Results 61 to 70 of about 200,943 (331)

AdaptiveMutate: a technique for privacy preservation

open access: yesDigital Communications and Networks, 2019
Mobile apps are known to be rich sources for gathering privacy-sensitive information about smartphone users. Despite the presence of encryption, passive network adversaries who have access to the network infrastructure can eavesdrop on the traffic and ...
Louma Chaddad   +3 more
doaj   +1 more source

A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas

open access: yesIEEE Access, 2023
A large number of schemes have been proposed to deal with location privacy preservation in Vehicular Ad Hoc Networks (VANETs). One of the most popular ways to preserve location privacy is pseudonym changing, which includes mix-zone, silent zone, mix ...
Ahsan Hayat   +5 more
doaj   +1 more source

GMFIM: A Generative Mask-guided Facial Image Manipulation Model for Privacy Preservation [PDF]

open access: green, 2022
Mohammad Hossein Khojaste   +2 more
openalex   +1 more source

Influenza Vaccination Responses in Disabled Stroke Patients: A Single‐Center Prospective Observational Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective This study aimed to investigate the immunological response to influenza vaccination, the incidence and severity of influenza infection, and the side effects of the vaccination in patients with ischemic stroke. Methods This prospective observational study was conducted between 2023 and 2024 at Ramathibodi Hospital.
Achiraya Pakngao   +5 more
wiley   +1 more source

Review: Privacy-Preservation in the Context of Natural Language Processing

open access: yesIEEE Access, 2021
Data privacy is one of the highly discussed issues in recent years as we encounter data breaches and privacy scandals often. This raises a lot of concerns about the ways the data is acquired and the potential information leaks. Especially in the field of
Darshini Mahendran   +2 more
doaj   +1 more source

Comparative Effectiveness and Safety of Inebilizumab Versus Rituximab in AQP4‐IgG‐Positive NMOSD

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Rituximab (anti‐CD20, RTX) and inebilizumab (anti‐CD19, INE) represent B‐cell‐depleting therapies used for aquaporin‐4 antibody‐positive (AQP4‐IgG+) neuromyelitis optica spectrum disorder (NMOSD); however, direct comparative evidence remains limited.
Jie Lin   +11 more
wiley   +1 more source

Traffic characteristic based privacy leakage assessment scheme for Android device

open access: yesTongxin xuebao, 2020
Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering ...
Zhu WANG   +4 more
doaj   +2 more sources

DP Patch: ROI-Based Approach of Privacy-Preserving Image Processing With Robust Classification

open access: yesIEEE Access
As machine and deep learning spread across diverse aspects of our society, the concerns about the privacy of the data are getting stronger, particularly in scenarios where sensitive information could be exposed as a result of various privacy attacks ...
Assem Utaliyeva   +2 more
doaj   +1 more source

A Multi-Input Fusion Model for Privacy and Semantic Preservation in Facial Image Datasets

open access: yesApplied Sciences, 2023
The widespread application of multimedia technologies such as video surveillance, online meetings, and drones facilitates the acquisition of a large amount of data that may contain facial features, posing significant concerns with regard to privacy ...
Yuanzhe Yang   +5 more
doaj   +1 more source

Economic location-based services, privacy and the relationship to identity [PDF]

open access: yes, 2005
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed.
Fritsch, Lothar
core  

Home - About - Disclaimer - Privacy