Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 8.797
Filtrar
1.
PLoS One ; 19(9): e0309919, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39240999

RESUMO

In location-based service (LBS), private information retrieval (PIR) is an efficient strategy used for preserving personal privacy. However, schemes with traditional strategy that constructed by information indexing are usually denounced by its processing time and ineffective in preserving the attribute privacy of the user. Thus, in order to cope with above two weaknesses, in this paper, based on the conception of ciphertext policy attribute-based encryption (CP-ABE), a PIR scheme based on CP-ABE is proposed for preserving the personal privacy in LBS (location privacy preservation scheme with CP-ABE based PIR, short for LPPCAP). In this scheme, query and feedback are encrypted with security two-parties calculation by the user and the LBS server, so as not to violate any personal privacy and decrease the processing time in encrypting the retrieved information. In addition, this scheme can also preserve the attribute privacy of users such as the query frequency as well as the moving manner. At last, we analyzed the availability and the privacy of the proposed scheme, and then several groups of comparison experiment are given, so that the effectiveness and the usability of proposed scheme can be verified theoretically, practically, and the quality of service is also preserved.


Assuntos
Segurança Computacional , Privacidade , Humanos , Armazenamento e Recuperação da Informação/métodos , Algoritmos , Confidencialidade
2.
Stud Health Technol Inform ; 317: 270-279, 2024 Aug 30.
Artigo em Inglês | MEDLINE | ID: mdl-39234731

RESUMO

INTRODUCTION: A modern approach to ensuring privacy when sharing datasets is the use of synthetic data generation methods, which often claim to outperform classic anonymization techniques in the trade-off between data utility and privacy. Recently, it was demonstrated that various deep learning-based approaches are able to generate useful synthesized datasets, often based on domain-specific analyses. However, evaluating the privacy implications of releasing synthetic data remains a challenging problem, especially when the goal is to conform with data protection guidelines. METHODS: Therefore, the recent privacy risk quantification framework Anonymeter has been built for evaluating multiple possible vulnerabilities, which are specifically based on privacy risks that are considered by the European Data Protection Board, i.e. singling out, linkability, and attribute inference. This framework was applied to a synthetic data generation study from the epidemiological domain, where the synthesization replicates time and age trends previously found in data collected during the DONALD cohort study (1312 participants, 16 time points). The conducted privacy analyses are presented, which place a focus on the vulnerability of outliers. RESULTS: The resulting privacy scores are discussed, which vary greatly between the different types of attacks. CONCLUSION: Challenges encountered during their implementation and during the interpretation of their results are highlighted, and it is concluded that privacy risk assessment for synthetic data remains an open problem.


Assuntos
Segurança Computacional , Medição de Risco , Humanos , Estudos Longitudinais , Confidencialidade , Privacidade
3.
Stud Health Technol Inform ; 317: 261-269, 2024 Aug 30.
Artigo em Inglês | MEDLINE | ID: mdl-39234730

RESUMO

INTRODUCTION: Retrieving comprehensible rule-based knowledge from medical data by machine learning is a beneficial task, e.g., for automating the process of creating a decision support system. While this has recently been studied by means of exception-tolerant hierarchical knowledge bases (i.e., knowledge bases, where rule-based knowledge is represented on several levels of abstraction), privacy concerns have not been addressed extensively in this context yet. However, privacy plays an important role, especially for medical applications. METHODS: When parts of the original dataset can be restored from a learned knowledge base, there may be a practically and legally relevant risk of re-identification for individuals. In this paper, we study privacy issues of exception-tolerant hierarchical knowledge bases which are learned from data. We propose approaches for determining and eliminating privacy issues of the learned knowledge bases. RESULTS: We present results for synthetic as well as for real world datasets. CONCLUSION: The results show that our approach effectively prevents privacy breaches while only moderately decreasing the inference quality.


Assuntos
Confidencialidade , Bases de Conhecimento , Aprendizado de Máquina , Humanos , Segurança Computacional , Privacidade , Registros Eletrônicos de Saúde
4.
PLoS One ; 19(9): e0309990, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39241088

RESUMO

Various methods such as k-anonymity and differential privacy have been proposed to safeguard users' private information in the publication of location service data. However, these typically employ a rigid "all-or-nothing" privacy standard that fails to accommodate users' more nuanced and multi-level privacy-related needs. Data is irrecoverable once anonymized, leading to a permanent reduction in location data quality, in turn significantly diminishing data utility. In the paper, a novel, bidirectional and multi-layered location privacy protection method based on attribute encryption is proposed. This method offers layered, reversible, and fine-grained privacy safeguards. A hierarchical privacy protection scheme incorporates various layers of dummy information, using an access structure tree to encrypt identifiers for these dummies. Multi-level location privacy protection is achieved after adding varying amounts of dummy information at different hierarchical levels N. This allows for precise control over the de-anonymization process, where users may adjust the granularity of anonymized data based on their own trust levels for multi-level location privacy protection. This method includes an access policy which functions via an attribute encryption-based access control system, generating decryption keys for data identifiers according to user attributes, facilitating a reversible transformation between data anonymity and de-anonymity. The complexities associated with key generation, distribution, and management are thus markedly reduced. Experimental comparisons with existing methods demonstrate that the proposed method effectively balances service quality and location privacy, providing users with multi-level and reversible privacy protection services.


Assuntos
Segurança Computacional , Privacidade , Humanos , Confidencialidade , Algoritmos
5.
Bioinformatics ; 40(Suppl 2): ii198-ii207, 2024 09 01.
Artigo em Inglês | MEDLINE | ID: mdl-39230698

RESUMO

MOTIVATION: In the realm of precision medicine, effective patient stratification and disease subtyping demand innovative methodologies tailored for multi-omics data. Clustering techniques applied to multi-omics data have become instrumental in identifying distinct subgroups of patients, enabling a finer-grained understanding of disease variability. Meanwhile, clinical datasets are often small and must be aggregated from multiple hospitals. Online data sharing, however, is seen as a significant challenge due to privacy concerns, potentially impeding big data's role in medical advancements using machine learning. This work establishes a powerful framework for advancing precision medicine through unsupervised random forest-based clustering in combination with federated computing. RESULTS: We introduce a novel multi-omics clustering approach utilizing unsupervised random forests. The unsupervised nature of the random forest enables the determination of cluster-specific feature importance, unraveling key molecular contributors to distinct patient groups. Our methodology is designed for federated execution, a crucial aspect in the medical domain where privacy concerns are paramount. We have validated our approach on machine learning benchmark datasets as well as on cancer data from The Cancer Genome Atlas. Our method is competitive with the state-of-the-art in terms of disease subtyping, but at the same time substantially improves the cluster interpretability. Experiments indicate that local clustering performance can be improved through federated computing. AVAILABILITY AND IMPLEMENTATION: The proposed methods are available as an R-package (https://github.com/pievos101/uRF).


Assuntos
Medicina de Precisão , Humanos , Análise por Conglomerados , Medicina de Precisão/métodos , Aprendizado de Máquina não Supervisionado , Aprendizado de Máquina , Neoplasias , Privacidade , Algoritmos , Algoritmo Florestas Aleatórias
6.
BMC Res Notes ; 17(1): 259, 2024 Sep 12.
Artigo em Inglês | MEDLINE | ID: mdl-39267127

RESUMO

BACKGROUND: Respecting the dignity of child labor is one of their most urgent needs. In many cases, the dignity of child labor is not maintained in countries with unfavorable economic conditions. The aim of the present study was understand adolescents' perceptions of their dignity in child labor. METHODS: This study is a qualitative research with conventional content analysis approach. Twenty teenagers who having work experience as child labor were selected from one welfare center and three charity centers in using purposeful sampling method in 2022-2023. Data was generated through individual, deep, and semi-structured interviews. In order to analyze the data was used Granheim and Lundman's method. RESULTS: Three main themes were presented in this study including, "preservation of privacy and security", "honoring individual identity to develop dignity" and "comprehensive support", and 9 categories. CONCLUSION: understand adolescents' perceptions as child labor of their dignity, privacy and security of child labor victims and respect for their identity and all-round support are defined. And in this supportive environment, the dignity of working children is preserved and appropriate behavioral consequences are created. Therefore, it is suggested that a cultural and institutional background be provided in which all components of the child labor's dignity are emphasized.


Assuntos
Trabalho Infantil , Pesquisa Qualitativa , Respeito , Humanos , Adolescente , Feminino , Masculino , Criança , Privacidade , Pessoalidade , Saúde Mental
7.
Conserv Biol ; 38(5): e14341, 2024 Oct.
Artigo em Inglês | MEDLINE | ID: mdl-39248761

RESUMO

The surge in internet accessibility has transformed wildlife trade by facilitating the acquisition of wildlife through online platforms. This scenario presents unique ethical challenges for researchers, as traditional ethical frameworks for in-person research cannot be readily applied to the online realm. Currently, there is a lack of clearly defined guidelines for appropriate ethical procedures when conducting online wildlife trade (OWT) research. In response to this, we consulted the scientific literature on ethical considerations in online research and examined existing guidelines established by professional societies and ethical boards. Based on these documents, we present a set of recommendations that can inform the development of ethically responsible OWT research. Key ethical challenges in designing and executing OWT research include the violation of privacy rights, defining subjects and illegality, and the risk of misinterpretation or posing risks to participants when sharing data. Potential solutions include considering participants' expectations of privacy, defining when participants are authors versus subjects, understanding the legal and cultural context, minimizing data collection, ensuring anonymization, and removing metadata. Best practices also involve being culturally sensitive when analyzing and reporting findings. Adhering to these guidelines can help mitigate potential pitfalls and provides valuable insights to editors, researchers, and ethical review boards, enabling them to conduct scientifically rigorous and ethically responsible OWT research to advance this growing field.


Los retos éticos de la investigación del mercado virtual de fauna Resumen El incremento en el acceso al internet ha transformado el mercado de fauna ya que facilita la adquisición de ejemplares a través de plataformas virtuales. Este escenario representa un reto ético único para los investigadores, pues los marcos éticos tradicionales para la investigación en persona no pueden aplicarse fácilmente en línea. Actualmente no hay lineamientos claros para el procedimiento ético apropiado cuando se investiga el mercado virtual de fauna (MVF). Como respuesta, consultamos la literatura científica sobre las consideraciones éticas en la investigación en línea y analizamos los lineamientos existentes establecidos por las sociedades profesionales y los comités éticos. Con base en estos documentos, presentamos un conjunto de recomendaciones que pueden guiar el desarrollo de la investigación sobre el MVF con responsabilidad ética. Los retos más importantes para el diseño y ejecución de la investigación sobre el MVF incluyen la violación del derecho a la privacidad, la definición de los sujetos y la ilegalidad y el riesgo de malinterpretar o presentar riesgos para los participantes cuando se comparten datos. Las soluciones potenciales incluyen considerar las expectativas de privacidad de los participantes, definir cuándo los participantes son autores y cuándo sujetos, entender el contexto legal y cultural, minimizar la recolección de datos, asegurar el anonimato y eliminar los metadatos. Las mejores prácticas también involucran la sensibilidad cultural cuando se analizan y reportan los resultados. La adhesión a estos lineamientos puede mitigar los posibles retos y proporcionar información valiosa para los editores, investigadores y comités de ética, permitiéndoles realizar una investigación con rigor científico y responsabilidad ética sobre el MVF para avanzar en este campo creciente de investigación.


Assuntos
Animais Selvagens , Comércio , Conservação dos Recursos Naturais , Conservação dos Recursos Naturais/métodos , Comércio/ética , Animais , Internet , Privacidade , Ética em Pesquisa , Comércio de Vida Silvestre
8.
Sci Rep ; 14(1): 20048, 2024 08 29.
Artigo em Inglês | MEDLINE | ID: mdl-39209893

RESUMO

In today's globalized agricultural system, information leakage of agricultural biological risk factors can lead to business risks and public panic, jeopardizing corporate reputation. To solve the above problems, this study constructs a blockchain network for agricultural product biological risk traceability based on agricultural product biological risk factor data to achieve traceability of biological risk traceability data of agricultural product supply chain to meet the sustainability challenges. To guarantee the secure and flexible sharing of agricultural product biological risk privacy information and limit the scope of privacy information dissemination, the blockchain-based proxy re-encryption access control method (BBPR-AC) is designed. Aiming at the problems of proxy re-encryption technology, such as the third-party agent being prone to evil, the authorization judgment being cumbersome, and the authorization process not automated, we design the proxy re-encryption access control mechanism based on the traceability of agricultural products' biological risk factors. Designing an attribute-based access control (ABAC) mechanism based on the traceability blockchain for agricultural products involves defining the attributes of each link in the agricultural supply chain, formulating policies, and evaluating and executing these policies, deployed in the blockchain system in the form of smart contracts. This approach achieves decentralization of authorization and automation of authority judgment. By analyzing the data characteristics within the agricultural product supply chain to avoid the malicious behavior of third-party agents, the decentralized blockchain system acts as a trusted third-party agent, and the proxy re-encryption is combined with symmetric encryption to improve the encryption efficiency. This ensures a efficient encryption process, making the system safe, transparent, and efficient. Finally, a prototype blockchain system for traceability of agricultural biological risk factors is built based on Hyperledger Fabric to verify this research method's reliability, security, and efficiency. The experimental results show that this research scheme's initial encryption, re-encryption, and decryption sessions exhibit lower computational overheads than traditional encryption methods. When the number of policies and the number of requests in the access control session is 100, the policy query latency is less than 400 ms, the request-response latency is slightly more than 360ms, and the data uploading throughput is 48.7 tx/s. The data query throughput is 81.8 tx/s, the system performance consumption is low and can meet the biological risk privacy protection needs of the agricultural supply chain. The BBPR-AC method proposed in this study provides ideas for achieving refined traceability management in the agricultural supply chain and promoting digital transformation in the agricultural industry.


Assuntos
Agricultura , Blockchain , Segurança Computacional , Agricultura/métodos , Humanos , Privacidade , Fatores de Risco , Disseminação de Informação/métodos
9.
Sci Rep ; 14(1): 20218, 2024 08 30.
Artigo em Inglês | MEDLINE | ID: mdl-39215022

RESUMO

In therapeutic diagnostics, early diagnosis and monitoring of heart disease is dependent on fast time-series MRI data processing. Robust encryption techniques are necessary to guarantee patient confidentiality. While deep learning (DL) algorithm have improved medical imaging, privacy and performance are still hard to balance. In this study, a novel approach for analyzing homomorphivally-encrypted (HE) time-series MRI data is introduced: The Multi-Faceted Long Short-Term Memory (MF-LSTM). This method includes privacy protection. The MF-LSTM architecture protects patient's privacy while accurately categorizing and forecasting cardiac disease, with accuracy (97.5%), precision (96.5%), recall (98.3%), and F1-score (97.4%). While segmentation methods help to improve interpretability by identifying important region in encrypted MRI images, Generalized Histogram Equalization (GHE) improves image quality. Extensive testing on selected dataset if encrypted time-series MRI images proves the method's stability and efficacy, outperforming previous approaches. The finding shows that the suggested technique can decode medical image to expose visual representation as well as sequential movement while protecting privacy and providing accurate medical image evaluation.


Assuntos
Cardiopatias , Imageamento por Ressonância Magnética , Privacidade , Humanos , Imageamento por Ressonância Magnética/métodos , Cardiopatias/diagnóstico por imagem , Segurança Computacional , Algoritmos , Processamento de Imagem Assistida por Computador/métodos , Feminino , Masculino , Aprendizado Profundo , Memória de Curto Prazo , Confidencialidade , Pessoa de Meia-Idade
10.
Sensors (Basel) ; 24(16)2024 Aug 08.
Artigo em Inglês | MEDLINE | ID: mdl-39204839

RESUMO

Federated learning (FL) has emerged as a pivotal paradigm for training machine learning models across decentralized devices while maintaining data privacy. In the healthcare domain, FL enables collaborative training among diverse medical devices and institutions, enhancing model robustness and generalizability without compromising patient privacy. In this paper, we propose DPS-GAT, a novel approach integrating graph attention networks (GATs) with differentially private client selection and resource allocation strategies in FL. Our methodology addresses the challenges of data heterogeneity and limited communication resources inherent in medical applications. By employing graph neural networks (GNNs), we effectively capture the relational structures among clients, optimizing the selection process and ensuring efficient resource distribution. Differential privacy mechanisms are incorporated, to safeguard sensitive information throughout the training process. Our extensive experiments, based on the Regensburg pediatric appendicitis open dataset, demonstrated the superiority of our approach, in terms of model accuracy, privacy preservation, and resource efficiency, compared to traditional FL methods. The ability of DPS-GAT to maintain a high and stable number of client selections across various rounds and differential privacy budgets has significant practical implications, indicating that FL systems can achieve strong privacy guarantees without compromising client engagement and model performance. This balance is essential for real-world applications where both privacy and performance are paramount. This study suggests a promising direction for more secure and efficient FL medical applications, which could improve patient care through enhanced predictive models and collaborative data utilization.


Assuntos
Aprendizado de Máquina , Redes Neurais de Computação , Humanos , Alocação de Recursos , Privacidade , Algoritmos
11.
Annu Rev Biomed Data Sci ; 7(1): 317-343, 2024 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-39178425

RESUMO

The rapidly growing scale and variety of biomedical data repositories raise important privacy concerns. Conventional frameworks for collecting and sharing human subject data offer limited privacy protection, often necessitating the creation of data silos. Privacy-enhancing technologies (PETs) promise to safeguard these data and broaden their usage by providing means to share and analyze sensitive data while protecting privacy. Here, we review prominent PETs and illustrate their role in advancing biomedicine. We describe key use cases of PETs and their latest technical advances and highlight recent applications of PETs in a range of biomedical domains. We conclude by discussing outstanding challenges and social considerations that need to be addressed to facilitate a broader adoption of PETs in biomedical data science.


Assuntos
Privacidade , Humanos , Ciência de Dados/métodos , Pesquisa Biomédica , Segurança Computacional , Confidencialidade/ética , Disseminação de Informação/métodos
12.
Sci Rep ; 14(1): 19849, 2024 08 27.
Artigo em Inglês | MEDLINE | ID: mdl-39191857

RESUMO

With the rising usage of contactless work options since COVID-19, users increasingly share their personal data in digital tools at work. Using an experimental online vignette study (N = 93), we examined users' willingness to use a video conferencing tool, while systematically varying the context of use (personal vs. low trustworthiness work vs. high trustworthiness work) and the type of information shared (low vs. medium vs. high sensitivity). We also assessed users' perceived responsibility in work and personal contexts of use and their self-assessed digital competence. Our results highlight employer trustworthiness as an important factor in the willingness to use a third-party video conferencing tool, with increased willingness to use these tools in work contexts of use with high trustworthiness compared to those with low trustworthiness. This effect seems to be reduced when the data to be shared is of high sensitivity, compared to medium and low sensitivity data. Furthermore, despite reduced responsibility for data protection in work compared to personal contexts of use, the willingness to use a video conferencing tool did not decrease between trustworthy work and personal contexts of use. We discuss our findings and their methodological implications for future research and derive implications for privacy decisions at work.


Assuntos
COVID-19 , Privacidade , Humanos , COVID-19/psicologia , COVID-19/epidemiologia , Masculino , Feminino , Adulto , Comunicação por Videoconferência , SARS-CoV-2 , Tomada de Decisões , Confiança , Pessoa de Meia-Idade
13.
PLoS One ; 19(8): e0309075, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39159171

RESUMO

Pre-exposure prophylaxis (PrEP) is being scaled up to prevent HIV acquisition among adolescent girls and young women (AGYW) in Eastern and Southern Africa. In a prior study more than one-third of AGYW 'mystery shoppers' stated they would not return to care based on interactions with health providers. We examined the experiences of AGYW in this study to identify main barriers to effective PrEP services. Unannounced patient actors (USP/'mystery shoppers') posed as AGYWs seeking PrEP using standardized scenarios 8 months after providers had received training to improve PrEP services. We conducted targeted debriefings using open-ended questions to assess PrEP service provision and counseling quality with USPs immediately following their visit. Debriefings were audio-recorded and transcribed. Transcripts were analyzed using thematic analysis to explore why USPs reported either positive or negative encounters. We conducted 91 USP debriefings at 24 facilities and identified three primary influences on PrEP service experiences: 1) Privacy improved likelihood of continuing care, 2) respectful attitudes created a safe environment for USPs, and 3) patient-centered communication improved the experience and increased confidence for PrEP initiation among USPs. Privacy and provider attitudes were primary drivers that influenced decision-making around PrEP in USP debriefs. Access to privacy and improving provider attitudes is important for scale-up of PrEP to AGYW.


Assuntos
Aconselhamento , Infecções por HIV , Profilaxia Pré-Exposição , Humanos , Feminino , Adolescente , Quênia , Infecções por HIV/prevenção & controle , Adulto Jovem , Privacidade , Adulto , Fármacos Anti-HIV/uso terapêutico
14.
Int J Med Inform ; 191: 105582, 2024 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-39096591

RESUMO

OBJECTIVE: To describe the use of privacy preserving linkage methods operationally in Australia, and to present insights and key learnings from their implementation. METHODS: Privacy preserving record linkage (PPRL) utilising Bloom filters provides a unique practical mechanism that allows linkage to occur without the release of personally identifiable information (PII), while still ensuring high accuracy. RESULTS: The methodology has received wide uptake within Australia, with four state linkage units with privacy preserving capability. It has enabled access to general practice and private pathology data amongst other, both much sought after datasets previous inaccessible for linkage. CONCLUSION: The Australian experience suggests privacy preserving linkage is a practical solution for improving data access for policy, planning and population health research. It is hoped interest in this methodology internationally continues to grow.


Assuntos
Confidencialidade , Registro Médico Coordenado , Austrália , Registro Médico Coordenado/métodos , Humanos , Confidencialidade/normas , Registros Eletrônicos de Saúde , Privacidade
15.
Artigo em Inglês | MEDLINE | ID: mdl-39150815

RESUMO

Electroencephalogram (EEG) signals play an important role in brain-computer interface (BCI) applications. Recent studies have utilized transfer learning to assist the learning task in the new subject, i.e., target domain, by leveraging beneficial information from previous subjects, i.e., source domains. Nevertheless, EEG signals involve sensitive personal mental and health information. Thus, privacy concern becomes a critical issue. In addition, existing methods mostly assume that a portion of the new subject's data is available and perform alignment or adaptation between the source and target domains. However, in some practical scenarios, new subjects prefer prompt BCI utilization over the time-consuming process of collecting data for calibration and adaptation, which makes the above assumption difficult to hold. To address the above challenges, we propose Online Source-Free Transfer Learning (OSFTL) for privacy-preserving EEG classification. Specifically, the learning procedure contains offline and online stages. At the offline stage, multiple model parameters are obtained based on the EEG samples from multiple source subjects. OSFTL only needs access to these source model parameters to preserve the privacy of the source subjects. At the online stage, a target classifier is trained based on the online sequence of EEG instances. Subsequently, OSFTL learns a weighted combination of the source and target classifiers to obtain the final prediction for each target instance. Moreover, to ensure good transferability, OSFTL dynamically updates the transferred weight of each source domain based on the similarity between each source classifier and the target classifier. Comprehensive experiments on both simulated and real-world applications demonstrate the effectiveness of the proposed method, indicating the potential of OSFTL to facilitate the deployment of BCI applications outside of controlled laboratory settings.


Assuntos
Algoritmos , Interfaces Cérebro-Computador , Eletroencefalografia , Aprendizado de Máquina , Eletroencefalografia/métodos , Eletroencefalografia/classificação , Humanos , Privacidade , Sistemas On-Line , Transferência de Experiência/fisiologia , Adulto , Masculino
16.
Neural Netw ; 179: 106574, 2024 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-39096754

RESUMO

Graph neural networks (GNN) are widely used in recommendation systems, but traditional centralized methods raise privacy concerns. To address this, we introduce a federated framework for privacy-preserving GNN-based recommendations. This framework allows distributed training of GNN models using local user data. Each client trains a GNN using its own user-item graph and uploads gradients to a central server for aggregation. To overcome limited data, we propose expanding local graphs using Software Guard Extension (SGX) and Local Differential Privacy (LDP). SGX computes node intersections for subgraph exchange and expansion, while local differential privacy ensures privacy. Additionally, we introduce a personalized approach with Prototype Networks (PN) and Model-Agnostic Meta-Learning (MAML) to handle data heterogeneity. This enhances the encoding abilities of the federated meta-learner, enabling precise fine-tuning and quick adaptation to diverse client graph data. We leverage SGX and local differential privacy for secure parameter sharing and defense against malicious servers. Comprehensive experiments across six datasets demonstrate our method's superiority over centralized GNN-based recommendations, while preserving user privacy.


Assuntos
Redes Neurais de Computação , Privacidade , Segurança Computacional , Humanos , Software , Aprendizado de Máquina , Algoritmos
17.
Acta Psychol (Amst) ; 249: 104450, 2024 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-39098215

RESUMO

Over the past decade, the rapid development of artificial intelligence has propelled the transition of autonomous vehicles from laboratories to real-world applications. However, autonomous vehicles are a long way from fully integrating into most people's lives. Previous studies indicate that the word-of-mouth effect is often used by consumers to determine the quality of innovative technologies. Word-of-mouth recommendation can not only increase the income of enterprises by attracting new customers, but also greatly reduce the promotion and publicity expenses of enterprises. Through the word-of-mouth effect, the intention to recommend can contribute to the growth of the autonomous driving market. Therefore, current research explores the mechanisms among the perceived risk of privacy safety, perceived defect, perceived behavioral control, intention to use, and intention to recommend through path analysis. Our findings, based on 433 online questionnaires, indicate that the perceived risk of privacy safety, perceived defects, and perceived behavioral control influence the intention to recommend. Notably, perceived risk of privacy safety and perceived defect directly affects the intention to recommend and also correlates with perceived behavioral control. These findings provide some empirical evidence for the recommendation of autonomous vehicles and the expansion of consumer groups.


Assuntos
Condução de Veículo , Intenção , Humanos , Projetos Piloto , Adulto , Masculino , Feminino , Adulto Jovem , Pessoa de Meia-Idade , Comportamento do Consumidor , Inquéritos e Questionários , Inteligência Artificial , Privacidade , Automóveis
18.
J Biomed Inform ; 157: 104712, 2024 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-39182631

RESUMO

In today's era of rapid development of large models, the traditional drug development process is undergoing a profound transformation. The vast demand for data and consumption of computational resources are making independent drug discovery increasingly difficult. By integrating federated learning technology into the drug discovery field, we have found a solution that both protects privacy and shares computational power. However, the differences in data held by various pharmaceutical institutions and the diversity in drug design objectives have exacerbated the issue of data heterogeneity, making traditional federated learning consensus models unable to meet the personalized needs of all parties. In this study, we introduce and evaluate an innovative drug discovery framework, MolCFL, which utilizes a multi-layer perceptron (MLP) as the generator and a graph convolutional network (GCN) as the discriminator in a generative adversarial network (GAN). By learning the graph structure of molecules, it generates new molecules in a highly personalized manner and then optimizes the learning process by clustering federated learning, grouping compound data with high similarity. MolCFL not only enhances the model's ability to protect privacy but also significantly improves the efficiency and personalization of molecular design. MolCFL exhibits superior performance when handling non-independently and identically distributed data compared to traditional models. Experimental results show that the framework demonstrates outstanding performance on two benchmark datasets, with the generated new molecules achieving over 90% in Uniqueness and close to 100% in Novelty. MolCFL not only improves the quality and efficiency of drug molecule design but also, through its highly customized clustered federated learning environment, promotes collaboration and specialization in the drug discovery process while ensuring data privacy. These features make MolCFL a powerful tool suitable for addressing the various challenges faced in the modern drug research and development field.


Assuntos
Descoberta de Drogas , Descoberta de Drogas/métodos , Humanos , Redes Neurais de Computação , Aprendizado de Máquina , Algoritmos , Análise por Conglomerados , Privacidade , Medicina de Precisão/métodos
19.
J Med Internet Res ; 26: e57309, 2024 Aug 29.
Artigo em Inglês | MEDLINE | ID: mdl-39207832

RESUMO

BACKGROUND: The COVID-19 pandemic gave rise to countless user-facing mobile apps to help fight the pandemic ("COVID-19 mitigation apps"). These apps have been at the center of data privacy discussions because they collect, use, and even retain sensitive personal data from their users (eg, medical records and location data). The US government ended its COVID-19 emergency declaration in May 2023, marking a unique time to comprehensively investigate how data privacy impacted people's acceptance of various COVID-19 mitigation apps deployed throughout the pandemic. OBJECTIVE: This research aims to provide insights into health data privacy regarding COVID-19 mitigation apps and policy recommendations for future deployment of public health mobile apps through the lens of data privacy. This research explores people's contextual acceptance of different types of COVID-19 mitigation apps by applying the privacy framework of contextual integrity. Specifically, this research seeks to identify the factors that impact people's acceptance of data sharing and data retention practices in various social contexts. METHODS: A mixed methods web-based survey study was conducted by recruiting a simple US representative sample (N=674) on Prolific in February 2023. The survey includes a total of 60 vignette scenarios representing realistic social contexts that COVID-19 mitigation apps could be used. Each survey respondent answered questions about their acceptance of 10 randomly selected scenarios. Three contextual integrity parameters (attribute, recipient, and transmission principle) and respondents' basic demographics are controlled as independent variables. Regression analysis was performed to determine the factors impacting people's acceptance of initial data sharing and data retention practices via these apps. Qualitative data from the survey were analyzed to support the statistical results. RESULTS: Many contextual integrity parameter values, pairwise combinations of contextual integrity parameter values, and some demographic features of respondents have a significant impact on their acceptance of using COVID-19 mitigation apps in various social contexts. Respondents' acceptance of data retention practices diverged from their acceptance of initial data sharing practices in some scenarios. CONCLUSIONS: This study showed that people's acceptance of using various COVID-19 mitigation apps depends on specific social contexts, including the type of data (attribute), the recipients of the data (recipient), and the purpose of data use (transmission principle). Such acceptance may differ between the initial data sharing and data retention practices, even in the same context. Study findings generated rich implications for future pandemic mitigation apps and the broader public health mobile apps regarding data privacy and deployment considerations.


Assuntos
COVID-19 , Aplicativos Móveis , Pandemias , Privacidade , COVID-19/prevenção & controle , COVID-19/epidemiologia , Humanos , Estados Unidos , Masculino , Inquéritos e Questionários , Adulto , Feminino , Pessoa de Meia-Idade , SARS-CoV-2 , Confidencialidade , Adulto Jovem
20.
Medicine (Baltimore) ; 103(33): e39370, 2024 Aug 16.
Artigo em Inglês | MEDLINE | ID: mdl-39151500

RESUMO

With the rapid development of emerging information technologies such as artificial intelligence, cloud computing, and the Internet of Things, the world has entered the era of big data. In the face of growing medical big data, research on the privacy protection of personal information has attracted more and more attention, but few studies have analyzed and forecasted the research hotspots and future development trends on the privacy protection. Presently, to systematically and comprehensively summarize the relevant privacy protection literature in the context of big healthcare data, a bibliometric analysis was conducted to clarify the spatial and temporal distribution and research hotspots of privacy protection using the information visualization software CiteSpace. The literature papers related to privacy protection in the Web of Science were collected from 2012 to 2023. Through analysis of the time, author and countries distribution of relevant publications, we found that after 2013, research on the privacy protection has received increasing attention and the core institution of privacy protection research is the university, but the countries show weak cooperation. Additionally, keywords like privacy, big data, internet, challenge, care, and information have high centralities and frequency, indicating the research hotspots and research trends in the field of the privacy protection. All the findings will provide a comprehensive privacy protection research knowledge structure for scholars in the field of privacy protection research under the background of health big data, which can help them quickly grasp the research hotspots and choose future research projects.


Assuntos
Big Data , Segurança Computacional , Confidencialidade , Privacidade , Humanos , Bibliometria
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA