Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"useddds » \"usedddds (Expand Search)
-
561
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01“…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
Get full text
Article -
562
Learning-augmented sketching offers improved performance for privacy preserving and secure GWAS
Published 2025-03-01“…To address this, methods like SkSES use sketching for genome-wide association studies (GWAS) across distributed datasets while maintaining privacy. …”
Get full text
Article -
563
Online medical privacy protection strategy under information value-added mechanism
Published 2022-12-01“…China’s economic level and people’s living standards have developed rapidly in recent years, and the medical level and medical technology have made breakthroughs continuously.With the promotion and deepening of“Internet Plus” to business model innovation in various fields, the development of “Internet Plus” medical has been rapidly developed.Due to the continuous development of data processing technologies such as machine learning and data mining, the risk of users’ personal medical data disclosure in the process of online medical treatment has also attracted the attention of researchers.Considering the deductibility of information, the discount mechanism was adopted to describe the change of user’s private information value in different stages of the game.Combined with the current research status in the field of online medical privacy protection motivation, how to mobilize the enthusiasm of both players from the level of privacy protection motivation was explored with game analysis.In view of the game characteristics of users’ strong willingness to continually use the online medical platform and intermittently provide privacy, the repeated game method was adopted to better describe the game process between users and the online medical platform.The tendency change law of the players on both sides of the game was obtained.Moreover, the Nash equilibrium of the game model was analyzed under different model parameters and the change trend of the game strategy of both sides with the progress of the game stage.When the parameters were met 2(c<sub>p</sub>-c<sub>n</sub>)≥l<sub>p</sub>(p<sub>n</sub>-p<sub>p</sub>), the user started to choose from “agree to share private data” to “refuse to share private data”.The above conclusion was verified by simulation experiments.Based on the above conclusions, from the perspective of online medical platform and users, policy suggestions on how to realize privacy protection from the level of privacy protection motivation in the process of online medical treatment were given.…”
Get full text
Article -
564
Prioritizing privacy and presentation of supportable hypothesis testing in forensic genetic genealogy investigations
Published 2024-09-01“…Such approaches reduce risk of unwanted access to or reverse engineering of third-party individuals’ genetic data and can give these donors greater confidence to support use of their DNA profiles in FGG investigation.…”
Get full text
Article -
565
Verticox+: vertically distributed Cox proportional hazards model with improved privacy guarantees
Published 2025-07-01“…Abstract Federated learning allows us to run machine learning algorithms on decentralized data when data sharing is not permitted due to privacy concerns. …”
Get full text
Article -
566
Dynamic Node Privacy Feature Decoupling Graph Autoencoder Based on Attention Mechanism
Published 2025-06-01Get full text
Article -
567
Privacy challenges of automated vehicles: Merging contextual integrity and responsible innovation frameworks
Published 2025-07-01“…MCI considers contextual integrity (CI) in tandem with societal preferences and individual level preferences, which is captured using demographic data. Therefore, it captures the individual-level, group-level, and societal-level factors that drive peoples’ preferences regarding AV privacy. …”
Get full text
Article -
568
Balancing Privacy and Utility in Split Learning: An Adversarial Channel Pruning-Based Approach
Published 2025-01-01“…Moreover, training such models using private data is prone to serious privacy risks resulting from inadvertent disclosure of sensitive information. …”
Get full text
Article -
569
A Communication-Efficient Distributed Matrix Multiplication Scheme with Privacy, Security, and Resiliency
Published 2024-08-01“…Inspired by the application of repairing Reed–Solomon (RS) codes in distributed storage and secret sharing, we propose SDMM schemes with reduced communication overhead through the use of trace polynomials. Specifically, these schemes are designed to address three critical concerns: (i) ensuring information-theoretic privacy against collusion among servers; (ii) providing security against Byzantine servers; and (iii) offering resiliency against stragglers to mitigate computing delays. …”
Get full text
Article -
570
FairRAG: A Privacy-Preserving Framework for Fair Financial Decision-Making
Published 2025-07-01“…These improvements were maintained when using differentially private synthetic data, thus indicating robust privacy and accuracy trade-offs.…”
Get full text
Article -
571
Synergistic Disruption: Harnessing AI and Blockchain for Enhanced Privacy and Security in Federated Learning
Published 2025-04-01“…Blockchain technology makes self-executing agreements possible by enabling smart contracts, which reduce the need for middlemen and increase efficiency by precisely encoding contractual terms in code. By using AI oracles, these contracts can communicate with outside data sources and make well-informed decisions based on actual occurrences. …”
Get full text
Article -
572
Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability
Published 2024-01-01“…Specifically, we introduce an identity credential system that facilitates anonymous donations, shielding the identities of both donors and donees through the use of BBS+ signatures and zero-knowledge proofs of knowledge (ZKPoKs). …”
Get full text
Article -
573
A lightweight and secure authentication and privacy protection scheme for internet of medical things
Published 2025-07-01“…However, transmitting sensitive patient data through IoMT devices raises significant security and privacy concerns. …”
Get full text
Article -
574
A robust and personalized privacy-preserving approach for adaptive clustered federated distillation
Published 2025-04-01“…Meta-learning is used in each cluster to enhance the personalization of the local models and the classification accuracy of the non-independent and Identically distributed (non-IID) data distributions. …”
Get full text
Article -
575
The Looming Privacy Challenges Posed by Commercial Satellite Imaging: Remedies and Research Directions
Published 2025-01-01“…While these technologies benefit applications such as natural disaster monitoring and precision agriculture, they also introduce novel privacy risks. This perspective paper provides several contributions: we start by analyzing privacy risks using the LINDDUN privacy framework, categorizing threats like linking, identification, and data disclosure. …”
Get full text
Article -
576
Self-Disclosure on Professional Social Networking Sites: A Privacy Calculus Perspective
Published 2023-01-01“…A model contextualizing privacy calculus theory combined with the trust factor was developed and evaluated using 661 quantitative data collected through a questionnaire. …”
Get full text
Article -
577
Privacy preserving strategies for electronic health records in the era of large language models
Published 2025-01-01“…Risks can be reduced by using strategies like privacy-preserving locally deployed LLMs, synthetic data generation, differential privacy, and deidentification. …”
Get full text
Article -
578
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01“…The ViT (vision transformer) inference framework, which was widely used in image processing, was found to have a risk of leaking user privacy data. …”
Get full text
Article -
579
Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey
Published 2024-12-01“…Aim This study presents a cutting-edge survey on privacy issues, security attacks, countermeasures and open problems in FL.Methodology The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used to determine the research domain, establish a search query, and analyze all retrieved articles from the selected scientific databases (i.e. …”
Get full text
Article -
580
Sharing images of children on social media: British motherhood influencers and the privacy paradox.
Published 2025-01-01“…This study examines the extent to which popular British motherhood influencers infringe on their children's privacy by posting images of them online. We conducted a content analysis of 5,253 Instagram posts from ten UK-based influencers, supplemented by self-reported data from these influencers. …”
Get full text
Article