139 related articles for article (PubMed ID: 37299946)
21. Nonexposure accurate location K-anonymity algorithm in LBS.
Jia J; Zhang F
ScientificWorldJournal; 2014; 2014():619357. PubMed ID: 24605060
[TBL] [Abstract][Full Text] [Related]
22. Privacy Protection and Intrusion Detection System of Wireless Sensor Network Based on Artificial Neural Network.
Shi L; Li K
Comput Intell Neurosci; 2022; 2022():1795454. PubMed ID: 35785102
[TBL] [Abstract][Full Text] [Related]
23. Local differential privacy protection for wearable device data.
Li Z; Wang B; Li J; Hua Y; Zhang S
PLoS One; 2022; 17(8):e0272766. PubMed ID: 35976869
[TBL] [Abstract][Full Text] [Related]
24. A strategy to balance location privacy and positioning accuracy.
He L; Liu J; Du P
PLoS One; 2024; 19(5):e0304446. PubMed ID: 38814927
[TBL] [Abstract][Full Text] [Related]
25. Privacy Law Protection Based on the Information Security Assurance Algorithm.
Wang Z; Yue Q
Comput Intell Neurosci; 2022; 2022():8006605. PubMed ID: 36120696
[TBL] [Abstract][Full Text] [Related]
26. A Strategy toward Collaborative Filter Recommended Location Service for Privacy Protection.
Wang P; Yang J; Zhang J
Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29751670
[TBL] [Abstract][Full Text] [Related]
27. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.
Xie Q; Wang L
Sensors (Basel); 2016 Nov; 16(12):. PubMed ID: 27897984
[TBL] [Abstract][Full Text] [Related]
28. Application of Personal Information Privacy Protection Based on Machine Learning Algorithm.
Lang F; Zhong Y
Comput Intell Neurosci; 2022; 2022():6710631. PubMed ID: 35958767
[TBL] [Abstract][Full Text] [Related]
29. Caregivers' Role in Cybersecurity for Aging Information Technology Users with Intellectual Disabilities.
Rocheleau JN; Chalghoumi H; Jutai J; Farrell S; Lachapelle Y; Cobigo V
Cyberpsychol Behav Soc Netw; 2021 Sep; 24(9):624-629. PubMed ID: 34182769
[TBL] [Abstract][Full Text] [Related]
30. Ethical Design in the Internet of Things.
Baldini G; Botterman M; Neisse R; Tallacchini M
Sci Eng Ethics; 2018 Jun; 24(3):905-925. PubMed ID: 26797878
[TBL] [Abstract][Full Text] [Related]
31. Privacy-Oriented Technique for COVID-19 Contact Tracing (PROTECT) Using Homomorphic Encryption: Design and Development Study.
An Y; Lee S; Jung S; Park H; Song Y; Ko T
J Med Internet Res; 2021 Jul; 23(7):e26371. PubMed ID: 33999829
[TBL] [Abstract][Full Text] [Related]
32. Research on Online Social Network Information Leakage-Tracking Algorithm Based on Deep Learning.
Han S
Comput Intell Neurosci; 2022; 2022():1926794. PubMed ID: 35800694
[TBL] [Abstract][Full Text] [Related]
33. Heterogeneous deniable authenticated encryption for location-based services.
Jin C; Kan G; Chen G; Yu C; Jin Y; Xu C
PLoS One; 2021; 16(1):e0244978. PubMed ID: 33406133
[TBL] [Abstract][Full Text] [Related]
34. Privacy-Enhancing
Li Y; Zhou F; Ge Y; Xu Z
Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34207856
[TBL] [Abstract][Full Text] [Related]
35. A clustering-based differential privacy protection algorithm for weighted social networks.
Zhang L; Ge L
Math Biosci Eng; 2024 Feb; 21(3):3755-3773. PubMed ID: 38549305
[TBL] [Abstract][Full Text] [Related]
36. A fine granularity based user collaboration algorithm for location privacy protection.
Wang B; Zhang L; Zhang G
PLoS One; 2019; 14(7):e0220278. PubMed ID: 31344097
[TBL] [Abstract][Full Text] [Related]
37. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks.
Zhang H; Wu C; Chen Z; Liu Z; Zhu Y
PLoS One; 2017; 12(8):e0182232. PubMed ID: 28767687
[TBL] [Abstract][Full Text] [Related]
38. Updatable privacy-preserving
Wu S; Xu W; Hong Z; Duan P; Zhang B; Hu Y; Wang B
Peer Peer Netw Appl; 2022; 15(2):1076-1089. PubMed ID: 35018203
[TBL] [Abstract][Full Text] [Related]
39. A data encryption solution for mobile health apps in cooperation environments.
Silva BM; Rodrigues JJ; Canelo F; Lopes IC; Zhou L
J Med Internet Res; 2013 Apr; 15(4):e66. PubMed ID: 23624056
[TBL] [Abstract][Full Text] [Related]
40. Barriers to and Facilitators of the Use of Mobile Health Apps From a Security Perspective: Mixed-Methods Study.
Zhou L; Bao J; Watzlaf V; Parmanto B
JMIR Mhealth Uhealth; 2019 Apr; 7(4):e11223. PubMed ID: 30990458
[TBL] [Abstract][Full Text] [Related]
[Previous] [Next] [New Search]