Showing 21 - 40 results of 2,784 for search '"\"((((\"uses OR \\"useddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.27s Refine Results
  1. 21
  2. 22

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…However, this extensive coverage raises substantial concerns about data privacy and traceability, particularly during the claim process, as policyholders currently have limited control over and insight into how their data is accessed and used.MethodsTo address these challenges, we propose a blockchain-based model designed to enhance policyholders’ private control over data access and improve traceability throughout the NHI claim process. …”
    Get full text
    Article
  3. 23

    Survey of split learning data privacy by QIN Yiqun, MA Xiaojing, FU Jiayun, HU Pingyi, XU Peng, JIN Hai

    Published 2024-06-01
    “…In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. …”
    Get full text
    Article
  4. 24

    A privacy-enhanced framework for collaborative Big Data analysis in healthcare using adaptive federated learning aggregation by Rahul Haripriya, Nilay Khare, Manish Pandey, Sreemoyee Biswas

    Published 2025-05-01
    “…Abstract The exponential growth of Big Data in healthcare, particularly in AI-driven medical diagnostics, has raised critical concerns about data privacy in medical image classification. …”
    Get full text
    Article
  5. 25

    Can Synthetic Data Protect Privacy? by Gidan Min, Junhyoung Oh

    Published 2025-01-01
    “…To systematically evaluate the privacy protection performance of synthetic data generation algorithms (Synthpop, CTGAN, RTVAE, TVAE, DataSynthesizer), this study applied various safety metrics. …”
    Get full text
    Article
  6. 26
  7. 27

    Adaptive personalized privacy-preserving data collection scheme with local differential privacy by Haina Song, Hua Shen, Nan Zhao, Zhangqing He, Wei Xiong, Minghu Wu, Mingwu Zhang

    Published 2024-04-01
    “…Local differential privacy (LDP) is a state-of-the-art privacy notion that enables terminal participants to share their private data safely while controlling the privacy disclosure at the source. …”
    Get full text
    Article
  8. 28
  9. 29

    Ethical Dilemmas and Coping Strategies in the Use of Psychological Scales in the Era of Big Data by Lirong LIU, Yanan ZHENG

    Published 2025-04-01
    “…Focusing on the ethical risks arising from the reconstruction of psychological scales due to innovations in big data technology, a systematic analysis is conducted on the research and current use of psychological scales within the context of big data. …”
    Get full text
    Article
  10. 30

    Knowledge Distillation for Face Recognition Using Synthetic Data With Dynamic Latent Sampling by Hatef Otroshi Shahreza, Anjith George, Sebastien Marcel

    Published 2024-01-01
    “…We propose a new framework (called SynthDistill) to train lightweight face recognition models by distilling the knowledge from a pretrained teacher model using synthetic data. We generate synthetic face images without identity labels, mitigating the problems in the intra-class variation generation of synthetic datasets, and dynamically sample from the intermediate latent space of a face generator network to generate new variations of the challenging images while further exploring new face images. …”
    Get full text
    Article
  11. 31

    Unique Method for Prognosis of Risk of Depressive Episodes Using Novel Measures to Model Uncertainty Under Data Privacy by Barbara Pękala, Dawid Kosior, Wojciech Rząsa, Katarzyna Garwol, Janusz Czuma

    Published 2025-02-01
    “…The computer support system designed for that purpose combines data privacy protection from various sources and uncertainty modeling, especially for incomplete data. …”
    Get full text
    Article
  12. 32

    A privacy-preserved horizontal federated learning for malignant glioma tumour detection using distributed data-silos. by Shagun Sharma, Kalpna Guleria, Ayush Dogra, Deepali Gupta, Sapna Juneja, Swati Kumari, Ali Nauman

    Published 2025-01-01
    “…Additionally, it also has patient data-privacy concerns leading to anonymous information generalization, regulatory compliance issues, and data leakage challenges. …”
    Get full text
    Article
  13. 33

    Privacy-Preserving Rule Induction Using CKKS by Jihyeon Choi, Jina Choi, Younho Lee, Jung-Sik Hong

    Published 2024-01-01
    “…This study introduces a new approach called homomorphic encryption-based rule induction (HORI) algorithm, designed specifically for scenarios where data confidentiality is critical. This method is constructed using CKKS homomorphic encryption to make it work with encrypted data, thereby enhancing the privacy of both training data and the input for inference. …”
    Get full text
    Article
  14. 34
  15. 35

    An accuracy-privacy optimization framework considering user’s privacy requirements for data stream mining by Waruni Hewage, R. Sinha, M. Asif Naeem

    Published 2025-06-01
    “…Additionally, a data fitting module using kernel regression is integrated, a unique approach that predicts accuracy levels based on user-defined privacy thresholds. …”
    Get full text
    Article
  16. 36

    Data Privacy Protection in Islamic Communication Perspective by Musfiah Saidah, Hilya Maylaffayza

    Published 2024-02-01
    “…Technology in the era of society 5.0 was rising to facilitate human work, but it is used to misuse big data from the individual level. …”
    Get full text
    Article
  17. 37

    Data Anonymization and Privacy Preservation in Healthcare Systems by Datta Krishnasheesh, Gupta Himanshu

    Published 2025-01-01
    “…With the objective to identify key trends and driving factors, a bibliometric analysis was performed using VOSviewer, which focuses on prominent authors, dominant research topics, and collaborative networks in data privacy. …”
    Get full text
    Article
  18. 38

    Privacy-Preserving Data Sharing in Telehealth Services by Ammar Odeh, Eman Abdelfattah, Walid Salameh

    Published 2024-11-01
    “…The framework ensures that all patient health data are encrypted using homomorphic encryption before storage on the blockchain, guaranteeing confidentiality and protecting data from unauthorized access. …”
    Get full text
    Article
  19. 39

    Privacy-Aware Detection for Large Language Models Using a Hybrid BiLSTM-HMM Approach by Maryam Abbasalizadeh, Sashank Narain

    Published 2025-01-01
    “…However, their deployment introduces significant privacy concerns, including the memorization and unintended disclosure of sensitive data. …”
    Get full text
    Article
  20. 40