Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,921 - 1,940 results of 2,784 for search '"\"((((\\"usedddds OR \"usedddddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.12s Refine Results
  1. 1921

    SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare by Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Hafida Saidi, Joel Herve Mboussam Emati, Leandros Maglaras

    Published 2024-12-01
    “…Our research aims to improve data privacy and reduce communication costs. Furthermore, we also address weaknesses in decentralized learning systems, like Sybil and Model Poisoning attacks. …”
    Get full text
    Article
  2. 1922

    Mathematical Modeling of Multiattack Behavior Discrimination in the WSN Based on Incidence Matrix by Yu Shuai-Jing, Wang Peng-Fei

    Published 2022-01-01
    “…The WSN node model is used to collect relevant data and mark and map the disguised data, so as to determine the characteristics of multiattack behavior and establish the WSN multiattack behavior discrimination model based on the incidence matrix. …”
    Get full text
    Article
  3. 1923

    Studies on Artificial Intelligence’s Effect on the Employment Market in the Future by Chen Enqi

    Published 2024-01-01
    “…At the same time, the application of AI also raises concerns about privacy, data security, and ethical issues, all of which need to be considered in the development of the job market. …”
    Get full text
    Article
  4. 1924

    Understanding customer loyalty in digital services: insights from food delivery in emerging markets by Bora Ly

    Published 2025-07-01
    “…Trustworthiness has emerged as particularly influential due to concerns over data privacy, while service quality and convenience are crucial in shaping user satisfaction and loyalty.…”
    Get full text
    Article
  5. 1925

    A Novel Raster Map Exchange Scheme Based on Visual Cryptography by Lijing Ren

    Published 2021-01-01
    “…Raster map is an image that has been discretized in space and brightness, and it is an important carrier of geospatial data. With the rapid development of Internet and big data technologies, preserving the privacy of raster map has become an urgent task. …”
    Get full text
    Article
  6. 1926

    Human-machine in the vortex of digital synergy by Vaclav Moravec, Beata Gavurova, Nik Hynek, Martin Rigelsky

    Published 2025-05-01
    “…Using data from 1232 respondents (aged 15+), collected via a quota-based online survey from April 8 to April 26, 2024, logistic regression analyses investigated two key questions: (1) Does increased use of virtual assistants correlate with a higher likelihood of ChatGPT adoption? …”
    Get full text
    Article
  7. 1927

    Antecedents of trust in online environment: A case of Pakistan by Yaser Zaman, Raja Ahmed Jamil, Zain Kazmi

    Published 2016-03-01
    “…SPSS was used to analyze the data and three techniques descriptive statistics, regression analysis and correlation analysis are applied. …”
    Get full text
    Article
  8. 1928

    A lightweight authentication and key agreement scheme for smart grid by Lili Yan, Yan Chang, Shibin Zhang

    Published 2017-02-01
    “…The security of advanced metering infrastructure is special importance for smart grid. In order to achieve data confidentiality, privacy, and authentication in advanced metering infrastructure, a lightweight authentication and key agreement scheme is proposed in this article. …”
    Get full text
    Article
  9. 1929

    The Potential for Large Language Models to Transform Cardiovascular Medicine (Russian Translation) by Quer, G., Topol, E.J.

    Published 2025-02-01
    “…Potential risks, such as loss of data privacy or potential diagnostic errors, should be addressed before use in clinical practice. …”
    Get full text
    Article
  10. 1930

    Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications by T. A. Alka, Aswathy Sreenivasan, M. Suresh

    Published 2025-02-01
    “…The policymaker's and enterprises' focus and actionable intervention are necessary for developing mechanisms to solve the barriers of regulatory compliance, lack of skilled manpower, data security, privacy issues, and upfront investment for entrepreneurial success.…”
    Get full text
    Article
  11. 1931

    Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection by Peng Luo, Rangjia Cai, Yuanbo Guo

    Published 2025-01-01
    “…The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity theft, and potential legal liabilities. …”
    Get full text
    Article
  12. 1932
  13. 1933

    eHealth Technology: What Do We Know and What do We Need to Learn by Ramzi A. Haraty, Ola A Sukkarieh

    Published 2021-06-01
    “…<p>eHealth is the use of information and communication technologies for health. eHealth serves multiple utilization purposes for storage, exchange, and retrieval of digital data for administrative, clinical, educational and research purposes. …”
    Get full text
    Article
  14. 1934

    Federated Learning for Predicting Major Postoperative Complications by Yuanfang Ren, PhD, Yonggi Park, PhD, Benjamin Shickel, PhD, Ziyuan Guan, MS, Ayush Patel, Yingbo Ma, PhD, Zhenhong Hu, PhD, Jeremy A. Balch, MD, Tyler J. Loftus, MD, PhD, Parisa Rashidi, PhD, Tezcan Ozrazgat-Baslanti, PhD, Azra Bihorac, MD, MS

    Published 2025-06-01
    “…To develop a robust model to accurately predict the risk of postoperative complications using clinical data from multiple institutions while ensuring data privacy. …”
    Get full text
    Article
  15. 1935

    Research Progress on Ambient Visual Information Analysis and Perception Measurement Methods for Motion Vision by Haipeng ZHU, Yuhang KONG, (JPN) OHNO Ryuzo

    Published 2025-05-01
    “…Despite the promising applications of machine learning in subjective perception research, challenges such as data annotation difficulties, context dependence, and privacy concerns still persist.ConclusionThe research demonstrates the advantages of using panoramic images in capturing comprehensive visual information in both static and dynamic environments, offering a more accurate representation of spatial relationships and overcoming traditional limitations. …”
    Get full text
    Article
  16. 1936

    Force majeure impact on citizen science: Perspective from an EU funded project [version 2; peer review: 1 approved, 2 approved with reservations] by Huma Shah, J. Vallverdu, M. Pocs, Tiberius Ignat, M. Hinsenkamp, Maayan Zhitomirsky-geffet

    Published 2025-05-01
    “…The acquisition of practical skills by these individuals enabled investigations of websites they visited and apps they used to record third-party cookies or third-party requests for personal data. …”
    Get full text
    Article
  17. 1937

    Force majeure impact on citizen science: Perspective from an EU funded project [version 1; peer review: 1 approved, 2 approved with reservations] by Huma Shah, J. Vallverdu, M. Pocs, Tiberius Ignat, M. Hinsenkamp, Maayan Zhitomirsky-geffet

    Published 2025-03-01
    “…The acquisition of practical skills by these individuals enabled investigations of websites they visited and apps they used to record third-party cookies or third-party requests for personal data. …”
    Get full text
    Article
  18. 1938

    Nurses’ perspectives on AI-Enabled wearable health technologies: opportunities and challenges in clinical practice by Haitham Alzghaibi

    Published 2025-07-01
    “…However, concerns regarding data privacy, accuracy, cost, and reduced human interaction persist. …”
    Get full text
    Article
  19. 1939

    Health Information Exchange Usage in Japan: Content Analysis of Audit Logs by Jun Suzumoto, Yukiko Mori, Tomohiro Kuroda

    Published 2025-05-01
    “…ObjectiveThis study aimed to identify the types of medical data that are frequently viewed on demand using HIEs in Japan. …”
    Get full text
    Article
  20. 1940

    Decentralized Biobanking Apps for Patient Tracking of Biospecimen Research: Real-World Usability and Feasibility Study by William Sanchez, Ananya Dewan, Eve Budd, M Eifler, Robert C Miller, Jeffery Kahn, Mario Macis, Marielle Gross

    Published 2025-04-01
    “… BackgroundBiobank privacy policies strip patient identifiers from donated specimens, undermining transparency, utility, and value for patients, scientists, and society. …”
    Get full text
    Article