Results 61 to 70 of about 194,648 (280)

Improving Privacy Preservation using IBS and IBOOS in VANET [PDF]

open access: yes, 2015
In Vehicular Ad hoc NETworks (VANETs), vehicles have to be protected from the misuse of their private data and the attacks on their privacy. Here the authentication issues with privacy preservation and non-repudiation in VANETs have been considered.
Lavanya, J. (J), Perumal, S. S. (S)
core  

A Radio-fingerprinting-based Vehicle Classification System for Intelligent Traffic Control in Smart Cities

open access: yes, 2018
The measurement and provision of precise and upto-date traffic-related key performance indicators is a key element and crucial factor for intelligent traffic controls systems in upcoming smart cities.
Al-Askary, Manar   +4 more
core   +1 more source

Clustering Algorithm Reveals Dopamine‐Motor Mismatch in Cognitively Preserved Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To explore the relationship between dopaminergic denervation and motor impairment in two de novo Parkinson's disease (PD) cohorts. Methods n = 249 PD patients from Parkinson's Progression Markers Initiative (PPMI) and n = 84 from an external clinical cohort.
Rachele Malito   +14 more
wiley   +1 more source

Traffic characteristic based privacy leakage assessment scheme for Android device

open access: yesTongxin xuebao, 2020
Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering ...
Zhu WANG   +4 more
doaj   +2 more sources

DP Patch: ROI-Based Approach of Privacy-Preserving Image Processing With Robust Classification

open access: yesIEEE Access
As machine and deep learning spread across diverse aspects of our society, the concerns about the privacy of the data are getting stronger, particularly in scenarios where sensitive information could be exposed as a result of various privacy attacks ...
Assem Utaliyeva   +2 more
doaj   +1 more source

AdaptiveMutate: a technique for privacy preservation

open access: yesDigital Communications and Networks, 2019
Mobile apps are known to be rich sources for gathering privacy-sensitive information about smartphone users. Despite the presence of encryption, passive network adversaries who have access to the network infrastructure can eavesdrop on the traffic and ...
Louma Chaddad   +3 more
doaj   +1 more source

A Multi-Input Fusion Model for Privacy and Semantic Preservation in Facial Image Datasets

open access: yesApplied Sciences, 2023
The widespread application of multimedia technologies such as video surveillance, online meetings, and drones facilitates the acquisition of a large amount of data that may contain facial features, posing significant concerns with regard to privacy ...
Yuanzhe Yang   +5 more
doaj   +1 more source

ERA: Towards Privacy Preservation and Verifiability for Online Ad Exchanges

open access: yes, 2017
Ad exchanges are kind of the most popular online advertising marketplaces for trading ad spaces over the Internet. Ad exchanges run auctions to sell diverse ad spaces on the publishers' web-pages to advertisers, who want to display ads on ad spaces ...
Chen, Guihai   +4 more
core   +1 more source

Impact of Positive Lifestyle Behaviors on Direct Health Care Cost Savings for Low Back Pain

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to investigate the relationship between a previously purpose‐developed lifestyle behavior scale and health care cost savings related to low back pain (LBP). Methods This longitudinal study used data from the Australian Twin Back (AUTBACK) study. LBP and lifestyle behavior measures were collected at baseline. Physical activity
Ye Tian   +8 more
wiley   +1 more source

Rate-Privacy in Wireless Sensor Networks

open access: yes, 2013
This paper introduces the concept of rate privacy in the context of wireless sensor networks. Our discussion reveals that the concept indeed is of a great importance for the privacy preservation of such networks.
Derakhshi, H.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy