Showing 701 - 720 results of 2,784 for search '"\"((((\"uses OR \\"useddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.25s Refine Results
  1. 701

    PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare by Hegde Manjunath, M. Karthik, Hegde Varun, Rao Rohini R., Mantoor Vinayak M., Bhat Radhakrishna

    Published 2025-04-01
    “…PLASMA’s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. …”
    Get full text
    Article
  2. 702

    Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging by Hadi Mahdipour, Jaime Laviada, Fernando Las-Heras Andres, Mehdi Sookhak

    Published 2025-01-01
    “…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
    Get full text
    Article
  3. 703

    Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things. by Xujun Tang

    Published 2024-01-01
    “…The digital watermark privacy protection method and the public service advertising work push privacy protection method are used to provide an innovative solution for public service advertising privacy protection. …”
    Get full text
    Article
  4. 704

    Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies by Kumar Rahul, Shieh Chin-Shiuh, Chakrabarti Prasun, Kumar Ashok, Moolchandani Jhankar, Sinha Raj

    Published 2025-01-01
    “…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
    Get full text
    Article
  5. 705

    Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks by Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei, Riad Alharbey

    Published 2025-02-01
    “…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
    Get full text
    Article
  6. 706

    Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities by Ahma Greta, Kadriu Arbana

    Published 2025-06-01
    “…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
    Get full text
    Article
  7. 707
  8. 708

    Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis by Madhura K., Niyaz Panakaje, S. M. Riha Parvin, Shakira Irfana, Mural Henrita Cutinha, Yatheen A, Rovina Sharon Soans

    Published 2024-12-01
    “…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
    Get full text
    Article
  9. 709

    Federated Learning for Surface Roughness by Kai-Lun Cheng, Yu-Hung Ting, Wen-Ren Jong, Shia-Chung Chen, Zhe-Wei Zhou

    Published 2025-06-01
    “…A custom data acquisition system collected discharge current and spindle current signals, which were solely used as input features to train the deep learning model. …”
    Get full text
    Article
  10. 710

    The Adoption of Virtual Fitting Rooms in Iranian Sportswear Industries: A Mixed-Methods Study Based on TAM Model by Seyyed Iman Ghaffarisadr, Farzad Nobakht Sareban

    Published 2024-02-01
    “…Structural equation modelling was used to test the hypotheses. SMART PLS and SPSS 23 software were used for data analysis.Findings: The results supported the positive effect of the factors perceived ease of use, perceived usefulness, perceived enjoyment, and fashion leadership, as well as the negative impact of technology anxiety on adopting this technology. …”
    Get full text
    Article
  11. 711
  12. 712

    QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles by Ji-ming Chen, Ting-ting Li, Liang-jun Wang

    Published 2019-07-01
    “…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
    Get full text
    Article
  13. 713

    NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols by Rafiullah Khan, Mohib Ullah, Atif Khan, Muhammad Irfan Uddin, Maha Al-Yahya

    Published 2021-01-01
    “…Numerous techniques are available to address privacy infringement, including Private Information Retrieval (PIR) protocols that use peer nodes to preserve privacy. …”
    Get full text
    Article
  14. 714

    Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities by Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, Rania Aboalela, Naif Alsaadi, Louai A. Maghrabi, Khalid H. Allehaibi

    Published 2025-02-01
    “…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
    Get full text
    Article
  15. 715

    How Social Scene Characteristics Affect Customers’ Purchase Intention: The Role of Trust and Privacy Concerns in Live Streaming Commerce by Wenjian Li, Steiner Cujilema, Lisong Hu, Gang Xie

    Published 2025-04-01
    “…The research employs Structural Equation Modeling (SEM) to test the hypothesis using data from 504 valid responses. (3) The results demonstrate that the characteristics of social scenes proposed in this study enhance consumer trust and positively impact purchase intention. …”
    Get full text
    Article
  16. 716

    A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans by Abdullah Al-Saleh, Ghanshyam G. Tejani, Shailendra Mishra, Sunil Kumar Sharma, Seyed Jalaleddin Mousavirad

    Published 2025-07-01
    “…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
    Get full text
    Article
  17. 717

    Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response by Yan Yan, Pengbin Yan, Adnan Mahmood, Yang Zhang, Quan Z. Sheng

    Published 2024-07-01
    “…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
    Get full text
    Article
  18. 718

    Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective by Augustino Mwogosi

    Published 2025-05-01
    “…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
    Get full text
    Article
  19. 719

    A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment by Ponugoti Kalpana, Sunitha Tappari, L. Smitha, Dasari Madhavi, K. Naresh, Maddala Vijayalakshmi

    Published 2025-06-01
    “…Though sensor-driven devices have largely eased everyday lives, these healthcare systems have been suffering from various security breaches and data privacy problems. This evokes a need for designing intelligent systems to eradicate data breaches and privacy problems. …”
    Get full text
    Article
  20. 720