Results 101 to 110 of about 12,445,360 (313)
Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [PDF]
With the wide application of LBS,location privacy protection is imperative.In recent years,location k-anonymity solution has become a research hotpot which is widely used.However,k-anonymity schemes are vulnerable to background knowledge attacks.Although
LI Yongjun, ZHU Yuefei, BAI Lifang
doaj +1 more source
Consensus Formation and Change are Enhanced by Neutrality
Neutral agents are shown to enhance both the formation and overturning of consensus in collective decision‐making. A general mathematical model and experiments with locusts and humans reveal that neutrality enables robust consensus via simple interactions and accelerates consensus change by reducing effective population size.
Andrei Sontag +3 more
wiley +1 more source
ITGB1 Regulates Triple‐Negative Breast Cancer Development by Modulating the Tumor Microenvironment
ABSTRACT Tumorigenesis and metastasis are frequently attributed to the intricate interplay between cancer cells and the tumor microenvironment (TME). Comprehending the mechanisms and key regulators of cancer‐immune crosstalk in the TME is imperative for developing efficacious immunotherapy.
Nuozi Song +12 more
wiley +1 more source
A large‐scale multiomic dataset (proteomic and metabolomic) comprising 3,060 plasma samples were analyzed to identify proteins, metabolites, pathways, and protein‐associated drugs linked to Alzheimer’s Disease (AD) independently of apolipoprotein E (APOE). AD was associated with a distinct molecular signature that captures.
Fuhai Li +22 more
wiley +1 more source
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
This study performs pan‐viromic profiling of 14,529 samples from 5,710 domestic herbivores across five Chinese provinces, establishing the DhCN‐Virome (1,085,360 viral metagenomes). It reveals species/sample‐specific viromic signatures and cross‐species transmission dynamics, aiding unified disease control.
Yue Sun +19 more
wiley +1 more source
User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy
Recommender systems have become an integral part of many social networks and extract knowledge from a user's personal and sensitive data both explicitly, with the user's knowledge, and implicitly.
Aghasian, Erfan +2 more
core +1 more source
Location privacy protection technology based on KHINN
Aiming at the problem that the user’s location privacy may be leaked while users obtain location-based services,mobile terminal and LBS server the ends use k-anonymity mechanisms using the collaborative distributed model.Balanced incremental nearest ...
Lijin ZHUANG, Yuyi OU, Jie LING
doaj +2 more sources
A Personalized (p,k)-Anonymity Privacy Protection Algorithm [PDF]
Most of the existing anonymous algorithms only implement the privacy protection by quasi-identifier generalization,which do not consider personalized protection issues of the sensitive attribute.Aiming at this problem,by using the p-sensitive k-anonymity
JIA Junjie,YAN Guolei
doaj
High‐content Stimulated Raman Scattering (SRS) Imaging reveals that ovarian cancer cells surviving Chimeric Antigen Receptor (CAR) ‐T cell challenge exhibit increased cholesterol esterification. Pharmacological inhibition of this pathway with Avasimibe significantly enhances CAR‐T induced killing of ovarian cancer cells by reducing cancer cell ...
Chinmayee V. Prabhu Dessai +8 more
wiley +1 more source

