Results 21 to 30 of about 15,311 (163)

Building Trusted Federated Learning: Key Technologies and Challenges

open access: yesJournal of Sensor and Actuator Networks, 2023
Federated learning (FL) provides convenience for cross-domain machine learning applications and has been widely studied. However, the original FL is still vulnerable to poisoning and inference attacks, which will hinder the landing application of FL ...
Depeng Chen   +3 more
doaj   +1 more source

A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains

open access: yesIEEE Access, 2023
With the frequent occurrence of private data breaches, it is now more necessary than ever to address how to protect private data. The combination of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and blockchain typically enables secure storage and
Caimei Wang   +5 more
doaj   +1 more source

Aggregative Game for Distributed Charging Strategy of PEVs in a Smart Charging Station

open access: yesAxioms, 2023
This paper proposes a charging strategy for plug-in electric vehicles (PEVs) in a smart charging station (SCS) that considers load constraints and time anxieties.
Ti Kang, Huaqing Li, Lifeng Zheng
doaj   +1 more source

Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System

open access: yesIEEE Access, 2020
In the multimedia communication system, users are often exposed to fraud information from malicious applications (such as providing fake bids and false content), which can easily cause privacy leakage.
Rui Zhang   +4 more
doaj   +1 more source

Research on Dynamic Searchable Encryption Method Based on Bloom Filter

open access: yesApplied Sciences
Data outsourcing has become more and more popular due to its low cost and flexibility. However, there is a problem that the cloud server used to store data is partially trusted.
Ziqi Jin   +3 more
doaj   +1 more source

Differentially private false discovery rate control

open access: yesThe Journal of Privacy and Confidentiality, 2021
Differential privacy provides a rigorous framework for privacy-preserving data analysis. This paper proposes the first differentially private procedure for controlling the false discovery rate (FDR) in multiple hypothesis testing.
Cynthia Dwork, Weijie Su, Li Zhang
doaj  

Secure and Efficient Deduplication for Cloud Storage with Dynamic Ownership Management

open access: yesApplied Sciences, 2023
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This
Mira Lee, Minhye Seo
doaj   +1 more source

Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

open access: yesJournal of Sensor and Actuator Networks
Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehensions ...
Salim Sabah Bulbul   +5 more
doaj   +1 more source

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Home - About - Disclaimer - Privacy