SlideShare ist ein Scribd-Unternehmen logo
1 von 107
Downloaden Sie, um offline zu lesen
Privacy
https://www.linkedin.com/in/ponguru/
Nov 19 - 20, 2022
Winter School on “Topics in Digital Trust”
IIT Bombay
Ponnurangam Kumaraguru (“PK”)
#ProfGiri CS IIIT Hyderabad
ACM Distinguished Member
TEDx Speaker
https://www.instagram.com/pk.profgiri/
2
3
https://precog.iiit.ac.in/
Know the Audience
4
Long Distance Train Journey
5
https://precog.iiit.ac.in/Publications_files/pk_lc_PET_2005.pdf
Content around
Definition & forms of Privacy
Privacy Attitudes & Awareness
Social Media Privacy
Data anonymity
User behavior & Usable privacy
Ethics around studying privacy
Non Personal Data [Discussion]
6
7
https://youtu.be/vAXPzUrqBnI
Activity
Watch the full video
on YouTube
[Mandatory]
Activity
8
https://youtu.be/uaaC57tcci0
Watch the trailer on YouTube [Mandatory]
Watch the full documentary on Netflix
[Optional]
Activity
9
https://youtu.be/iX8GxLP1FHo
Watch the trailer on YouTube
[Mandatory]
Watch the full documentary on
Netflix [Optional]
10
https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1184&context=fss_papers&httpsredir=1&referer=
“Privacy is a value so
complex, so entangled in
competing and
contradictory dimensions,
so engorged with various
and distinct meanings, that
I sometimes despair
whether it can be usefully
addressed at all.”
Control over information
“Privacy is the claim of individuals, groups or institutions to
determine for themselves when, how, and to what extent
information about them is communicated to others.”
“…each individual is continually engaged in a personal
adjustment process in which he balances the desire for privacy
with the desire for disclosure and communication….”
Alan Westin, Privacy and Freedom, 1967
11
Westin's 4 states of Privacy
• Solitude
• individual separated from the group and freed from the observation of other
persons
• Intimacy
• individual is part of a small unit
• Anonymity
• individual in public but still seeks and finds freedom from identification and
surveillance
• Reserve
• the creation of a psychological barrier against unwanted intrusion - holding
back communication
12
Solove's Privacy Taxonomy
• Information Collection
• Surveillance
• Interrogation
• Information Processing
• Aggregation
• Identification
• Secondary Use
• Invasion
• Intrusion
• Decisional Interference
13
https://www.privacysecurityacademy.com/wp-content/uploads/2018/02/Handout-Foundations-and-Themes-
Professor-Soloves-Taxonomy-of-Privacy-01.pdf
• Information Dissemination
• Breach of Confidentiality
• Disclosure
• Exposure
• Increased Accessibility
• Blackmail
• Appropriation
• Distortion
Westin's Privacy Indexes
14
http://reports-archive.adm.cs.cmu.edu/anon/isri2005/CMU-ISRI-05-138.pdf
Fundamentalist
Pragmatist
Unconcerned
Westin's Privacy Indexes
15
http://reports-archive.adm.cs.cmu.edu/anon/isri2005/CMU-ISRI-05-138.pdf
Fundamentalist – 25%
Pragmatist – 60%
Unconcerned - 15%
Privacy in India
16
https://precog.iiit.ac.in/Publications_files/pk_lc_PET_2005.pdf
1st quantitative study in India
2005 study
India's largest privacy study
2011 / 2012
10,427 respondents
17
https://precog.iiit.ac.in/Publications_files/Niharika-Sachdeva-Privacy-in-India-Demystified-2017.pdf
18
What do you feel about privacy of your personal information on your OSN?
19
What do you feel about privacy of your personal information on your OSN?
20
If you receive a friendship request on your most frequently used OSN, which of the following
people will you add as friends? (Choose all that apply)
21
If you receive a friendship request on your most frequently used OSN, which of the following
people will you add as friends? (Choose all that apply)
22
You thought that on the Internet nobody knew you were a dog…
23
You thought that on the Internet nobody knew you were a dog…
…but then you started getting personalized ads for your favorite
brand of dog food
OECD guidelines
Collection limitation
Data quality
Purpose specification
Use limitation
Security safeguards
Openness
Individual participation
Accountability
24
https://www.oecd.org/sti/ieconomy/oecd_privacy_framework.pdf
FTC principles
Notice and disclosure
Choice and consent
Data security
Data quality and access
Recourse and remedies
25
https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-report-congress/priv-23a.pdf
26
Cost of Reading
Privacy Policies
Privacy Enhancing Technologies
27
To balance privacy & utility
Minimize personal data use, maximize data security, empower users
To express / protect the privacy of entities
Protect PII
Increase control
Choose degree of anonymization
Provide informed consent
Data minimization
Privacy Enhancing Technologies: Examples
28
Communication anonymizers – VoIP, P2P networking
Shared bogus online accounts – One account created, ID & Pwd posted
online, many people use, so one person identity cannot be retrieved
Obfuscation – Perturbing the data, adding noise
Anonymization – Data can be shared, individuals cant be find in the
data
Pseudonymization - Ponnurangam Kumaraguru --> CSProf; Reddit
Your examples?
…
Tor: Onion Routing
29
https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-
works-and-how-it-can-help-you-protect-your-identity-online.html
Tor: Onion Routing
30
https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-
works-and-how-it-can-help-you-protect-your-identity-online.html
Tor: Onion Routing
31
https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-
works-and-how-it-can-help-you-protect-your-identity-online.html
32
https://www.torproject.org/download/
Privacy Invasive Technologies
33
Does not respect user privacy
Spyware – Share user details without user's knowledge
RFID – Enable tracking
Web bug (web beacons, clear gifs, tracker gifs)
Your examples?
…
Privacy decision making
To make privacy information more usable to consumers
Platform for Privacy Preferences (P3P)
XML format that web sites use to encode their privacy policies
User software to read P3P policies called a “P3P user agent”
34
HTTP connection
35
Lorrie's slides
P3P implementation
36
Lorrie's slides
P3P – XML Encoding
37
Lorrie's slides
Privacy Bird indicator
38
Lorrie's slides
Privacy Bird indicator
39
Lorrie's slides
Privacy Bird indicator
40
Lorrie's slides
Privacy Finder
41
Lorrie's slides
Privacy Finder
42
Lorrie's slides
43
Lorrie's slides
44
Lorrie's slides
Topics from Yesterday?
45
46
47
48
49
http://precog.iiitd.edu.in/Publications_files/aa-spyingextensions.pdf
Voter
Surveillance
50
https://precog.iiit.ac.in/assets/images/2020_10_Voted_to_Pwned_Poster.png SocInfo 2020
Facebook / Congress
51
https://youtu.be/EgI_KAkSyCw
Facebook / Congress – Shadow profiles
52
https://youtu.be/JiTQkbLzKUc
Posted on Social?
53
54
55
Google / Congress
56
https://youtu.be/-nSHiHO6QJI
57
https://youtu.be/PArFP7ZJrtg
Activity Mandatory
Edward Snowden, Permanent Record
Homework
https://docs.google.com/document/d/1iih8B7m0-
gIYgFJTLzlxCd4bILKbRkVwW2Gv4GslKTQ/edit
58
Motivation for anonymization: AOL Search
data leak
59
https://en.wikipedia.org/wiki/AOL_search_data_leak
Motivation for anonymization: AOL Search
data leak
60
https://en.wikipedia.org/wiki/AOL_search_data_leak
On Aug 4, 2006
650,00 users, 20 Million search keywords,
for 3 months
Removed on Aug 7, 2006
AOL did not identify the users – PII of users
were in the data
NY Times re-identified users cross-
referencing other sources, including phone
book listing
AOL ACK the mistake; many copies of the
data was distributed
“101 Dumbest Moments in business”
61
https://web.archive
.org/web/2018031
2064453/http://ww
w.nytimes.com/200
6/08/09/technolog
y/09aol.html
62
https://web.archive
.org/web/2018031
2064453/http://ww
w.nytimes.com/200
6/08/09/technolog
y/09aol.html
Motivation for anonymization: Netflix Prize
63
Motivation for anonymization: Netflix Prize
64
Collaborative Filtering algorithm to predict user
rating for films based on previous ratings
without any other information
<user, movie, date of rating, rating>
Training: 100M
Testing: 2.8M
"deleting ratings; inserting alternative ratings
and dates; and modifying rating dates”
Source code + description to be submitted
Jury to decide
Started Oct 6, 2006 – June 2007 20,000 entries
submitted
https://en.wikipedia.org/wiki/Netflix_Prize
Netflix Prize: Privacy concerns
65
Anonymization techniques
K-anonymity
https://en.wikipedia.org/wiki/K-anonymity
L-diversity
https://en.wikipedia.org/wiki/L-diversity
T-closeness
https://en.wikipedia.org/wiki/T-closeness
Differential privacy
https://en.wikipedia.org/wiki/Differential_privacy
https://www.youtube.com/watch?v=OfWj89oRD7g
66
De-identification
67
Latanya Sweeney
k-anonymity
Suppression – Replace individual attribute with *
Generalization – Replace individual attributes with a broader category;
Weight: 45 Kgs à Weight: 40 – 50 Kgs
68
First name Last name Age Caste
Raj Sharma 25 BC
Srishti Rawat 40 GC
Manish Sharma 25 BC
Srishti Kaur 29 OBC
https://www.cs.cmu.edu/~jblocki/Slides/K-Anonymity.pdf
k-anonymity
69
First name Last name Age Caste
* Sharma 25 BC
Srishti * * *
* Sharma 25 BC
Srishti * * *
k-anonymity
2-anaonymized with suppression
1 & 3, 2 & 4 identical
Every cell can be *, but data will be useless
Cost of doing is number of *s
Fewer cells suppressed to provide k-anonymity
70
First name Last name Age Caste
* Sharma 25 BC
Srishti * * *
* Sharma 25 BC
Srishti * * *
K-anonymity
71
72
https://epic.org/privacy/reidentification/Sweeney_Article.pdf
Limitations
Lack of diversity in sensitivity attributes
Background knowledge
Subsequent release of same dataset
73
My introduction to Privacy, Anonymity
74
75
l-diversity
https://slideplayer.com/slide/6027080/
Sensitive attributes
must be “diverse”
within
each quasi-identifier
equivalence class
76
l-diversity
Sensitive attributes
must be “diverse”
within
each quasi-identifier
equivalence class
77
l-diversity
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1617392
Limitation
Values within one
equivalence class may
have semantic similarity
78
79
t-closeness
https://slideplayer.com/slide/6027080/
Distribution of sensitive
attributes within each
quasi-identifier group
should be “close” to their
distribution in the entire
original database
80
t-closeness
https://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf
81
Differential privacy
https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/dwork.pdf
82
Real world
implementation
83
Cynthia Dwork
https://www.youtube.com/watch?v=lg-VhHlztqo
What is Ethics?
84
Why study Ethics in
the Privacy class?
85
Institutional Review Board
(IRB)
What is it?
Why do we need it?
Why study ethics?
86
Stanford Prison Experiment
Randomly assigned participants as
guards or prisoners
1971
Arrested prisoners at home
24 UGs in the basement of a building
Authoritarian and draconian
behaviour
Sadistic behaviour by guards
Physical abuse
Sexual humiliation
Sleep on concrete
87
Stanford Prison
Experiment
88
Milgram
Experiment
1961, Yale university
Participants to obey Experimenter
Shock
65% went to give 450V
89
Common things Students
would do in the project
report, presentations
Refer the participant(s) by name
”We collected data and my friend Shiva said this”
Put screen shot of a conversation on email / chat in presentation
without anonymizing / suppressing / blackening the name / email ID
Especially if you collect some sensitive information you have to be
doubly careful
90
Institutional Review Board
(IRB)
IRB Application
Consent form
Proposal
Flyer
IRB is only a floor not a ceiling!
91
What is IRB
committee looking
for?
One being setup in IIITH now
Is this the only way to collect the information that Researcher is
interested in?
What protection is giving to the information that is collected?
Is there any implications of the data beyond the study?
92
93
Reactions for the
study
Anger
Unethical, inappropriate, illegal, fraudulent
Researchers fired
Psychological cost
Denial
Nobody accepted that they fell for it
Admitting our vulnerability is hard
Misunderstanding over spoofing emails
Underestimation of publicly available
information
94
Research Failures
U.S. Office for Human Research Protection
suspended all research at John Hopkins University
after one research participant died
May 1999, federal regulators temporarily stopped
research at Duke over concerns of volunteer safety
University of Pennsylvania, an 18-year-old died in
Sept 1999 from drugs administered as part of a
gene therapy study
Other studies where participants have died
95
Principles of
Research with
Human Subjects
Respect for Persons
individuals have autonomy and choice
people cannot be used as a means
to an end
provide protection to the vulnerable
provide informed consent and privacy
96
Principles of
Research with
Human Subjects
Beneficence
kindness beyond duty
obligation to do no harm
obligation to prevent harm
obligation to do good
minimize risks, maximize benefits
97
Principles of
Research with
Human Subjects
Justice
treat all fairly
share equitably burdens and benefits
98
Federal
regulations,
implementation
Respect for Persons -- Informed Consent
Beneficence -- Assessment of risk and
benefits, minimize risk
Justice -- Fair selection of participants
99
100
https://phrptraining.com/about-phrp-course
Ethical Security
Studies
101
Our responsibility
Researchers have a responsibility to know how to conduct research
ethically
102
Datasets
103
https://precog.iiit.ac.in/resources.html
104
https://precog.iiit.ac.in/
Takeaways
No dearth of problems to study…
You should be keen to look for it around…
Will be happy to discuss anything further…
105
Acknowledgements
Lorrie Cranor’s slides
Thanks to faculty who taught courses on these topics
106
107
Thanks!
Questions? pk.guru@iiit.ac.in
http://precog.iiit.ac.in/
@ponguru
pk.profgiri
linkedin/in/ponguru

Weitere ähnliche Inhalte

Ähnlich wie Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay

Why portability matters....
Why portability matters....Why portability matters....
Why portability matters....
Ian Forrester
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 

Ähnlich wie Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay (20)

btNOG 9 Keynote Speech on Evolution of Social Engineering
btNOG 9 Keynote Speech on Evolution of Social EngineeringbtNOG 9 Keynote Speech on Evolution of Social Engineering
btNOG 9 Keynote Speech on Evolution of Social Engineering
 
Why portability matters....
Why portability matters....Why portability matters....
Why portability matters....
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
 
Deep learning - Part I
Deep learning - Part IDeep learning - Part I
Deep learning - Part I
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
 
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Zoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case studyZoom: Privacy and Security - A case study
Zoom: Privacy and Security - A case study
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Software Backdoors, Chiaravalle
Software Backdoors, ChiaravalleSoftware Backdoors, Chiaravalle
Software Backdoors, Chiaravalle
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14
 
The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...The Internet of Things - 36th International Conference of Privacy and Data Co...
The Internet of Things - 36th International Conference of Privacy and Data Co...
 

Mehr von IIIT Hyderabad

Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad
 
A Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian LanguagesA Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian Languages
IIIT Hyderabad
 

Mehr von IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 
A Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian LanguagesA Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian Languages
 

Kürzlich hochgeladen

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Kürzlich hochgeladen (20)

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 

Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay