Results 81 to 90 of about 2,252,336 (338)

Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods

open access: yesCybersecurity
Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure multi-party computing, in order to preserve ...
Yanwei Gong   +5 more
doaj   +1 more source

Truthful Linear Regression [PDF]

open access: yes, 2015
We consider the problem of fitting a linear model to data held by individuals who are concerned about their privacy. Incentivizing most players to truthfully report their data to the analyst constrains our design to mechanisms that provide a privacy ...
Cummings, Rachel   +2 more
core   +3 more sources

Certified Robustness to Adversarial Examples with Differential Privacy [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2018
Adversarial examples that fool machine learning models, particularly deep neural networks, have been a topic of intense research interest, with attacks and defenses being developed in a tight back-and-forth.
Mathias Lécuyer   +4 more
semanticscholar   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

Advanced Cloud Privacy Threat Modeling

open access: yes, 2016
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core   +1 more source

Network Localization of Fatigue in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo   +12 more
wiley   +1 more source

CurriculumPT: LLM-Based Multi-Agent Autonomous Penetration Testing with Curriculum-Guided Task Scheduling

open access: yesApplied Sciences
While autonomous driving systems and intelligent transportation infrastructures become increasingly software-defined and network-connected, ensuring their cybersecurity has become a critical component of traffic safety.
Xingyu Wu   +8 more
doaj   +1 more source

A Multi-Component Analysis of CPTED in the Cyberspace Domain

open access: yesSensors, 2020
The visual fidelity of a virtual environment lacks the exceedingly complex layers from the physical world, but the continuous improvements of image rendering technology and computation powers have led to greater demands for virtual simulations. Our study
Jemin Justin Lee   +7 more
doaj   +1 more source

Frailty Exacerbates Disability in Progressive Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background To evaluate frailty in severe progressive multiple sclerosis (PMS) and to investigate the underlying mechanisms. Methods This prospective, cross‐sectional, multicenter study enrolled a late severe PMS group requiring skilled nursing (n = 53) and an age, sex, and disease duration‐matched control PMS group (n = 53).
Taylor R. Wicks   +10 more
wiley   +1 more source

Dependability Analysis of 5G-AKA Authentication Service From Server and User Perspectives

open access: yesIEEE Access, 2020
The fifth generation (5G) technology offers a set of security services in order to provide secure communication to a large number of various devices. 5G Authentication and Key Agreement (5G-AKA) authentication service acts as the first step of securing ...
Lili Jiang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy