Results 41 to 50 of about 278,242 (279)

Privacy-Preserving Loyalty Programs [PDF]

open access: yes, 2015
Presented at the 9th DPM International Workshop on Data Privacy Management (DPM 2014, held on Sep. 10, 2014).
Blanco-Justicia, Alberto   +1 more
openaire   +2 more sources

A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation

open access: yes, 2015
QoS-based Web service recommendation has recently gained much attention for providing a promising way to help users find high-quality services. To facilitate such recommendations, existing studies suggest the use of collaborative filtering techniques for
He, Pinjia   +3 more
core   +1 more source

Privacy-Preserving Restricted Boltzmann Machine [PDF]

open access: yesComputational and Mathematical Methods in Medicine, 2014
With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy.
Yu Li, Yuan Zhang, Yue Ji
openaire   +2 more sources

Privacy Computing: Concept, Computing Framework, and Future Development Trends

open access: yesEngineering, 2019
With the rapid development of information technology and the continuous evolution of personalized services, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the
Fenghua Li, Hui Li, Ben Niu, Jinjun Chen
doaj   +1 more source

A Balance Privacy-Preserving Data Aggregation Model in Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive information, in which sensor nodes are apt to encounter some serious leakage of sensitive data.
Changlun Zhang, Chao Li, Yi Zhao
doaj   +1 more source

Deconvoluting kernel density estimation and regression for locally differentially private data

open access: yesScientific Reports, 2020
Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner.
Farhad Farokhi
doaj   +1 more source

Secure Federated Evolutionary Optimization—A Survey

open access: yesEngineering
With the development of edge devices and cloud computing, the question of how to accomplish machine learning and optimization tasks in a privacy-preserving and secure way has attracted increased attention over the past decade.
Qiqi Liu   +6 more
doaj   +1 more source

Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption

open access: yesIEEE Access, 2018
Considering the openness and cross-domains of cloud computing, the traditional privacy-preserving technology cannot be applied in cloud computing efficiently.
Hongbing Cheng   +3 more
doaj   +1 more source

Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]

open access: yes, 2007
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann   +4 more
core  

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy