Suggested Topics within your search.
Suggested Topics within your search.
-
821
A technological and legal investigation into how smart states deploy collective intelligence for security and surveillance purposes
Published 2025-03-01“…The article debates the relation between data protection and public and national security in democratic states and shows how the evolving threat landscape influences both the practice and the legislative process around personal data protection and deployment of emerging technologies and use of collective intelligence for security purposes. …”
Get full text
Article -
822
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01“…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
Get full text
Article -
823
Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing
Published 2024-01-01“…To mitigate these challenges, we have proposed a secure and incentive-based data-sharing framework for IIoT systems using blockchain technology. …”
Get full text
Article -
824
Decades in the Making: The Evolution of Digital Health Research Infrastructure Through Synthetic Data, Common Data Models, and Federated Learning
Published 2024-12-01“…The same way that drug trials require infrastructure to support their conduct, digital health also necessitates new and disruptive research data infrastructure. Novel methods such as common data models, federated learning, and synthetic data generation are emerging to enhance the utility of research using RWD, which are often siloed across health systems. …”
Get full text
Article -
825
KAB: A new k-anonymity approach based on black hole algorithm
Published 2022-07-01“…K-anonymity is the most widely used approach to privacy preserving microdata which is mainly based on generalization. …”
Get full text
Article -
826
Using Federated Learning for Collaborative Intrusion Detection Systems
Published 2023-06-01“…Traditional implementations provide fast and accurate predictions, but require centralised storage of labelled historical data for training. This solution is not always suitable for real-world applications, where regulatory constraints and privacy concerns hamper the collection of sensitive data into a single server. …”
Get full text
Article -
827
Normative framework for the protection against genetic discrimination in Serbia
Published 2015-01-01“…The analysis has shown that the rules on protection of the genetic data and the use of genetic samples, which are crucially important for prevention of genetic discrimination, have not been harmonized with contemporary ethical and legal standards. …”
Get full text
Article -
828
Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme
Published 2025-05-01“…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. …”
Get full text
Article -
829
Characterizing user mobility using mobile sensing systems
Published 2017-08-01“…Furthermore, we detail the need to use methods that respect the privacy of users and investigate the possibilities offered by network traces, including Wi-Fi and Bluetooth communication technologies. …”
Get full text
Article -
830
Ethical Considerations for Using Artificial Intelligence in Digital Technologies
Published 2025-05-01Get full text
Article -
831
Covert surveillance of communications: Compliance with the practice of the European court of human rights
Published 2014-01-01Get full text
Article -
832
THE POSSIBILITY OF USING ELECTRONIC MEDICAL RECORDS FOR CLINICAL OBSERVATION
Published 2021-05-01“…It is always necessary to remember that when using EMC for clinical trials, it is first necessary to integrate various types of information, in accordance with the criteria for acceptability of the protocol, elements of clinical trial data, EMC data for only one purpose – to enable cohort identification. …”
Get full text
Article -
833
Ethical Challenges in Blood Donation from Viewpoint of Blood Transfusion Policymakers, Experts and Stakeholders: A Qualitative Study
Published 2025-01-01“…Purposeful sampling and focus group discussion were used to collect data. Data analysis was performed by Graneheim and Lundman inductive content analysis. …”
Get full text
Article -
834
BANK INDONESIA’S ROLE IN MITIGATING ISSUES OF MONETARY ECONOMIC SOVEREIGNTY AND HUMAN RIGHTS
Published 2024-09-01Get full text
Article -
835
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01“…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
Get full text
Article -
836
WiFi-Based Location Tracking: A Still Open Door on Laptops
Published 2025-01-01“…Location privacy is a major concern in the current digital society, due to the sensitive information that can be inferred from location data. …”
Get full text
Article -
837
Analyzing the concept of solitude with the spatial syntax technique in the spatial organization of rural homes; case Study: Bushehr province
Published 2023-03-01“…In the next stage, graph analysis technique was used to extract data from the drawn maps using tools such as connectivity, relationship, step depth, metric depth, and angle of view with the help of Depth Map software for sample analysis. …”
Get full text
Article -
838
A data management system for precision medicine.
Published 2025-01-01“…This paper evaluates a MedDMS in five types of use cases for precision medicine, ranging from data collection to algorithm development and from implementation to integration with real-world data. …”
Get full text
Article -
839
FFM: Flood Forecasting Model Using Federated Learning
Published 2023-01-01“…Federated Learning is the most advanced technique of machine learning (ML) that guarantees data privacy, ensures data availability, promises data security, and handles network latency trials inherent in prediction of floods by prohibiting data to be transferred over the network for model training. …”
Get full text
Article -
840
Factors influencing the perceived usability of line pay: An extended technology acceptance model approach
Published 2025-05-01“…Utilizing an extended Technology Acceptance Model (TAM), the research integrated additional variables such as social influence, trust, security, and environmental concerns, offering a comprehensive framework to understand user adoption dynamics. 120 Taiwanese participants were surveyed by employing the Purposive Sampling Method and data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
Get full text
Article