Results 31 to 40 of about 160,167 (287)
Enhancing the Security of Deep Learning Steganography via Adversarial Examples
Steganography is a collection of techniques for concealing the existence of information by embedding it within a cover. With the development of deep learning, some novel steganography methods have appeared based on the autoencoder or generative ...
Yueyun Shang +3 more
doaj +1 more source
Mandatory Enforcement of Privacy Policies using Trusted Computing Principles [PDF]
Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such
Dietzel, Stefan +2 more
core +3 more sources
Food Public Opinion Prevention and Control Model Based on Sentiment Analysis
Food public opinion is characterized by its low ignition point, high diffusibility, persistence, and strong negativity, which significantly impact food safety and consumer trust. This paper introduces the Food Public Opinion Prevention and Control (FPOPC)
Leiyang Chen +5 more
doaj +1 more source
A Data Sharing Scheme for GDPR-Compliance Based on Consortium Blockchain
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished ...
Yangheran Piao, Kai Ye, Xiaohui Cui
doaj +1 more source
Trajectory-user linking via supervised encoding
With the explosive growth of Location-Based Services (LBS), a substantial amount of geolocation data, containing end-user private information, is amassed, posing severe privacy risks.
Hu Chengrui +5 more
doaj +1 more source
Results of the Childhood Cancer and Leukaemia Group's United Kingdom Relapsed Wilms Tumour Trial
ABSTRACT Background The United Kingdom relapsed Wilms tumour (UKW‐R) trial aimed to improve the historically low survival rates after relapse of Wilms tumour (WT) through a prospective national risk‐stratified protocol. The trial also evaluated efficacy and toxicity of high‐dose melphalan.
Sucheta J. Vaidya +10 more
wiley +1 more source
Survey of research on confidential computing
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent.
Dengguo Feng +5 more
doaj +1 more source
Trusted Computing and Secure Virtualization in Cloud Computing [PDF]
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core +2 more sources
Distributed intrusion detection trust management through integrity and expertise evaluation [PDF]
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed.
Ab. Manan, Jamalul-Lail +2 more
core +1 more source
ABSTRACT Background Patients with high‐risk neuroblastoma who either are refractory to induction chemotherapy or relapse following multi‐modal treatment have a dismal prognosis. Based on data from the BEACON trial, since 2021 the UK national guidelines recommend bevacizumab, irinotecan, and temozolomide (BIT) for patients with relapsed/refractory ...
Thomas J. Jackson +20 more
wiley +1 more source

