Results 21 to 30 of about 121,345 (302)
A Novel Location Privacy-Preserving Approach Based on Blockchain
Location-based services (LBS) bring convenience to people’s lives but are also accompanied with privacy leakages. To protect the privacy of LBS users, many location privacy protection algorithms were proposed.
Ying Qiu, Yi Liu, Xuan Li, Jiahui Chen
doaj +1 more source
Survey of big-data-analysis-resistant privacy protection
Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages ...
Wei TONG +5 more
doaj +3 more sources
PLDP-FL: Federated Learning with Personalized Local Differential Privacy
As a popular machine learning method, federated learning (FL) can effectively solve the issues of data silos and data privacy. However, traditional federated learning schemes cannot provide sufficient privacy protection.
Xiaoying Shen +4 more
doaj +1 more source
Privacy computing:concept, connotation and its research trend
s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever
Feng-hua LI +4 more
doaj +2 more sources
Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the ...
Zhe SUN, Hong NING, Lihua YIN, Binxing FANG
doaj +3 more sources
Privacy Risk Perceptions and Privacy Protection Strategies [PDF]
Several opinion polls have reported that many people claim to be concerned about their privacy, yet that most people in fact do very little to protect their privacy. Are privacy concerns indeed insufficient motivators to adopt privacy protection strategies? What then characterizes the users of these strategies?
Oomen, I.C., Leenes, R.E.
openaire +2 more sources
Comparative Study on the Personal Privacy Protection Policies of Open Government Data Websites
[Purpose/significance] The open government data website is the carrier of the open data, and the personal privacy protection policy of the open government data website is directly related to personal privacy protection in the process of opening ...
Zhang Jianbin +4 more
doaj +1 more source
In this exploratory study, we investigated the relationship between the gut microbiota and outcome in patients with metastatic hormone receptor‐positive breast cancer, treated in a randomized clinical trial with chemotherapy alone or chemotherapy in combination with immune checkpoint blockade.
Andreas Ullern +7 more
wiley +1 more source
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra +10 more
wiley +1 more source
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services
As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy.
Shiwen Zhang +4 more
doaj +1 more source

