Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 421 - 440 results of 2,784 for search '"\"((((\\"usedddds OR \"usedddddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.15s Refine Results
  1. 421
  2. 422

    A multimodal differential privacy framework based on fusion representation learning by Chaoxin Cai, Yingpeng Sang, Hui Tian

    Published 2022-12-01
    “…Then based on this representation, we use the Local Differential Privacy (LDP) mechanism to protect data. …”
    Get full text
    Article
  3. 423

    A Verifiable, Privacy-Preserving, and Poisoning Attack-Resilient Federated Learning Framework by Washington Enyinna Mbonu, Carsten Maple, Gregory Epiphaniou, Christo Panchev

    Published 2025-03-01
    “…Federated learning is the on-device, collaborative training of a global model that can be utilized to support the privacy preservation of participants’ local data. …”
    Get full text
    Article
  4. 424

    Children's digital privacy on fast-food and dine-in restaurant mobile applications. by Christine Mulligan, Grace Gillis, Lauren Remedios, Christopher Parsons, Laura Vergeer, Monique Potvin Kent

    Published 2025-02-01
    “…Restaurant mobile applications are powerful platforms for collecting users' data and are popular among children. This study aimed to provide insight into the privacy policies of top dine-in and fast-food mobile apps in Canada and data collected on child users. …”
    Get full text
    Article
  5. 425

    Jointly Achieving Smart Homes Security and Privacy through Bidirectional Trust by Osman Abul, Melike Burakgazi Bilgen

    Published 2025-04-01
    “…Once approved, users are primarily concerned about privacy protection (i.e., user-to-system trust) when utilizing system services that require sensitive data for their functionality. …”
    Get full text
    Article
  6. 426

    Challenges in IoMT Adoption in Healthcare: Focus on Ethics, Security, and Privacy by Alton Mabina, Neo Rafifing, Boago Seropola, Thapelo Monageng, Pulafela Majoo

    Published 2024-12-01
    “…This study highlights ethical, security, and privacy barriers to IoMT adoption in developing countries and proposes strategies like regulatory frameworks, data encryption, AI transparency, and professional training to address these challenges. …”
    Get full text
    Article
  7. 427

    PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels by Anastasios N. Bikos

    Published 2025-05-01
    “…Our pre-prototyped framework can provide such privacy preservation (namely <i>virtual proof of privacy (VPP)</i>) and visually secure data transfer promptly (<1000 ms), as well as the physical distance of the smart glasses (∼50 cm).…”
    Get full text
    Article
  8. 428

    Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks by Hongning Li, Qingqi Pei, Wenjing Zhang

    Published 2016-07-01
    “…In this paper, to make full use of idle spectrum with low probability of location leakage, we propose a Location Privacy-Preserving Channel Allocation (LP-p CA) scheme. …”
    Get full text
    Article
  9. 429

    GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks by Nges Brian Njungle, Eric Jahns, Zhenqi Wu, Luigi Mastromauro, Milan Stojkov, Michel A. Kinsy

    Published 2025-01-01
    “…Machine learning has become integral to our lives, finding applications in nearly every aspect of our daily routines. However, using personal information in machine learning applications has raised concerns about user data privacy and security. …”
    Get full text
    Article
  10. 430

    A Privacy-Preserving Querying Mechanism with High Utility for Electric Vehicles by Ugur Ilker Atmaca, Sayan Biswas, Carsten Maple, Catuscia Palamidessi

    Published 2024-01-01
    “…Simultaneously, personal data use for analytics is growing at an unprecedented rate, raising concerns for privacy. …”
    Get full text
    Article
  11. 431

    PPSC: High-Precision and Scalable Encrypted Privacy-Preserving Speech Classification by WANG Leilei, SONG Kao, ZHANG Yuanyuan, BI Renwan, XIONG Jinbo

    Published 2025-02-01
    “…Secondly, the PPSC scheme securely implements the fundamental modules such as the convolutional layer, ReLU layer, average pooling layer, fully connected layer, and Softmax layer. This ensures the privacy of speech data, speech classification models, and intermediate computing results. …”
    Get full text
    Article
  12. 432

    Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery by Ruijuan Jia, Juan Ma, Ziyin You, Mingyue Zhang

    Published 2025-04-01
    “…This scheme enables data requesters to effectively verify the correctness of the truth discovery service while ensuring data privacy. …”
    Get full text
    Article
  13. 433

    An Exact Top- Query Algorithm with Privacy Protection in Wireless Sensor Networks by Huang Haiping, Feng Juan, Wang Ruchuan, Qin XiaoLin

    Published 2014-02-01
    “…The algorithm does the query exactly and meanwhile uses conic section privacy function to prevent the disclosure of the real data and then to promise the security of nodes in network. …”
    Get full text
    Article
  14. 434

    Enhanced Privacy-Preserving Architecture for Fundus Disease Diagnosis with Federated Learning by Raymond Jiang, Yulia Kumar, Dov Kruger

    Published 2025-03-01
    “…However, due to the many privacy regulations regarding personal data, pooling together data from multiple sources and storing them in a single (centralized) location for traditional ML model training are often infeasible. …”
    Get full text
    Article
  15. 435

    Ensuring the security and privacy of information in mobile health-care communication systems by Ademola Adesina, Kehinde Agbele, Ronald Februarie, Ademola Abidoye, Henry Nyongesa

    Published 2011-09-01
    “…The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient's data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. …”
    Get full text
    Article
  16. 436

    Privacy-Preserving Live Video Analytics for Drones via Edge Computing by Piyush Nagasubramaniam, Chen Wu, Yuanyi Sun, Neeraj Karamchandani, Sencun Zhu, Yongzhong He

    Published 2024-11-01
    “…While edge computing offers a solution to the throughput bottleneck, it also opens the door to potential privacy invasions by exposing sensitive visual data to risks. …”
    Get full text
    Article
  17. 437

    Privacy preserving method based on Voronoi diagram in mobile crowd computing by Hao Long, Shukui Zhang, Jin Wang, Cheng-Kuan Lin, Jia-Jun Cheng

    Published 2017-10-01
    “…In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in the task by bidding and collect their data, in which the users’ identity, location, and other private information face the risk of disclosure. …”
    Get full text
    Article
  18. 438

    A location semantic privacy protection model based on spatial influence by Linghong Kuang, Wenlong Shi, Xueqi Chen, Jing Zhang, Huaxiong Liao

    Published 2025-04-01
    “…Nonetheless, while trajectory data mining enhances user convenience, it also exposes their privacy to potential breaches. …”
    Get full text
    Article
  19. 439

    Privacy-Preserving Machine Learning (PPML) Inference for Clinically Actionable Models by Baris Balaban, Seyma Selcan Magara, Caglar Yilgor, Altug Yucekul, Ibrahim Obeid, Javier Pizones, Frank Kleinstueck, Francisco Javier Sanchez Perez-Grueso, Ferran Pellise, Ahmet Alanay, Erkay Savas, Cetin Bagci, Osman Ugur Sezerman

    Published 2025-01-01
    “…Ensuring the security of both the model and the user data enables the protection of the intellectual property of ML models, preventing the leakage of sensitive information used in training and model users&#x2019; data.INDEX TERMS Homomorphic encryption, privacy-preserving machine learning, XGBoost.…”
    Get full text
    Article
  20. 440

    A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining by Ibrahim Ileri, Tugba Gurgen Erdogan, Ayca Kolukisa-Tarhan

    Published 2025-07-01
    “…Process mining (PM) is a growing field that looks at how to find, analyze, and improve process models using data from information systems. It automates much of the detailed work that usually requires a lot of manual effort. …”
    Get full text
    Article