Results 71 to 80 of about 1,487,229 (359)

Privacy-Preserving Shortest Path Computation

open access: yes, 2016
Navigation is one of the most popular cloud computing services. But in virtually all cloud-based navigation systems, the client must reveal her location and destination to the cloud service provider in order to learn the fastest route.
Mitchell, John C.   +3 more
core   +1 more source

Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey

open access: yesIEEE Access, 2021
Anonymization is a practical solution for preserving user’s privacy in data publishing. Data owners such as hospitals, banks, social network (SN) service providers, and insurance companies anonymize their user’s data before publishing it to protect the ...
Abdul Majeed, Sungchang Lee
semanticscholar   +1 more source

Cellular liquid biopsy provides unique chances for disease monitoring, preclinical model generation and therapy adjustment in rare salivary gland cancer patients

open access: yesMolecular Oncology, EarlyView.
We quantified and cultured circulating tumor cells (CTCs) of 62 patients with various cancer types and generated CTC‐derived tumoroid models from two salivary gland cancer patients. Cellular liquid biopsy‐derived information enabled molecular genetic assessment of systemic disease heterogeneity and functional testing for therapy selection in both ...
Nataša Stojanović Gužvić   +31 more
wiley   +1 more source

Privacy-Preserving Technologies [PDF]

open access: yes, 2020
AbstractThis chapter introduces privacy and data protection by design, and reviews privacy-enhancing techniques (PETs). Although privacy by design includes both technical and operational measures, the chapter focuses on the technical measures. First, it enumerates design strategies.
Josep Domingo-Ferrer   +1 more
openaire   +2 more sources

Privacy-preserving association rule mining via multi-key fully homomorphic encryption

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Association rule mining is an efficient method to mine the association relationships between different items from large transaction databases, but is vulnerable to privacy leakage as operates over users’ sensitive data directly.
Peiheng Jia   +4 more
doaj  

Privacy-preserving machine learning based on secure two-party computations

open access: yesБезопасность информационных технологий, 2021
The paper is devoted to the analysis of privacy-preserving machine learning systems based on secure two-party computations. The paper provides introductory information about privacy-preserving machine learning systems, analyses the goals and objectives ...
Sergey V. Zapechnikov   +1 more
doaj   +1 more source

Beyond digital twins: the role of foundation models in enhancing the interpretability of multiomics modalities in precision medicine

open access: yesFEBS Open Bio, EarlyView.
This review highlights how foundation models enhance predictive healthcare by integrating advanced digital twin modeling with multiomics and biomedical data. This approach supports disease management, risk assessment, and personalized medicine, with the goal of optimizing health outcomes through adaptive, interpretable digital simulations, accessible ...
Sakhaa Alsaedi   +2 more
wiley   +1 more source

Implementation of needle‐tracking technology for real‐time transrectal ultrasound‐guided interstitial gynecological HDR brachytherapy: A feasibility study

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose To investigate the feasibility of adapting a commercial prostate biopsy system for transrectal ultrasound (TRUS)‐guided hybrid gynecological (GYN) high‐dose‐rate (HDR) brachytherapy (BT). Leveraging 3D‐TRUS and MR image fusion, the prototype system aims to improve real‐time needle placement accuracy.
Lindsey H. Bloom   +8 more
wiley   +1 more source

Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]

open access: yes, 2007
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann   +4 more
core  

POSTER: Privacy-preserving Indoor Localization

open access: yes, 2014
Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user's device forces the localization provider to disclose ...
Henze, Martin   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy