fall16/Lectures/MatrixAlg1.pdf
A matrix is a rectangular array of numbers or other mathematical objects, for which operations such as addition and multiplication are defined. Most of this article focuses on real matrices, i.e., matrices whose elements are real numbers. For instance, this is a real matrix: The numbers, symbols or expressions in the matrix are called its entries or its elements. The horizontal and vertical ...
https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf
1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf
Abstract Xiang Hu Bao (XHB), meaning ‘mutual treasury’ in Chinese, is a novel online mutual aid platform operated by Alibaba’s Ant Financial to facilitate risk sharing of critical illness exposures. XHB reached nearly 100 million members in less than one year since its launch and ofered its mem-bers critical illness protections at significantly lower cost than traditional critical ...
https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf
The table’s intent is to provide a one-page overview of the main communication flows on IT risk that should exist in one form or another in any enterprise. More detailed information, e.g., source and destination of information, can be found in the Risk IT process descriptions, in the input and output tables.
https://sites.temple.edu/ticlj/files/2020/05/34.1_Article-D-Final-Format.pdf
World leaders and human rights groups have criticized the ICC as expensive and ineffective. This critique is essentially an attack on the court’s legitimacy. This Note argues that Bemba’s acquittal only serves to weaken that legitimacy. Beginning with an analysis of the majority and minority opinions, it then discusses how the decision will impact the ICC’s legitimacy by imposing ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf
In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...
https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf
Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf
Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...