Results 51 to 60 of about 2,010,621 (347)
Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann +4 more
core
ABSTRACT Objective To compare the efficacy and safety of roxarestat versus recombinant human erythropoietin (rhEPO) in the management of renal anemia in patients undergoing maintenance hemodialysis. Methods This was a prospective, open‐label, randomized controlled trial.
Lingling Chen, Junjie Zhu, Qiaonan Ge
wiley +1 more source
TriGuard: mitigating bribery in DPoS-based blockchain governance for Web 3.0 [PDF]
The evolution of Web 3.0 has brought decentralized governance to the forefront, with Delegated Proof-of-Stake (DPoS) mechanisms playing a pivotal role.
Jingyu Liu +5 more
doaj +1 more source
Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022
High-quality academic publishing is built on rigorous peer review [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj +1 more source
Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley +1 more source
Truthful Linear Regression [PDF]
We consider the problem of fitting a linear model to data held by individuals who are concerned about their privacy. Incentivizing most players to truthfully report their data to the analyst constrains our design to mechanisms that provide a privacy ...
Cummings, Rachel +2 more
core +3 more sources
Formal Verification of Differential Privacy for Interactive Systems
Differential privacy is a promising approach to privacy preserving data analysis with a well-developed theory for functions. Despite recent work on implementing systems that aim to provide differential privacy, the problem of formally verifying that ...
Datta, Anupam +2 more
core +2 more sources
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges
Targets of cyber crime are not exclusive to the private sector. Successful cyber attacks on nation-states have proved that cyber threats can jeopardize significant national interests.
Suhyeon Lee, Seungjoo Kim
doaj +1 more source

