Secure aggregation for heterogeneous enterprise data based on federated meta-learning. [PDF]
Yang C, Ma Y.
europepmc +1 more source
Is the well‐known phrase ‘small is beautiful’ true of small transnational education institutions?
Abstract The purpose of this research is to consider the potential attractiveness of operating a small international branch campus (IBC). Drawing upon resource‐based and legitimacy theories, we examine the strengths, weaknesses, opportunities and threats associated with the business model that is based on having a small institution size.
Stephen Wilkins, Joe Hazzam
wiley +1 more source
A novel quantum private query protocol and its application in private set intersection. [PDF]
Deng Z +5 more
europepmc +1 more source
Integrating differential privacy into federated multi-task learning algorithms in <b>dsMTL</b>. [PDF]
Schefzik R +5 more
europepmc +1 more source
Research Interviews in Historical Practice
A key difference between collecting life stories and doing research interviews is the role of the interviewer. While training in oral history may focus on using standard scripts to take a life story, research interviews are motivated by specific questions that arise from particular historical projects and are often not primarily focused on the ...
Lara Keuck, Soraya de Chadarevian
wiley +1 more source
Efficient ring signature for cross-chain data sharing in blockchain-enabled cold-chain logistics system. [PDF]
Zhang Y, Tang Y, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Lightweight image encryption for wireless sensor networks using optimized elliptic curve and fuzzy logic. [PDF]
Zarei M +3 more
europepmc +1 more source
Privacy-preserving communication in smart city transportation using elliptic curve cryptography. [PDF]
Mohammed ZK +7 more
europepmc +1 more source

