Results 51 to 60 of about 126,150 (308)
Secure Outsourcing Algorithm of BTC Feature Extraction in Cloud Computing
Advances in cloud computing have aroused many researchers' interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data. Since block truncation coding (BTC) is known as a simple and efficient technology
Mingfang Jiang, Hengfu Yang
doaj +1 more source
The rapid development of the Internet of Things (IoT), big data and artificial intelligence (AI) technology has brought extensive IoT services to entities. However, most IoT services carry the risk of leaking privacy.
Bai Liu +4 more
doaj +1 more source
This study shows that copy number variations (CNVs) can be reliably detected in formalin‐fixed paraffin‐embedded (FFPE) solid cancer samples using ultra‐low‐pass whole‐genome sequencing, provided that key (pre)‐analytical parameters are optimized.
Hanne Goris +10 more
wiley +1 more source
Privacy preserving distributed optimization using homomorphic encryption
This paper studies how a system operator and a set of agents securely execute a distributed projected gradient-based algorithm. In particular, each participant holds a set of problem coefficients and/or states whose values are private to the data owner ...
Lu, Yang, Zhu, Minghui
core +1 more source
SNUPN‐Related Muscular Dystrophy: Novel Phenotypic, Pathological and Functional Protein Insights
ABSTRACT Objective SNUPN‐related muscular dystrophy or LGMDR29 is a new entity that covers from a congenital or childhood onset pure muscular dystrophy to more complex phenotypes combining neurodevelopmental features, cataracts, or spinocerebellar ataxia. So far, 12 different variants have been described.
Nuria Muelas +18 more
wiley +1 more source
Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih +40 more
wiley +1 more source
ABSTRACT Pathogenic variants in KIF1C cause Spastic Paraplegia 58 (SPG58), typically presenting with cerebellar ataxia and spastic paraparesis. We report two unrelated patients with spastic paraparesis, cerebellar ataxia, and tremor. Whole‐exome sequence analysis identified novel homozygous variants in the motor domain of KIF1C (NM_006612.6): c.921G>A (
Akihiko Mitsutake +12 more
wiley +1 more source
Benchmarking the Privacy-Preserving People Search [PDF]
People search is an important topic in information retrieval. Many previous studies on this topic employed social networks to boost search performance by incorporating either local network features (e.g.
Han, Shuguang, He, Daqing, Yue, Zhen
core
The Case of a 28‐Year‐Old Woman With Medically Refractory Focal Epilepsy
ABSTRACT We present the case of a 28‐year‐old right‐handed woman with medically refractory focal epilepsy. Her seizure semiology and electroencephalography (EEG) indicated a seizure onset zone in the right central‐parietal area. However, both MRI and PET scans were unremarkable, showing no focal lesions or areas of altered metabolism.
Rishi Sharma +5 more
wiley +1 more source
Privacy-preserving machine learning based on secure two-party computations
The paper is devoted to the analysis of privacy-preserving machine learning systems based on secure two-party computations. The paper provides introductory information about privacy-preserving machine learning systems, analyses the goals and objectives ...
Sergey V. Zapechnikov +1 more
doaj +1 more source

