A Scoping Review on Analysis of the Barriers and Support Factors of Open Data
Background: Using personal data as Open Data is a pervasive topic globally, spanning various sectors and disciplines. Recent technological advancements, particularly in artificial intelligence and algorithm-driven analysis, have significantly expanded ...
Norbert Lichtenauer +3 more
doaj +1 more source
Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley +1 more source
Visual attention and cognitive effects of facial anonymization in 360° videos
We analyze perceptual effects of facial anonymization in 360° videos to understand how different anonymization technologies affect the attention and cognition of viewers. 360° videos provide highly immersive viewing experiences, making them ideal for the
Leslie Wöhler +2 more
doaj +1 more source
Deep Image Prior Amplitude SAR Image Anonymization
This paper presents an extensive evaluation of the Deep Image Prior (DIP) technique for image inpainting on Synthetic Aperture Radar (SAR) images. SAR images are gaining popularity in various applications, but there may be a need to conceal certain ...
Edoardo Daniele Cannas +4 more
doaj +1 more source
Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung +17 more
wiley +1 more source
A Multi-Objective Degree-Based Network Anonymization Method
Enormous amounts of data collected from social networks or other online platforms are being published for the sake of statistics, marketing, and research, among other objectives.
Ola N. Halawi +2 more
doaj +1 more source
Assessing Data Usefulness for Failure Analysis in Anonymized System Logs
System logs are a valuable source of information for the analysis and understanding of systems behavior for the purpose of improving their performance. Such logs contain various types of information, including sensitive information.
Ciorba, Florina M., Ghiasvand, Siavash
core +1 more source
The PI3Kδ inhibitor roginolisib (IOA‐244) preserves T‐cell function and activity
Identification of novel PI3K inhibitors with limited immune‐related adverse effects is highly sought after. We found that roginolisib and idelalisib inhibit chronic lymphocytic leukemia (CLL) cells and Treg suppressive functions to similar extents, but roginolisib affects cytotoxic T‐cell function and promotion of pro‐inflammatory T helper subsets to a
Elise Solli +7 more
wiley +1 more source
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
Anonymization techniques are widely used to make personal data broadly available for analytics/data-mining purposes while preserving the privacy of the personal information enclosed in it.
Abdul Majeed
doaj +1 more source
Optimal Active Social Network De-anonymization Using Information Thresholds
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker's website, and the attacker uses the victim's browser history to query ...
Erkip, E., Garg, S., Shirani, F.
core +1 more source

