Results 81 to 90 of about 1,768,773 (316)
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional
Chander, Anupam+2 more
core +1 more source
NMDAR‐Antibody Encephalitis Diagnosed With Primary Central Nervous System Lymphoma: A Case Series
ABSTRACT N‐methyl‐D‐aspartate receptor‐antibody encephalitis (NMDAR encephalitis) is one of the most common forms of autoimmune encephalitis, with a paraneoplastic relationship described in approximately 38%. Primary central nervous system lymphoma (PCNSL) is a rare hematologic malignancy that is not often considered as the underlying neoplasm in this ...
Soo Hyun Ahn+4 more
wiley +1 more source
Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples
Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has
Yixiang Wang+5 more
doaj +1 more source
Phenotyping Healthcare Use 2–3 Decades Before the First Multiple Sclerosis Demyelinating Event
ABSTRACT Objective Phenotype hospital, physician, and emergency department (ED) visits by diagnoses and specialty up to 29 years pre‐multiple sclerosis (MS) onset versus a matched population without MS. Methods We identified people with MS (PwMS) using population‐based administrative data from Ontario, Canada (1991–2020).
Helen Tremlett+8 more
wiley +1 more source
ABSTRACT This case described a 25‐year‐old pregnant woman with refractory multifocal epilepsy, diagnosed in 2020 and treated with bilateral thalamic deep brain stimulation (DBS) targeting the centromedian and pulvinar nuclei. Prior to DBS, she experienced daily focal seizures, often progressing to generalized tonic–clonic seizures despite optimal ...
Shalin Shah+4 more
wiley +1 more source
This paper aims to identify and order the harms or losses which the law might compensate (or more widely redress) in actions for breach of privacy. Part I identifies three such detriments, to which all the others are reducible: pecuniary loss, mental distress and breach of privacy per se. Part II seeks to explain why they cannot all coexist at the same
openaire +4 more sources
ABSTRACT Objective To compare the effectiveness of high‐efficacy treatments (HET) and low‐efficacy treatments (LET) in NMOSD patients with anti‐aquaporin‐4 antibodies (AQP4‐ab). Methods In this multi‐center study, we analyzed 183 AQP4‐ab seropositive NMOSD patients who received immunosuppressive treatments (IST).
Xiang Li+10 more
wiley +1 more source
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source
Differentially Private Regression for Discrete-Time Survival Analysis
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability.
Hui, Siu Cheung, Nguyên, Thông T.
core +1 more source
Privacy in Implementation [PDF]
In most implementation frameworks agents care only about the outcome, and not at all about the way in which it was obtained. Additionally, typical mechanisms for full implementation involve the complete revelation of all private information to the planner. In this paper I consider the problem of full implementation with agents who may prefer to protect
openaire +5 more sources