Results 31 to 40 of about 89,030 (269)

When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

open access: yes, 2019
In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy ...
A Wasef   +8 more
core   +3 more sources

Location Privacy in Spatial Crowdsourcing

open access: yes, 2017
Spatial crowdsourcing (SC) is a new platform that engages individuals in collecting and analyzing environmental, social and other spatiotemporal information.
A Liu   +9 more
core   +1 more source

Selfish Response to Epidemic Propagation [PDF]

open access: yes, 2010
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the trade-off between their perceived risk of being infected and the cost of ...
Baras, John S.   +2 more
core   +7 more sources

The highD Dataset: A Drone Dataset of Naturalistic Vehicle Trajectories on German Highways for Validation of Highly Automated Driving Systems

open access: yes, 2018
Scenario-based testing for the safety validation of highly automated vehicles is a promising approach that is being examined in research and industry.
Bock, Julian   +3 more
core   +1 more source

Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright   +13 more
wiley   +1 more source

A Semantically Sensitive Privacy Protection Method for Trajectory Publishing

open access: yesJournal of Computer and Communications, 2021
Trajectory data set is the indispensable foundation for constructing reliable Internet of Vehicles (IoV) service and location-based service (LBS), while it is likely to be abused by malicious attackers to infer user’s privacy. In this paper, we propose a trajectory protection method based on stop points obfuscation, which can confront various privacy ...
Zhijian Shao, Bingwen Feng, Xingzheng Li
openaire   +2 more sources

‘They Need to Hear You Say It’: Healthcare Professionals’ Perspectives on Barriers and Enablers to End‐of‐Life Discussions With Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee   +9 more
wiley   +1 more source

Releasing Differentially Private Trajectories with Optimized Data Utility

open access: yesApplied Sciences, 2022
The ubiquity of GPS-enabled devices has resulted in an abundance of data about individual trajectories. Releasing trajectories enables a range of data analysis tasks, such as urban planning, but it also poses a risk in compromising individual location ...
Bing Li, Hong Zhu, Meiyi Xie
doaj   +1 more source

In vitro models of cancer‐associated fibroblast heterogeneity uncover subtype‐specific effects of CRISPR perturbations

open access: yesMolecular Oncology, EarlyView.
Development of therapies targeting cancer‐associated fibroblasts (CAFs) necessitates preclinical model systems that faithfully represent CAF–tumor biology. We established an in vitro coculture system of patient‐derived pancreatic CAFs and tumor cell lines and demonstrated its recapitulation of primary CAF–tumor biology with single‐cell transcriptomics ...
Elysia Saputra   +10 more
wiley   +1 more source

PDP-SAG: Personalized Privacy Protection in Moving Objects Databases by Combining Differential Privacy and Sensitive Attribute Generalization

open access: yesIEEE Access, 2019
Moving objects databases have become an enabling technology for location-based applications. They mostly focus on the storing and processing of data about moving objects. Privacy protection is one of the most important concerns related to such databases.
Fatemeh Deldar, Mahdi Abadi
doaj   +1 more source

Home - About - Disclaimer - Privacy