Results 21 to 30 of about 15,311 (163)
Building Trusted Federated Learning: Key Technologies and Challenges
Federated learning (FL) provides convenience for cross-domain machine learning applications and has been widely studied. However, the original FL is still vulnerable to poisoning and inference attacks, which will hinder the landing application of FL ...
Depeng Chen +3 more
doaj +1 more source
With the frequent occurrence of private data breaches, it is now more necessary than ever to address how to protect private data. The combination of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and blockchain typically enables secure storage and
Caimei Wang +5 more
doaj +1 more source
Aggregative Game for Distributed Charging Strategy of PEVs in a Smart Charging Station
This paper proposes a charging strategy for plug-in electric vehicles (PEVs) in a smart charging station (SCS) that considers load constraints and time anxieties.
Ti Kang, Huaqing Li, Lifeng Zheng
doaj +1 more source
In the multimedia communication system, users are often exposed to fraud information from malicious applications (such as providing fake bids and false content), which can easily cause privacy leakage.
Rui Zhang +4 more
doaj +1 more source
Research on Dynamic Searchable Encryption Method Based on Bloom Filter
Data outsourcing has become more and more popular due to its low cost and flexibility. However, there is a problem that the cloud server used to store data is partially trusted.
Ziqi Jin +3 more
doaj +1 more source
Differentially private false discovery rate control
Differential privacy provides a rigorous framework for privacy-preserving data analysis. This paper proposes the first differentially private procedure for controlling the false discovery rate (FDR) in multiple hypothesis testing.
Cynthia Dwork, Weijie Su, Li Zhang
doaj
Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This
Mira Lee, Minhye Seo
doaj +1 more source
Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions ...
Salim Sabah Bulbul +5 more
doaj +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source

