Results 111 to 120 of about 676,463 (285)
A scoping review of privacy protection in LBS: Architectures, Threats, and Defense mechanisms
Location-based services (LBS) generate large volumes of spatiotemporal data, raising significant privacy concerns. Yet the field lacks a systematic survey that examines security risks across the full LBS data lifecycle and provides a comprehensive ...
Yuxi Li +7 more
doaj +1 more source
Round-Optimal Authenticated Key Exchange with Full Forward Privacy
Privacy-preserving authenticated key exchange (PPAKE) is a cryptographic protocol that enables two users to exchange a session key while protecting users' privacy (i.e., hiding the user's identity) against the machine-in-the-middle adversary. To hide user identities, PPAKE messages are broadcast to the network, increasing communication complexity.
Koki Matsui +3 more
openaire +1 more source
An entity‐centric foundation model, GloPath, is introduced for comprehensive glomerular lesion assessment from routine renal biopsy images. Trained on over one million glomeruli, the framework enables robust lesion recognition, grading, and cross modality diag nosis, while uncovering large‐scale clinicopathological associations.
Qiming He +28 more
wiley +1 more source
Privacy Risks and Regulatory Challenges in Smart Grids and Renewable Energy Systems
Smart grid technologies are central to the global shift towards a more efficient and sustainable energy infrastructure, integrating advanced digital systems with traditional power networks.
Mikołaj Rajca
doaj +1 more source
ABSTRACT Extracellular vesicles (EVs) are nanoscale mediators of intercellular communication with diverse molecular cargoes that reflect their cell of origin. Advances in isolation, detection, and single‐particle analytics have revealed increasing molecular and functional heterogeneity, while exposing limitations in how EV identity and activity are ...
David J. Lundy +8 more
wiley +1 more source
Privacy and trust aect our strategic thinking, yet they have not been precisely modeled in mechanism design. In settings of incomplete information, traditional implementations of a normal-form mechanism - by disregarding the players' privacy, or assuming
Matt Lepinski +2 more
core
Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu +4 more
wiley +1 more source
Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu +10 more
wiley +1 more source
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data
This study addresses the challenge of extracting valuable information and selecting key variables from large datasets, essential across statistics, computational science, and data science.
Jinxia Li, Liwei Lu
doaj +1 more source
Ethical Precision in Nanoscale Brain Interfacing
As brain interfaces approach the nanoscale, precision no longer only measures—it knows, predicts, and potentially reshapes the mind. This work argues that traditional ethics fails under such conditions and proposes a shift toward continuous, operation‐based governance using the recovery–discovery framework to track, constrain, and responsibly steer ...
Guilherme Wood
wiley +1 more source

