AdaptiveMutate: a technique for privacy preservation
Mobile apps are known to be rich sources for gathering privacy-sensitive information about smartphone users. Despite the presence of encryption, passive network adversaries who have access to the network infrastructure can eavesdrop on the traffic and ...
Louma Chaddad +3 more
doaj +1 more source
A Novel Pseudonym Changing Scheme for Location Privacy Preservation in Sparse Traffic Areas
A large number of schemes have been proposed to deal with location privacy preservation in Vehicular Ad Hoc Networks (VANETs). One of the most popular ways to preserve location privacy is pseudonym changing, which includes mix-zone, silent zone, mix ...
Ahsan Hayat +5 more
doaj +1 more source
GMFIM: A Generative Mask-guided Facial Image Manipulation Model for Privacy Preservation [PDF]
Mohammad Hossein Khojaste +2 more
openalex +1 more source
ABSTRACT Objective This study aimed to investigate the immunological response to influenza vaccination, the incidence and severity of influenza infection, and the side effects of the vaccination in patients with ischemic stroke. Methods This prospective observational study was conducted between 2023 and 2024 at Ramathibodi Hospital.
Achiraya Pakngao +5 more
wiley +1 more source
Review: Privacy-Preservation in the Context of Natural Language Processing
Data privacy is one of the highly discussed issues in recent years as we encounter data breaches and privacy scandals often. This raises a lot of concerns about the ways the data is acquired and the potential information leaks. Especially in the field of
Darshini Mahendran +2 more
doaj +1 more source
Comparative Effectiveness and Safety of Inebilizumab Versus Rituximab in AQP4‐IgG‐Positive NMOSD
ABSTRACT Objective Rituximab (anti‐CD20, RTX) and inebilizumab (anti‐CD19, INE) represent B‐cell‐depleting therapies used for aquaporin‐4 antibody‐positive (AQP4‐IgG+) neuromyelitis optica spectrum disorder (NMOSD); however, direct comparative evidence remains limited.
Jie Lin +11 more
wiley +1 more source
Traffic characteristic based privacy leakage assessment scheme for Android device
Aiming at the privacy leakage,which was caused by collecting user information by third-party host in Android operating system App,a privacy leakage evaluation scheme HostRisk was proposed.HostRisk was based on TF-IDF model and hierarchical clustering ...
Zhu WANG +4 more
doaj +2 more sources
DP Patch: ROI-Based Approach of Privacy-Preserving Image Processing With Robust Classification
As machine and deep learning spread across diverse aspects of our society, the concerns about the privacy of the data are getting stronger, particularly in scenarios where sensitive information could be exposed as a result of various privacy attacks ...
Assem Utaliyeva +2 more
doaj +1 more source
A Multi-Input Fusion Model for Privacy and Semantic Preservation in Facial Image Datasets
The widespread application of multimedia technologies such as video surveillance, online meetings, and drones facilitates the acquisition of a large amount of data that may contain facial features, posing significant concerns with regard to privacy ...
Yuanzhe Yang +5 more
doaj +1 more source
Economic location-based services, privacy and the relationship to identity [PDF]
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed.
Fritsch, Lothar
core

