Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
581
Neutrosophic Logic for Secure Hand-Based Biometrics: Quantifying Privacy-Security Tradeoffs in Remote Authentication Systems
Published 2025-07-01“…To address this gap, we propose a vulnerability assessment framework grounded in neutrosophic logic [11], which evaluates system robustness through truth (T), indeterminacy (I), and falsity (F) membership functions, and this approach quantifies the trade-offs between security and privacy, revealing that hand-based biometrics achieve 92% security effectiveness (T = 0.8) while retaining an 18% uncertainty factor ( 𝐼 = 0.4 ) concerning potential vulnerabilities, and added analysis further identifies deficiencies in template protection (F = 0.2) and data transmission protocols, and we, proposed framework advances us the evaluation of biometric systems by using integrating neutrosophic uncertainty modeling, and it provides actionable insights for designing secure remote authentication architectures. …”
Get full text
Article -
582
A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network
Published 2015-10-01“…While obtaining convenient services, the exploitation of mass location data is inevitably leading to a serious concern about location privacy security. …”
Get full text
Article -
583
Ethics of Artificial Intelligence and Robotics: Key Issues and Modern Ways to Solve Them
Published 2023-12-01Get full text
Article -
584
Artificial Intelligence and Politics: Legal Dilemmas and Risks to Democracy
Published 2025-04-01Get full text
Article -
585
Artificial Intelligence and Politics: Legal Dilemmas and Risks to Democracy
Published 2025-04-01Get full text
Article -
586
Dynamic selectout and voting-based federated learning for enhanced medical image analysis
Published 2025-01-01“…This strategy has a lot of potential to improve FL across a range of applications, especially those that prioritize data privacy, diversity, and performance.…”
Get full text
Article -
587
Vehicle Trajectory Generation Based on Generation Adversarial Network
Published 2024-06-01“…In this paper, the vehicle travel time of sample trajectory data and virtual trajectory data is used as indicators for statistical analysis. …”
Get full text
Article -
588
Private Stochastic Optimization with Large Worst-Case Lipschitz Parameter
Published 2025-03-01Get full text
Article -
589
Hybrid Optimization Machine Learning Framework for Enhancing Trust and Security in Cloud Network
Published 2024-01-01“…The rapidly evolving field of cloud-based data sharing faces critical challenges in ensuring comprehensive privacy protection and trust for both data producers and seekers. …”
Get full text
Article -
590
Federated Mental Wellbeing Assessment Using Smartphone Sensors Under Unreliable Participation
Published 2025-01-01“…The findings suggested that given the widespread use of such devices, FL holds great potential in mood and depression detection while protecting data privacy. …”
Get full text
Article -
591
-
592
Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach
Published 2025-02-01“…Abstract Homomorphic Encryption (HE) offers a revolutionary cryptographic approach to safeguarding privacy in machine learning (ML), especially in processing sensitive healthcare data. …”
Get full text
Article -
593
-
594
Cross-Company Data Sharing Using Distributed Analytics
Published 2025-05-01“…Furthermore, we find that the framework supports integration of data quality assessment and privacy preservation mechanisms. …”
Get full text
Article -
595
UniFL: Accelerating Federated Learning Using Heterogeneous Hardware Under a Unified Framework
Published 2024-01-01Get full text
Article -
596
Identification of hazardous road locations using ambulance data
Published 2025-03-01“…Results: Compared to police data in the same study period, we found 3.2 times as many unique crash sites through the use of combined hospital patient and ambulance data. …”
Get full text
Article -
597
Security and privacy in online teaching during the COVID-19 pandemic: experiences and concerns of academics in Saudi higher education
Published 2024-11-01“…The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. …”
Get full text
Article -
598
Old MacDonald and His Hackable Smartphone Application: A Security and Privacy Analysis of Android Agriculture Applications
Published 2025-01-01“…Despite the widespread use of smartphones among farmers increasing from 77% in 2021 to 82% in 2023, minimal research has examined the security and privacy implications of agricultural smartphone applications, potentially used on these devices. …”
Get full text
Article -
599
Collaborative and privacy-preserving cross-vendor united diagnostic imaging via server-rotating federated machine learning
Published 2025-08-01“…Abstract Federated Learning (FL) is a distributed framework that enables collaborative training of a server model across medical data vendors while preserving data privacy. However, conventional FL faces two key challenges: substantial data heterogeneity among vendors and limited flexibility from a fixed server, leading to suboptimal performance in diagnostic-imaging tasks. …”
Get full text
Article -
600
Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR) System
Published 2011-01-01“…The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. …”
Get full text
Article