UM

Browse/Search Results:  1-10 of 46 Help

Selected(0)Clear Items/Page:    Sort:
Big data technology applications and the right to health in china during the covid-19 pandemic Other
2021-07-02
Authors:  Shen, Taixia;  Wang, Chao
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2021/12/08
Big data technology  China  COVID-19  Epidemic prevention and control  Human rights  Right to health  Right to privacy  
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
IEEE Transactions on Dependable and Secure Computing, 2021,Volume: 18,Issue: 3,Page: 1261-1275
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Favorite |  | TC[WOS]:3 TC[Scopus]:3 | Submit date:2021/12/07
cloud computing  deep neural networks  Image denoising  privacy preservation  
Authors' Reply to: And justice for all? There is more to the interoperability of contact tracing apps than legal barriers. comment on "cOVID-19 contact tracing apps: A technologic tower of babel and the gap for international pandemic control" Other
2021-05-01
Authors:  Du, Li;  Raposo, Vera Lúcia;  Wang, Meng
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2021/12/07
Contact tracing  COVID-19  Data protection  Global health  Interoperability  Privacy  Public health  
Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation in Video Live Streaming Journal article
IEEE Transactions on Information Forensics and Security, 2021,Volume: 16,Page: 1088-1103
Authors:  Zhou,Jizhe;  Pun,Chi Man
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2021/03/11
empirical likelihood ratio  Face pixelation  positioned incremental affinity propagation  privacy protection  video live streaming  
COVID-19 contact tracing apps: A technologic tower of babel and the gap for international pandemic control Journal article
JMIR mHealth and uHealth, 2020,Volume: 8,Issue: 11
Authors:  Du, Li;  Raposo, Vera Lúcia;  Wang, Meng
Favorite |  | TC[WOS]:9 TC[Scopus]:11 | Submit date:2021/12/06
Contact Tracing Apps  Covid-19  Global Health  Privacy  Public Health  
Privacy-sensitive Objects Pixelation for Live Video Streaming Conference paper
MM 2020 - Proceedings of the 28th ACM International Conference on Multimedia, Seattle WA USA, October 12 - 16, 2020
Authors:  Zhou, Jizhe;  Pun, Chi Man;  Tong, Yu
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2021/12/06
Objects Pixelation  Privacy Protection  
Chance-Constrained Optimal Power Flow of Integrated Transmission and Distribution Networks With Limited Information Interaction Journal article
IEEE TRANSACTIONS ON SMART GRID, 2020,Volume: 12,Issue: 1,Page: 821-833
Authors:  Kunjie Tang;  Shufeng Dong;  Xiang Ma;  Leiyan Lv;  Yonghua Song
Favorite |  | TC[WOS]:3 TC[Scopus]:2 | Submit date:2021/04/29
Load Flow  Uncertainty  Reactive Power  Optimization  Load Modeling  Privacy  Mathematical Model  
Homo-ELM: fully homomorphic extreme learning machine Journal article
International Journal of Machine Learning and Cybernetics, 2020,Volume: 11,Issue: 7,Page: 1531-1540
Authors:  Wang,Weiru;  Gan,Yanfen;  Vong,Chi Man;  Chen,Chuangquan
Favorite |  | TC[WOS]:2 TC[Scopus]:2 | Submit date:2021/03/11
Encrypted Image Classification  Encrypted Machine Learning  Extreme Learning Machine  Fully Homomorphic Encryption  Privacy Preservation  
Genetic Privacy and Data Protection: A Review of Chinese Direct-to-Consumer Genetic Test Services Journal article
Frontiers in Genetics, 2020,Volume: 11
Authors:  Li Du;  Meng Wang
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2020/12/04
Chinese Genetic Testing Providers  Consumers’ Right To Their Genetic Information  Data Privacy  Data Protection Law  Data Sharing  Direct-to-consumer Genetic Testing  Genetic Information Protection  
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Information Sciences, 2020,Volume: 527,Page: 108-127
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Favorite |  | TC[WOS]:5 TC[Scopus]:7 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation