Results 81 to 90 of about 647,604 (320)
Methods for working with problem residents in medical physics residency education
Abstract Medical physics residency training programs may occasionally encounter residents requiring additional intervention beyond normal training efforts. In the literature, these residents are referred to as “problem” residents. While the physician literature on the subject is valuable, this paper specifically focuses on dealing with a problem ...
Christopher J. Watchman, Dandan Zheng
wiley +1 more source
Privacy Design Strategies [PDF]
In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design early in the software development life cycle, during concept development and analysis. Using current data protection legislation as point of departure we derive the following eight privacy design strategies: minimise, hide ...
arxiv
Information-Theoretic Privacy in Federated Submodel learning [PDF]
We consider information-theoretic privacy in federated submodel learning, where a global server has multiple submodels. Compared to the privacy considered in the conventional federated submodel learning where secure aggregation is adopted for ensuring privacy, information-theoretic privacy provides the stronger protection on submodel selection by the ...
arxiv
Abstract Purpose An evaluation of the accuracy, safety, and efficiency of the Halcyon ring delivery system (RDS) for stereotactic radiosurgery (SRS) treatment to relatively small (1–3 cm) brain lesions. Methods After completing the extensive in‐house quality assurance checks including Winston–Lutz test and independent dose verification via MD Anderson ...
Kate Hazelwood+5 more
wiley +1 more source
Information-theoretic metrics for Local Differential Privacy protocols [PDF]
Local Differential Privacy (LDP) protocols allow an aggregator to obtain population statistics about sensitive data of a userbase, while protecting the privacy of the individual users. To understand the tradeoff between aggregator utility and user privacy, we introduce new information-theoretic metrics for utility and privacy.
arxiv
Abstract Background Tumor segmentation is crucial for lung disease diagnosis and treatment. Most existing deep learning‐based automatic segmentation methods rely on manually annotated data for network training. Purpose This study aims to develop an unsupervised tumor segmentation network smic‐GAN by using a similarity‐driven generative adversarial ...
Chengyijue Fang+2 more
wiley +1 more source
Five years with the GDPR: an empirical study emphasising information privacy and the consumer
Consumers’ privacy rights have been enshrined in law, long before information systems and the Internet was brought to life. In 2018, stricter regulations relating to information privacy came into force, named the General Data Protection Regulation (GDPR)
Wanda Presthus, Hanne Sørum
doaj +1 more source
Privacy-Aware Reversible Watermarking in Cloud Computing Environments
As an interdisciplinary research between watermarking and cryptography, privacy-aware reversible watermarking permits a party to entrust the task of embedding watermarks to a cloud service provider without compromising information privacy.
Ching-Chun Chang+2 more
doaj +1 more source
Self-Quarantine System and Personal Information Privacy in South Korea. [PDF]
Lee SG, Kim E.
europepmc +1 more source
In this paper, we define noiseless privacy, as a non-stochastic rival to differential privacy, requiring that the outputs of a mechanism (i.e., function composition of a privacy-preserving mapping and a query) can attain only a few values while varying the data of an individual (the logarithm of the number of the distinct values is bounded by the ...
arxiv