Results 31 to 40 of about 160,167 (287)

Enhancing the Security of Deep Learning Steganography via Adversarial Examples

open access: yesMathematics, 2020
Steganography is a collection of techniques for concealing the existence of information by embedding it within a cover. With the development of deep learning, some novel steganography methods have appeared based on the autoencoder or generative ...
Yueyun Shang   +3 more
doaj   +1 more source

Mandatory Enforcement of Privacy Policies using Trusted Computing Principles [PDF]

open access: yes, 2010
Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such
Dietzel, Stefan   +2 more
core   +3 more sources

Food Public Opinion Prevention and Control Model Based on Sentiment Analysis

open access: yesFoods
Food public opinion is characterized by its low ignition point, high diffusibility, persistence, and strong negativity, which significantly impact food safety and consumer trust. This paper introduces the Food Public Opinion Prevention and Control (FPOPC)
Leiyang Chen   +5 more
doaj   +1 more source

A Data Sharing Scheme for GDPR-Compliance Based on Consortium Blockchain

open access: yesFuture Internet, 2021
After the General Data Protection Regulation (GDPR) was introduced, some organizations and big data companies shared data without conducting any privacy protection and compliance authentication, which endangered user data security, and were punished ...
Yangheran Piao, Kai Ye, Xiaohui Cui
doaj   +1 more source

Trajectory-user linking via supervised encoding

open access: yesSecurity and Safety
With the explosive growth of Location-Based Services (LBS), a substantial amount of geolocation data, containing end-user private information, is amassed, posing severe privacy risks.
Hu Chengrui   +5 more
doaj   +1 more source

Results of the Childhood Cancer and Leukaemia Group's United Kingdom Relapsed Wilms Tumour Trial

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background The United Kingdom relapsed Wilms tumour (UKW‐R) trial aimed to improve the historically low survival rates after relapse of Wilms tumour (WT) through a prospective national risk‐stratified protocol. The trial also evaluated efficacy and toxicity of high‐dose melphalan.
Sucheta J. Vaidya   +10 more
wiley   +1 more source

Survey of research on confidential computing

open access: yesIET Communications
As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent.
Dengguo Feng   +5 more
doaj   +1 more source

Trusted Computing and Secure Virtualization in Cloud Computing [PDF]

open access: yes, 2012
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core   +2 more sources

Distributed intrusion detection trust management through integrity and expertise evaluation [PDF]

open access: yes, 2012
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed.
Ab. Manan, Jamalul-Lail   +2 more
core   +1 more source

The Efficacy and Safety of Bevacizumab/Irinotecan/Temozolomide (BIT) for Relapsed/Refractory Neuroblastoma: The UK Children's Cancer and Leukaemia Group Experience

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Patients with high‐risk neuroblastoma who either are refractory to induction chemotherapy or relapse following multi‐modal treatment have a dismal prognosis. Based on data from the BEACON trial, since 2021 the UK national guidelines recommend bevacizumab, irinotecan, and temozolomide (BIT) for patients with relapsed/refractory ...
Thomas J. Jackson   +20 more
wiley   +1 more source

Home - About - Disclaimer - Privacy