Results 51 to 60 of about 200,943 (331)

Privacy-Preserving Bandits

open access: yes, 2019
13 pages, 7 ...
Mohammad Malekzadeh   +3 more
openaire   +3 more sources

Privacy Preserving Data Mining [PDF]

open access: yesJournal of Cryptology, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yehuda Lindell, Benny Pinkas
openaire   +2 more sources

Efficacy of Intermittent Theta‐Burst Stimulation for Prolonged Disorders of Consciousness: A Prospective, Randomized, Controlled Trial

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Emerging evidence suggests that low‐frequency neural oscillations are dynamically regulated by consciousness levels, with the recovery of low cortical activity potentially serving as a neurophysiological substrate for conscious emergence. Targeted enhancement of these low‐frequency rhythms in patients with disorders of consciousness
Chuan Xu   +10 more
wiley   +1 more source

Survey on data preserving for the search of internet of things

open access: yesTongxin xuebao, 2016
With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet ...
Jia-hui WANG   +2 more
doaj   +2 more sources

Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning

open access: yes, 2017
In this paper, we focus on developing a novel mechanism to preserve differential privacy in deep neural networks, such that: (1) The privacy budget consumption is totally independent of the number of training steps; (2) It has the ability to adaptively ...
Dou, Dejing   +3 more
core   +1 more source

Privacy preserving clustering with constraints

open access: yesCoRR, 2018
The $k$-center problem is a classical combinatorial optimization problem which asks to find $k$ centers such that the maximum distance of any input point in a set $P$ to its assigned center is minimized. The problem allows for elegant $2$-approximations.
Clemens Rösner, Melanie Schmidt 0001
openaire   +4 more sources

Predictive Ability of Plasma p‐tau217 for β‐Amyloid Status: A Prospective Multicenter Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Plasma tau phosphorylated at threonine 217 (p‐tau217) measured with fully automated platforms has shown high accuracy for Alzheimer's disease (AD) diagnosis, but real‐world multicenter data remain limited. We aimed to validate the diagnostic performance of p‐tau217 for identifying AD pathology in a real‐world multicenter cohort ...
Miquel Massons   +33 more
wiley   +1 more source

A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics

open access: yes, 2020
In multiagent dynamical systems, privacy protection corresponds to avoid disclosing the initial states of the agents while accomplishing a distributed task. The system-theoretic framework described in this paper for this scope, denoted dynamical privacy,
Altafini, Claudio
core   +1 more source

Comparing the Effect of Semi‐Immersive Virtual Reality, Computerized Cognitive Training, and Traditional Rehabilitation on Cognitive Function in Multiple Sclerosis: A Randomized Clinical Trial

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Cognitive impairment is a common non‐motor symptom in Multiple Sclerosis (MS), negatively affecting autonomy and Quality of Life (QoL). Innovative rehabilitation strategies, such as semi‐immersive virtual reality (VR) and computerized cognitive training (CCT), may offer advantages over traditional cognitive rehabilitation (TCR ...
Maria Grazia Maggio   +8 more
wiley   +1 more source

GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION [PDF]

open access: yesICTACT Journal on Soft Computing, 2011
Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-
R. Praveena Priyadarsini   +2 more
doaj  

Home - About - Disclaimer - Privacy