Results 71 to 80 of about 47,575 (276)
Data Anonymization Using Pseudonym System to Preserve Data Privacy
Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools.
Shukor Abd Razak +2 more
doaj +1 more source
Search Rank Fraud De-Anonymization in Online Systems
We introduce the fraud de-anonymization problem, that goes beyond fraud detection, to unmask the human masterminds responsible for posting search rank fraud in online systems.
Akoglu Leman +6 more
core +1 more source
Evidence of Iron Accumulation in Cerebral Adrenoleukodystrophy: A Potential Novel Disease Mechanism
ABSTRACT In this first application of Quantitative Susceptibility Mapping Source Separation to cerebral adrenoleukodystrophy, we uncovered alterations in iron and myelin within lesions and normal appearing white matter. As validation, we demonstrate abnormal iron accumulation in those same compartments within primary brain tissue.
Christina L. Nemeth +8 more
wiley +1 more source
When the signal is in the noise: Exploiting Diffix's Sticky Noise [PDF]
Anonymized data is highly valuable to both businesses and researchers. A large body of research has however shown the strong limits of the de-identification release-and-forget model, where data is anonymized and shared. This has led to the development of
de Montjoye, Yves-Alexandre +4 more
core +1 more source
Low Incidence of Relapses After Vaccination in Anti‐Aquaporin‐4 Antibody‐Positive NMOSD
ABSTRACT Patients with neuromyelitis optica spectrum disorder (NMOSD) may experience increased signs and symptoms of their underlying disease when vaccinated against meningococcal disease before receiving complement component 5 inhibitor therapies. This retrospective analysis indicated an overall low relapse incidence (mean [range], 3.3% [0.7%–10.6 ...
Sean J. Pittock +4 more
wiley +1 more source
Anonymization algorithm based on time density for data stream
Aim to address the problem of anonymization on data streams,an anonymization algorithm based on time density for data stream was proposed.Time weight and time density were designed for describing the data stream’s temporal,when the published clusters ...
Jing XIE +3 more
doaj +2 more sources
Optimal Active Social Network De-anonymization Using Information Thresholds
In this paper, de-anonymizing internet users by actively querying their group memberships in social networks is considered. In this problem, an anonymous victim visits the attacker's website, and the attacker uses the victim's browser history to query ...
Erkip, E., Garg, S., Shirani, F.
core +1 more source
Query-Based Linked Data Anonymization [PDF]
We introduce and develop a declarative framework for privacy-preserving Linked Data publishing in which privacy and utility policies are specified as SPARQL queries. Our approach is data-independent and leads to inspect only the privacy and utility policies in order to determine the sequence of anonymization operations applicable to any graph instance ...
Delanaux, Rémy +3 more
openaire +2 more sources
RNA Sequencing Resolves Cryptic Pathogenic Variants in Mitochondrial Disease
ABSTRACT Objective Mitochondrial diseases are the most common inherited metabolic disorders, characterized by pronounced clinical and genetic heterogeneity that complicates molecular diagnosis. Although DNA‐based sequencing approaches have become standard in genetic testing, up to half of patients remain without a definitive diagnosis.
Zhimei Liu +21 more
wiley +1 more source

