Results 281 to 290 of about 200,943 (331)
Innovations in Gastric Cancer Surgery During Early Minimally Invasive Era and Future Perspectives
With continuing revelations in tumor biology and the emergence of artificial intelligence, new horizons for surgical innovation are opening. At the center of this transformative journey stands the innovative surgeon, driven by passion, guided by data, and steadfast in the commitment to patient safety and quality of life.
Reut El‐On, Young‐Woo Kim
wiley +1 more source
Privacy preservation-based federated learning with uncertain data
Fan Cao +4 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SSRN Electronic Journal, 2023
A signal is privacy‐preserving with respect to a collection of privacy sets if the posterior probability assigned to every privacy set remains unchanged conditional on any signal realization. We characterize the privacy‐preserving signals for arbitrary state space and arbitrary privacy sets.
Strack, Philipp, Yang, Kai Hao
openaire +2 more sources
A signal is privacy‐preserving with respect to a collection of privacy sets if the posterior probability assigned to every privacy set remains unchanged conditional on any signal realization. We characterize the privacy‐preserving signals for arbitrary state space and arbitrary privacy sets.
Strack, Philipp, Yang, Kai Hao
openaire +2 more sources
Data Mining and Knowledge Discovery, 2007
We describe two algorithms, BiBoost (Bipartite Boosting) and MultBoost (Multiparty Boosting), that allow two or more participants to construct a boosting classifier without explicitly sharing their data sets. We analyze both the computational and the security aspects of the algorithms.
Gambs, Sebastien +2 more
openaire +2 more sources
We describe two algorithms, BiBoost (Bipartite Boosting) and MultBoost (Multiparty Boosting), that allow two or more participants to construct a boosting classifier without explicitly sharing their data sets. We analyze both the computational and the security aspects of the algorithms.
Gambs, Sebastien +2 more
openaire +2 more sources
Econometrics with Privacy Preservation
Operations Research, 2019Summary: Many data are sensitive in areas such as finance, economics, and other social sciences. We propose an ER (encryption and recovery) algorithm that allows a central administration to do statistical inference based on the encrypted data, while still preserving each party's privacy even for a colluding majority in the presence of cyber attack.
Ning Cai 0003, Steven Kou
openaire +3 more sources
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption.
Radia J. Perlman +2 more
openaire +1 more source
This paper describes and contrasts two families of schemes that enable a user to purchase digital content without revealing to anyone what item he has purchased. One of the basic schemes is based on anonymous cash, and the other on blind decryption.
Radia J. Perlman +2 more
openaire +1 more source
2008 IEEE 24th International Conference on Data Engineering, 2008
In this paper, we design a system for mutually distrustful entities to perform privacy preserving joins, leveraging the power of a memory-limited secure coprocessor. Under this setting, we critique a questionable assumption in a previous privacy definition [1] that leads to unnecessary information leakage.
Yaping Li, Minghua Chen 0001
openaire +1 more source
In this paper, we design a system for mutually distrustful entities to perform privacy preserving joins, leveraging the power of a memory-limited secure coprocessor. Under this setting, we critique a questionable assumption in a previous privacy definition [1] that leads to unnecessary information leakage.
Yaping Li, Minghua Chen 0001
openaire +1 more source
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018
Autonomous systems (ASes) on the Internet increasingly rely on Internet Exchange Points (IXPs) for peering. A single IXP may interconnect several 100s or 1000s of participants (ASes) all of which might peer with each other through BGP sessions. IXPs have addressed this scaling challenge through the use of route servers.
Xiaohe Hu +4 more
openaire +1 more source
Autonomous systems (ASes) on the Internet increasingly rely on Internet Exchange Points (IXPs) for peering. A single IXP may interconnect several 100s or 1000s of participants (ASes) all of which might peer with each other through BGP sessions. IXPs have addressed this scaling challenge through the use of route servers.
Xiaohe Hu +4 more
openaire +1 more source

