Results 101 to 110 of about 2,010,621 (347)
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef +8 more
core +3 more sources
ABSTRACT Background SOX1 antibody‐positive paraneoplastic neurological syndromes (PNS) exhibit significant population‐specific clinical heterogeneity. While Western cohorts predominantly manifest Lambert‐Eaton myasthenic syndrome (65%–80%), comprehensive clinical characterization and treatment response data in Asian populations remain critically ...
Jin‐Long Ye +11 more
wiley +1 more source
Home robots will cause privacy harms. At the same time, they can provide beneficial services—as long as consumers trust them. This Essay evaluates potential technological solutions that could help home robots keep their promises, avert their eyes, and ...
Grimm, Cindy M. +3 more
core +2 more sources
Law often blocks sensitive personal information to prevent discrimination. It does so, however, without a theory or framework to determine when doing so is warranted. As a result, these measures produce mixed results. This article offers a theoretical framework for determining, with a view of preventing discrimination, when personal information should ...
openaire +3 more sources
Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler +20 more
wiley +1 more source
Differentially Private Empirical Risk Minimization [PDF]
Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed.
Anand D. Sarwate +3 more
core +2 more sources
Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito +14 more
wiley +1 more source
Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples
Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has
Yixiang Wang +5 more
doaj +1 more source
AnonPri: A Secure Anonymous Private Authentication Protocol for RFID Systems [PDF]
Privacy preservation in RFID systems is a very important issue in modern day world. Privacy activists have been worried about the invasion of user privacy while using various RFID systems and services.
Rahman, Farzana +2 more
core +1 more source

