Knowledge graphs

A Hogan, E Blomqvist, M Cochez, C d'Amato… - ACM Computing …, 2021 - dl.acm.org
In this article, we provide a comprehensive introduction to knowledge graphs, which have
recently garnered significant attention from both industry and academia in scenarios that …

[HTML][HTML] Social media use for research participant recruitment: integrative literature review

EM Darko, M Kleib, J Olson - Journal of Medical Internet Research, 2022 - jmir.org
Background Social media tools have provided health researchers with the opportunity to
engage with communities and groups in a nonconventional manner to recruit participants for …

Large scale learning on non-homophilous graphs: New benchmarks and strong simple methods

D Lim, F Hohne, X Li, SL Huang… - Advances in …, 2021 - proceedings.neurips.cc
Many widely used datasets for graph machine learning tasks have generally been
homophilous, where nodes with similar labels connect to each other. Recently, new Graph …

Ethical use of artificial intelligence in health professions education: AMEE Guide No. 158

K Masters - Medical Teacher, 2023 - Taylor & Francis
Abstract Health Professions Education (HPE) has benefitted from the advances in Artificial
Intelligence (AI) and is set to benefit more in the future. Just as any technological advance …

Synthetic data–anonymisation groundhog day

T Stadler, B Oprisanu, C Troncoso - 31st USENIX Security Symposium …, 2022 - usenix.org
Synthetic data has been advertised as a silver-bullet solution to privacy-preserving data
publishing that addresses the shortcomings of traditional anonymisation techniques. The …

Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Anatomy of threats to the internet of things

I Makhdoom, M Abolhasan, J Lipman… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …

Logan: Membership inference attacks against generative models

J Hayes, L Melis, G Danezis, E De Cristofaro - arXiv preprint arXiv …, 2017 - arxiv.org
Generative models estimate the underlying distribution of a dataset to generate realistic
samples according to that distribution. In this paper, we present the first membership …

Bitcoin and beyond: A technical survey on decentralized digital currencies

F Tschorsch, B Scheuermann - IEEE Communications Surveys …, 2016 - ieeexplore.ieee.org
Besides attracting a billion dollar economy, Bitcoin revolutionized the field of digital
currencies and influenced many adjacent areas. This also induced significant scientific …

Collective data-sanitization for preventing sensitive information inference attacks in social networks

Z Cai, Z He, X Guan, Y Li - IEEE Transactions on Dependable …, 2016 - ieeexplore.ieee.org
Releasing social network data could seriously breach user privacy. User profile and
friendship relations are inherently private. Unfortunately, sensitive information may be …