Results 81 to 90 of about 23,477,104 (364)
Secure Data Sharing in Smart Homes: An Efficient Approach Based on Local Differential Privacy and Randomized Responses [PDF]
Amr Tarek Elsayed +3 more
openalex +1 more source
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional
Chander, Anupam +2 more
core +1 more source
In this exploratory study, we investigated the relationship between the gut microbiota and outcome in patients with metastatic hormone receptor‐positive breast cancer, treated in a randomized clinical trial with chemotherapy alone or chemotherapy in combination with immune checkpoint blockade.
Andreas Ullern +7 more
wiley +1 more source
Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management [PDF]
S. Poorani, R. Anitha
openalex +1 more source
This study characterizes the responses of primary acute myeloid leukemia (AML) patient samples to the MCL‐1 inhibitor MIK665. The results revealed that monocytic differentiation is associated with MIK665 sensitivity. Conversely, elevated ABCB1 expression is a potential biomarker of resistance to the treatment, which can be overcome by the combination ...
Joseph Saad +17 more
wiley +1 more source
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande +11 more
wiley +1 more source
Dicing with data: the risks, benefits, tensions and tech of health data in the iToBoS project
This paper will discuss the European funded iToBoS project, tasked by the European Commission to develop an AI diagnostic platform for the early detection of skin melanoma.
Niamh Aspell +2 more
doaj +1 more source
Adversarial attacks and defenses in deep learning
The adversarial example is a modified image that is added imperceptible perturbations, which can make deep neural networks decide wrongly. The adversarial examples seriously threaten the availability of the system and bring great security risks to the ...
LIU Ximeng +2 more
doaj +1 more source
There is increasing need to build information systems that protect the privacy and ownership of data without impeding the flow of information. We will present some of our current work to demonstrate the technical feasibility of building such systems.
openaire +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source

