BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

139 related articles for article (PubMed ID: 37299946)

  • 21. Nonexposure accurate location K-anonymity algorithm in LBS.
    Jia J; Zhang F
    ScientificWorldJournal; 2014; 2014():619357. PubMed ID: 24605060
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Privacy Protection and Intrusion Detection System of Wireless Sensor Network Based on Artificial Neural Network.
    Shi L; Li K
    Comput Intell Neurosci; 2022; 2022():1795454. PubMed ID: 35785102
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Local differential privacy protection for wearable device data.
    Li Z; Wang B; Li J; Hua Y; Zhang S
    PLoS One; 2022; 17(8):e0272766. PubMed ID: 35976869
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A strategy to balance location privacy and positioning accuracy.
    He L; Liu J; Du P
    PLoS One; 2024; 19(5):e0304446. PubMed ID: 38814927
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Privacy Law Protection Based on the Information Security Assurance Algorithm.
    Wang Z; Yue Q
    Comput Intell Neurosci; 2022; 2022():8006605. PubMed ID: 36120696
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A Strategy toward Collaborative Filter Recommended Location Service for Privacy Protection.
    Wang P; Yang J; Zhang J
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29751670
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data.
    Xie Q; Wang L
    Sensors (Basel); 2016 Nov; 16(12):. PubMed ID: 27897984
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Application of Personal Information Privacy Protection Based on Machine Learning Algorithm.
    Lang F; Zhong Y
    Comput Intell Neurosci; 2022; 2022():6710631. PubMed ID: 35958767
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Caregivers' Role in Cybersecurity for Aging Information Technology Users with Intellectual Disabilities.
    Rocheleau JN; Chalghoumi H; Jutai J; Farrell S; Lachapelle Y; Cobigo V
    Cyberpsychol Behav Soc Netw; 2021 Sep; 24(9):624-629. PubMed ID: 34182769
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Ethical Design in the Internet of Things.
    Baldini G; Botterman M; Neisse R; Tallacchini M
    Sci Eng Ethics; 2018 Jun; 24(3):905-925. PubMed ID: 26797878
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Privacy-Oriented Technique for COVID-19 Contact Tracing (PROTECT) Using Homomorphic Encryption: Design and Development Study.
    An Y; Lee S; Jung S; Park H; Song Y; Ko T
    J Med Internet Res; 2021 Jul; 23(7):e26371. PubMed ID: 33999829
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Research on Online Social Network Information Leakage-Tracking Algorithm Based on Deep Learning.
    Han S
    Comput Intell Neurosci; 2022; 2022():1926794. PubMed ID: 35800694
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Heterogeneous deniable authenticated encryption for location-based services.
    Jin C; Kan G; Chen G; Yu C; Jin Y; Xu C
    PLoS One; 2021; 16(1):e0244978. PubMed ID: 33406133
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Privacy-Enhancing
    Li Y; Zhou F; Ge Y; Xu Z
    Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34207856
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A clustering-based differential privacy protection algorithm for weighted social networks.
    Zhang L; Ge L
    Math Biosci Eng; 2024 Feb; 21(3):3755-3773. PubMed ID: 38549305
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A fine granularity based user collaboration algorithm for location privacy protection.
    Wang B; Zhang L; Zhang G
    PLoS One; 2019; 14(7):e0220278. PubMed ID: 31344097
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A novel on-line spatial-temporal k-anonymity method for location privacy protection from sequence rules-based inference attacks.
    Zhang H; Wu C; Chen Z; Liu Z; Zhu Y
    PLoS One; 2017; 12(8):e0182232. PubMed ID: 28767687
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Updatable privacy-preserving
    Wu S; Xu W; Hong Z; Duan P; Zhang B; Hu Y; Wang B
    Peer Peer Netw Appl; 2022; 15(2):1076-1089. PubMed ID: 35018203
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A data encryption solution for mobile health apps in cooperation environments.
    Silva BM; Rodrigues JJ; Canelo F; Lopes IC; Zhou L
    J Med Internet Res; 2013 Apr; 15(4):e66. PubMed ID: 23624056
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Barriers to and Facilitators of the Use of Mobile Health Apps From a Security Perspective: Mixed-Methods Study.
    Zhou L; Bao J; Watzlaf V; Parmanto B
    JMIR Mhealth Uhealth; 2019 Apr; 7(4):e11223. PubMed ID: 30990458
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.