Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 481 - 500 results of 2,784 for search '"\"((((\\"usedddds OR \"usedddddds) OR \"usedds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.23s Refine Results
  1. 481

    Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability by Yong Zhou, Hong Lei, Zijian Bao

    Published 2024-01-01
    “…However, traditional donation systems, typically centralized, are prone to issues such as data redundancy, vulnerability to single-point failures, and a deficiency in transparency and traceability. …”
    Get full text
    Article
  2. 482

    A lightweight and secure authentication and privacy protection scheme for internet of medical things by Sanjay Kumar, Kumar Abhishek, Shitharth Selvarajan

    Published 2025-07-01
    “…However, transmitting sensitive patient data through IoMT devices raises significant security and privacy concerns. …”
    Get full text
    Article
  3. 483

    A robust and personalized privacy-preserving approach for adaptive clustered federated distillation by Mai Shawkat, Zainab H. Ali, Mofreh Salem, Ali El-desoky

    Published 2025-04-01
    “…Meta-learning is used in each cluster to enhance the personalization of the local models and the classification accuracy of the non-independent and Identically distributed (non-IID) data distributions. …”
    Get full text
    Article
  4. 484

    The Looming Privacy Challenges Posed by Commercial Satellite Imaging: Remedies and Research Directions by Nathanael Denis, Roberto Di Pietro

    Published 2025-01-01
    “…While these technologies benefit applications such as natural disaster monitoring and precision agriculture, they also introduce novel privacy risks. This perspective paper provides several contributions: we start by analyzing privacy risks using the LINDDUN privacy framework, categorizing threats like linking, identification, and data disclosure. …”
    Get full text
    Article
  5. 485

    Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments by Mohammed A. Aleisa

    Published 2025-01-01
    “…This architecture entails data privacy and confidentiality, auditability and traceability, and withstanding evolving threats, including potential threats in terms of quantum attacks. …”
    Get full text
    Article
  6. 486

    Self-Disclosure on Professional Social Networking Sites: A Privacy Calculus Perspective by Imairi Eitiveni, Achmad Nizar Hidayanto, Yuvitri Annisa Dwityafani, Larastri Kumaralalita

    Published 2023-01-01
    “…A model contextualizing privacy calculus theory combined with the trust factor was developed and evaluated using 661 quantitative data collected through a questionnaire. …”
    Get full text
    Article
  7. 487

    Privacy preserving strategies for electronic health records in the era of large language models by Jitendra Jonnagaddala, Zoie Shui-Yee Wong

    Published 2025-01-01
    “…Risks can be reduced by using strategies like privacy-preserving locally deployed LLMs, synthetic data generation, differential privacy, and deidentification. …”
    Get full text
    Article
  8. 488

    Light weighted privacy protection ViT inference framework based on secret sharing by MA Min, FU Yu, HUANG Kai, JIA Xiaofeng

    Published 2024-04-01
    “…The ViT (vision transformer) inference framework, which was widely used in image processing, was found to have a risk of leaking user privacy data. …”
    Get full text
    Article
  9. 489

    Sharing images of children on social media: British motherhood influencers and the privacy paradox. by Katherine Baxter, Barbara Czarnecka

    Published 2025-01-01
    “…This study examines the extent to which popular British motherhood influencers infringe on their children's privacy by posting images of them online. We conducted a content analysis of 5,253 Instagram posts from ten UK-based influencers, supplemented by self-reported data from these influencers. …”
    Get full text
    Article
  10. 490

    Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey by Blessing Guembe, Sanjay Misra, Ambrose Azeta

    Published 2024-12-01
    “…Aim This study presents a cutting-edge survey on privacy issues, security attacks, countermeasures and open problems in FL.Methodology The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used to determine the research domain, establish a search query, and analyze all retrieved articles from the selected scientific databases (i.e. …”
    Get full text
    Article
  11. 491

    Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods by Ahmet Emre Ergun, Ozgu Can, Murat Kantarcioglu

    Published 2025-01-01
    “…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
    Get full text
    Article
  12. 492

    CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions by Mohammad Badhruddouza Khan, Salwa Tamkin, Jinat Ara, Mobashwer Alam, Hanif Bhuiyan

    Published 2025-02-01
    “…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
    Get full text
    Article
  13. 493

    THE USE OF HUMAN CHIP IMPLANTS FROM THE HADITH PERSPECTIVE by Vira Fharadillah, Muhammad Ghifari, Abil Ash

    Published 2025-07-01
    “…Chip implants are permitted for clear medical purposes that do not cause harm, while their use for non-medical purposes or those that potentially violate privacy and pose risks is prohibited in Islam. …”
    Get full text
    Article
  14. 494

    Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing by Dengzhi Liu, Zhimin Li, Dongbao Jia

    Published 2023-12-01
    “…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
    Get full text
    Article
  15. 495

    Cultural Differences in the Use of Augmented Reality Smart Glasses (ARSGs) Between the U.S. and South Korea: Privacy Concerns and the Technology Acceptance Model by Se Jung Kim, Yoon Esther Lee, T. Makana Chock

    Published 2025-07-01
    “…Korea = 898) perceived usefulness, perceived ease of use, attitude toward using, and behavioral intention to use ARSGs were impacted by privacy concerns. …”
    Get full text
    Article
  16. 496

    Multiple modes of data sharing can facilitate secondary use of sensitive health data for research by Nicki Tiffin, Themba Mutemaringa, Tsaone Tamuhla, Eddie T Lulamba

    Published 2023-10-01
    “…Increasing volumes of highly granular data provide opportunities to leverage the evidence base, with growing recognition that health data are highly sensitive and onward research use may create privacy issues for individuals providing data. …”
    Get full text
    Article
  17. 497

    A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards by Eva Heinrich

    Published 2025-08-01
    “…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
    Get full text
    Article
  18. 498

    A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond by Ahmad Rahdari, Elham Keshavarz, Ehsan Nowroozi, Rahim Taheri, Mehrdad Hajizadeh, Mohammadreza Mohammadi, Sima Sinaei, Thomas Bauschert

    Published 2025-01-01
    “…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
    Get full text
    Article
  19. 499

    Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies by Lisbeth Sinan Lendik

    Published 2023-07-01
    “… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
    Get full text
    Article
  20. 500

    Artificial Intelligence–Enabled Facial Privacy Protection for Ocular Diagnosis: Development and Validation Study by Haizhu Tan, Hongyu Chen, Zhenmao Wang, Mingguang He, Chiyu Wei, Lei Sun, Xueqin Wang, Danli Shi, Chengcheng Huang, Anping Guo

    Published 2025-07-01
    “… Abstract BackgroundFacial biometric data, while valuable for clinical applications, poses substantial privacy and security risks. …”
    Get full text
    Article