These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 37372265)

  • 1. Utility-Privacy Trade-Offs with Limited Leakage for Encoder.
    Shinohara N; Yagi H
    Entropy (Basel); 2023 Jun; 25(6):. PubMed ID: 37372265
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Exponential Strong Converse for Source Coding with Side Information at the Decoder.
    Oohama Y
    Entropy (Basel); 2018 May; 20(5):. PubMed ID: 33265442
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Private Key and Decoder Side Information for Secure and Private Source Coding.
    Günlü O; Schaefer RF; Boche H; Poor HV
    Entropy (Basel); 2022 Nov; 24(12):. PubMed ID: 36554121
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Exponential Strong Converse for Successive Refinement with Causal Decoder Side Information.
    Zhou L; Hero A
    Entropy (Basel); 2019 Apr; 21(4):. PubMed ID: 33267124
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Privacy-Aware Distributed Hypothesis Testing.
    Sreekumar S; Cohen A; Gündüz D
    Entropy (Basel); 2020 Jun; 22(6):. PubMed ID: 33286437
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Privacy-Preserving Biomedical Database Queries with Optimal Privacy-Utility Trade-Offs.
    Cho H; Simmons S; Kim R; Berger B
    Cell Syst; 2020 May; 10(5):408-416.e9. PubMed ID: 32359425
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Side Information Design in Zero-Error Coding for Computing.
    Charpenay N; Le Treust M; Roumy A
    Entropy (Basel); 2024 Apr; 26(4):. PubMed ID: 38667892
    [TBL] [Abstract][Full Text] [Related]  

  • 8. On the Lift, Related Privacy Measures, and Applications to Privacy-Utility Trade-Offs.
    Zarrabian MA; Ding N; Sadeghi P
    Entropy (Basel); 2023 Apr; 25(4):. PubMed ID: 37190467
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Exponential Strong Converse for One Helper Source Coding Problem.
    Oohama Y
    Entropy (Basel); 2019 Jun; 21(6):. PubMed ID: 33267281
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Privacy-Preserving Image Template Sharing Using Contrastive Learning.
    Rezaeifar S; Voloshynovskiy S; Asgari Jirhandeh M; Kinakh V
    Entropy (Basel); 2022 May; 24(5):. PubMed ID: 35626528
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Utility-Privacy Trade-Off in Distributed Machine Learning Systems.
    Zeng X; Yang C; Dai B
    Entropy (Basel); 2022 Sep; 24(9):. PubMed ID: 36141185
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Data Sanitization to Reduce Private Information Leakage from Functional Genomics.
    Gürsoy G; Emani P; Brannon CM; Jolanki OA; Harmanci A; Strattan JS; Cherry JM; Miranker AD; Gerstein M
    Cell; 2020 Nov; 183(4):905-917.e16. PubMed ID: 33186529
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Respecting Partial Privacy of Unstructured Data via Spectrum-Based Encoder.
    Luo Q; Li H
    Sensors (Basel); 2024 Feb; 24(3):. PubMed ID: 38339730
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Image-adaptive vector quantization in an entropy-constrained framework.
    Lightstone M; Mitra SK
    IEEE Trans Image Process; 1997; 6(3):441-50. PubMed ID: 18282939
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks
    Santoso B; Oohama Y
    Entropy (Basel); 2019 May; 21(5):. PubMed ID: 33267183
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Trade-offs between Error Exponents and Excess-Rate Exponents of Typical Slepian-Wolf Codes.
    Tamir Averbuch R; Merhav N
    Entropy (Basel); 2021 Feb; 23(3):. PubMed ID: 33668181
    [TBL] [Abstract][Full Text] [Related]  

  • 17. GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel.
    Liu H; Peng C; Tian Y; Long S; Tian F; Wu Z
    Entropy (Basel); 2022 Mar; 24(3):. PubMed ID: 35327940
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Privacy-Preserving Deep Action Recognition: An Adversarial Learning Framework and A New Dataset.
    Wu Z; Wang H; Wang Z; Jin H; Wang Z
    IEEE Trans Pattern Anal Mach Intell; 2022 Apr; 44(4):2126-2139. PubMed ID: 32986544
    [TBL] [Abstract][Full Text] [Related]  

  • 19. The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss.
    Kohlmayer F; Prasser F; Kuhn KA
    J Biomed Inform; 2015 Dec; 58():37-48. PubMed ID: 26385376
    [TBL] [Abstract][Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 6.