Data Science Methods for Real-World Evidence Generation in Real-World Data

F Liu - Annual Review of Biomedical Data Science, 2024 - annualreviews.org
In the healthcare landscape, data science (DS) methods have emerged as indispensable
tools to harness real-world data (RWD) from various data sources such as electronic health …

Data protection law and multi-party computation: Applications to information exchange between law enforcement agencies

A Treiber, D Müllmann, T Schneider… - Proceedings of the 21st …, 2022 - dl.acm.org
Pushes for increased power of Law Enforcement (LE) for data retention and centralized
storage result in legal challenges with data protection law and courts-and possible violations …

SoK: Demystifying privacy enhancing technologies through the lens of software developers

M Boteju, T Ranbaduge, D Vatsalan… - arXiv preprint arXiv …, 2023 - arxiv.org
In the absence of data protection measures, software applications lead to privacy breaches,
posing threats to end-users and software organisations. Privacy Enhancing Technologies …

SPIKE: secure and private investigation of the kidney exchange problem

T Birka, K Hamacher, T Kussel, H Möllering… - BMC Medical Informatics …, 2022 - Springer
Background The kidney exchange problem (KEP) addresses the matching of patients in
need for a replacement organ with compatible living donors. Ideally many medical …

DEEPFL: A Differential Evolution-Based Framework for Privacy Protection and Poisoning Attack Defense in Maritime Edge Computing

C Han, T Yang, Z Cui, X Sun - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
Federated learning (FL) is crucial in edge computing for next-generation wireless networks
because it enables collaborative learning among devices while protecting data privacy …

Cardinality Counting in" Alcatraz": A Privacy-aware Federated Learning Approach

N Wu, X Yuan, S Wang, H Hu, M Xue - Proceedings of the ACM on Web …, 2024 - dl.acm.org
The task of cardinality counting, pivotal for data analysis, endeavors to quantify unique
elements within datasets and has significant applications across various sectors like …

The secure judgment of graphic similarity against malicious adversaries and its applications

X Liu, Y Xu, D Luo, G Xu, N Xiong, XB Chen - Scientific Reports, 2023 - nature.com
With the advent of the era of big data, privacy computing analyzes and calculates data on
the premise of protecting data privacy, to achieve data 'available and invisible'. As an …

Private Computation on Common Fuzzy Records

K Han, S Kim, Y Son - Proceedings on Privacy Enhancing …, 2025 - petsymposium.org
Private computation on common records refers to analyze data from two databases
containing shared records without revealing personal information. As a basic requirement …

Use Cases Requiring Privacy-Preserving Record Linkage in Paediatric Oncology

D Hayn, K Kreiner, E Sandner, M Baumgartner… - …, 2024 - pmc.ncbi.nlm.nih.gov
Simple Summary Large datasets concerning childhood cancers are rare. Therefore, it is
important to fully exploit all available data, which are distributed over several resources …

White Paper-Verbesserung des Record Linkage für die Gesundheitsforschung in Deutschland

T Intemann, K Kaulke, DK Kipker, V Lettieri… - 2023 - opus.bibliothek.uni-augsburg.de
Die personenbezogene Verknüpfung von unterschiedlichen, gesundheitsbezogenen Daten
mit dem Ziel einen Forschungsdatensatz zu erstellen, wird als Record Linkage bezeichnet …