Privacy-Preserving Design of Scalar LQG Control
This paper studies the agent identity privacy problem in the scalar linear quadratic Gaussian (LQG) control system. The agent identity is a binary hypothesis: Agent A or Agent B.
Edoardo Ferrari +4 more
doaj +1 more source
A randomized block policy gradient algorithm with differential privacy in Content Centric Networks
Policy gradient methods are effective means to solve the problems of mobile multimedia data transmission in Content Centric Networks. Current policy gradient algorithms impose high computational cost in processing high-dimensional data.
Lin Wang +5 more
doaj +1 more source
The Shorter the Better? Effects of Privacy Policy Length on Online Privacy Decision-Making
Privacy policies provide Internet users with the possibility to inform themselves about websites’ usage of their disclosed personal data. Strikingly, however, most people tend not to read privacy policies because they are long and cumbersome, indicating ...
Yannic Meier +2 more
doaj +1 more source
Review: Privacy-Preservation in the Context of Natural Language Processing
Data privacy is one of the highly discussed issues in recent years as we encounter data breaches and privacy scandals often. This raises a lot of concerns about the ways the data is acquired and the potential information leaks. Especially in the field of
Darshini Mahendran +2 more
doaj +1 more source
Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language Processing
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases ...
Veronika Belcheva +2 more
doaj +1 more source
Research on the Privacy-preserving Technical Scheme and the Coordinative Policies Strategies for Big Data in Medical Imaging [PDF]
Background Responding to the increasing demand for privacy encryption in image-based medical big data, it is of great importance of proposing an innovative framework of coded-based privacy-preserving segmentation technology, and exploring the ...
CHEN Kaiyuan, CHEN Long, ZHANG Yi, CHAI Runqi, WANG Na, ZENG Huatang, CHAI Senchun, LIANG Wannian
doaj +1 more source
Co-constitutive complexityUnpacking Google’s privacy policy and terms of service post-GDPR
Google is the gateway to the Internet for billions of people. However, to use Google’s multiple platforms and services, users must accept Google’s terms.
Valtysson Bjarki +2 more
doaj +1 more source
Psychiatric electronic health records privacy in Jordan: A policy brief
Psychiatric health records are highly sensitive data which requires special policy to maintain its privacy, without affecting data accessibility. The current authors reviewed social, ethical and legal underpinnings for psychiatric electronic health ...
Ahmed R. Karajeh, Majd T. Mrayyan
doaj +1 more source
Will EU’s GDPR Act as an Effective Enforcer to Gain Consent?
Since the GDPR was implemented in 2018, organizations that collect data from the EU residents are required to receive the user’s consent. Organizational measures to ensure that the organizations are compliant to the recently enacted GDPR are still
Junhyoung Oh +5 more
doaj +1 more source
Liquid biopsy enables minimally invasive, real‐time molecular profiling through analysis of circulating biomarkers in biological fluids. This Perspective highlights the importance of training pathologists through integrative educational programs, such as the European Masters in Molecular Pathology, to ensure effective and equitable implementation of ...
Marius Ilié +13 more
wiley +1 more source

