Suggested Topics within your search.
Suggested Topics within your search.
-
461
GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks
Published 2025-01-01“…Machine learning has become integral to our lives, finding applications in nearly every aspect of our daily routines. However, using personal information in machine learning applications has raised concerns about user data privacy and security. …”
Get full text
Article -
462
A Privacy-Preserving Querying Mechanism with High Utility for Electric Vehicles
Published 2024-01-01“…Simultaneously, personal data use for analytics is growing at an unprecedented rate, raising concerns for privacy. …”
Get full text
Article -
463
PPSC: High-Precision and Scalable Encrypted Privacy-Preserving Speech Classification
Published 2025-02-01“…Secondly, the PPSC scheme securely implements the fundamental modules such as the convolutional layer, ReLU layer, average pooling layer, fully connected layer, and Softmax layer. This ensures the privacy of speech data, speech classification models, and intermediate computing results. …”
Get full text
Article -
464
Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery
Published 2025-04-01“…This scheme enables data requesters to effectively verify the correctness of the truth discovery service while ensuring data privacy. …”
Get full text
Article -
465
A comprehensive review on the users’ identity privacy for 5G networks
Published 2022-03-01“…This article discusses the various privacy issues in the 5G network that use IMSI in clear text or temporary identities such as TMSI & C‐RNTI with IMSI to disclose user identity privacy. …”
Get full text
Article -
466
An Exact Top- Query Algorithm with Privacy Protection in Wireless Sensor Networks
Published 2014-02-01“…The algorithm does the query exactly and meanwhile uses conic section privacy function to prevent the disclosure of the real data and then to promise the security of nodes in network. …”
Get full text
Article -
467
Privacy and Security in Digital Health Contact-Tracing: A Narrative Review
Published 2025-01-01“…A total of 114 articles were retained as per the inclusion criteria, which included quantitative, qualitative, and mixed-methods studies. The data were analysed using thematic analysis. (3) Results: Eight main themes were derived: privacy, data protection and control, trust, technical issues, perceived benefit, knowledge and awareness, social influence, and psychological factors. (4) Conclusions: Improving privacy standards and the awareness of the digital contact-tracing process will encourage the acceptance of contact-tracing apps.…”
Get full text
Article -
468
Enhanced Privacy-Preserving Architecture for Fundus Disease Diagnosis with Federated Learning
Published 2025-03-01“…However, due to the many privacy regulations regarding personal data, pooling together data from multiple sources and storing them in a single (centralized) location for traditional ML model training are often infeasible. …”
Get full text
Article -
469
Ensuring the security and privacy of information in mobile health-care communication systems
Published 2011-09-01“…The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient's data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. …”
Get full text
Article -
470
Privacy-Preserving Live Video Analytics for Drones via Edge Computing
Published 2024-11-01“…While edge computing offers a solution to the throughput bottleneck, it also opens the door to potential privacy invasions by exposing sensitive visual data to risks. …”
Get full text
Article -
471
Privacy preserving method based on Voronoi diagram in mobile crowd computing
Published 2017-10-01“…In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in the task by bidding and collect their data, in which the users’ identity, location, and other private information face the risk of disclosure. …”
Get full text
Article -
472
A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining
Published 2025-07-01“…Process mining (PM) is a growing field that looks at how to find, analyze, and improve process models using data from information systems. It automates much of the detailed work that usually requires a lot of manual effort. …”
Get full text
Article -
473
Taking disagreements into consideration: human annotation variability in privacy policy analysis
Published 2025-03-01“… Introduction. Privacy policies inform users about data practices but are often complex and difficult to interpret. …”
Get full text
Article -
474
Biometric-based medical watermarking system for verifying privacy and source authentication
Published 2020-07-01“…Two of the most requirements in e-health care system is the ensuring the authenticity of the source from which the data is received and the privacy of medical record of the patient must be preserved. …”
Get full text
Article -
475
Privacy protection risk identification mechanism based on automated feature combination
Published 2024-11-01“…Building upon the privacy protection method using homomorphic encryption, the technical challenge of optimizing feature combinations was addressed. …”
Get full text
Article -
476
ZK-STARK: Mathematical Foundations and Applications in Blockchain Supply Chain Privacy
Published 2025-03-01“…Privacy is one of the major security concerns. The zero-knowledge proof enables the transmission of data from the sender to the receiver without disclosing the actual content of the data. …”
Get full text
Article -
477
Digital citizenship literacy in Indonesia: The role of privacy awareness and social campaigns
Published 2025-01-01“…A quantitative research approach was employed, using a survey method to collect data from 250 respondents of students from several high schools in Jakarta. …”
Get full text
Article -
478
Blockchain-based privacy-preserving multi-tasks federated learning framework
Published 2024-12-01“…To overcome this weakness, this work proposes a privacy-preserving FL framework with multi-tasks using partitioned blockchain, which can run several different FL tasks by multiple requesters. …”
Get full text
Article -
479
A deep decentralized privacy-preservation framework for online social networks
Published 2024-12-01“…This paper addresses the critical challenge of privacy in Online Social Networks (OSNs), where centralized designs compromise user privacy. …”
Get full text
Article -
480
Privacy risk adaptive access control model via evolutionary game
Published 2019-12-01“…Aiming at the problem that in the private sensitive date centralized and opening information systems,a fine-grained and self-adaptive access control model for privacy preserving is desperately needed,thus the balance between privacy preserving and data access utility should be achieved,a rational multi-player risk-adaptive based access control model for privacy preserving was proposed.Firstly,the privacy risk values of access request and requester were formulized by the private information quantity of the requested dataset,and by using Shannon information.Secondly,a risk-adaptive based access control evolutionary game model was constructed by using evolutionary game under the supposing of bounded rational players.Furthermore,dynamic strategies of participants were analyzed by using replicator dynamics equation,and the method of choosing evolutionary stable strategy was proposed.Simulation and comparison results show that,the proposed model is effective to dynamically and adaptively preserve privacy and more risk adaptive,and dynamic evolutionary access strategies of the bounded rational participants are more suitable for practical scenarios.…”
Get full text
Article