Tumors use bacteria to hide away
نویسندگان
چکیده
منابع مشابه
Introducing an algorithm for use to hide sensitive association rules through perturb technique
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...
متن کاملFamily substance use screening: less to hide, more to gain
substance use disorders highlights the magnitude of the challenge the society is facing and a critical need to identify evidence-based, practical approaches in order to effectively screen people at high risk for unhealthy alcohol use, tobacco and drug use, increase early detection of substance use disorders, and offer the proper care they need. The Family CAGE (an acronym of four questions on a...
متن کاملUse HypE to Hide Association Rules by Adding Items
During business collaboration, partners may benefit through sharing data. People may use data mining tools to discover useful relationships from shared data. However, some relationships are sensitive to the data owners and they hope to conceal them before sharing. In this paper, we address this problem in forms of association rule hiding. A hiding method based on evolutionary multi-objective op...
متن کاملNowhere to hide.
Northern Hemisphere's carbon dioxide emissions. "That's much more than any terrestrial plant ecologist would have considered likely," Tans said. Conserving tree and plant populations, he added, might raise their carbon dioxide uptake even higher. Understanding how carbon cycles through plants is vital to decreasing global warming. By burning fuel and clearing forests, human activity generates 7...
متن کاملWhere to Hide the Bits ?
We present a stochastic two-player zero-sum game between defender and attacker related to the security of practical steganography. The defender wants to hide a message in a cover object drawn by nature. The attacker wants to distinguish plain covers from those with a hidden message. We study the case of n-bit covers, independently but not identically distributed to allow for variation in the pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science
سال: 2015
ISSN: 0036-8075,1095-9203
DOI: 10.1126/science.347.6227.1214-a