Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedddds » \\"useddddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
421
-
422
UniFL: Accelerating Federated Learning Using Heterogeneous Hardware Under a Unified Framework
Published 2024-01-01Get full text
Article -
423
THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS
Published 2023-04-01“…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
Get full text
Article -
424
A Qualitative Study of Researchers Perspective on the Use and Risks of Open Government Data
Published 2025-06-01“…This study aims to review the potential risks of data openness on government data portals from the perspective of researchers as one of the important actors who use data. …”
Get full text
Article -
425
Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems
Published 2024-10-01“…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
Get full text
Article -
426
Human Behavior Analysis Using Radar Data: A Survey
Published 2024-01-01“…In this study, we focus not only on the analysis of human behavior using radar but also on video observations. We review methods of human activity recognition using LiDAR. …”
Get full text
Article -
427
Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice
Published 2025-06-01“…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
Get full text
Article -
428
-
429
A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption
Published 2025-01-01“…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
Get full text
Article -
430
Anomaly detection in encrypted network traffic using self-supervised learning
Published 2025-07-01“…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
Get full text
Article -
431
-
432
-
433
-
434
Legal grounds for police officers' body-worn cameras
Published 2025-01-01“…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
Get full text
Article -
435
-
436
Social Implications of Technological Advancements in Sentiment Analysis: A Literature Review on Potential and Consequences over the Next 20 Years
Published 2025-02-01“…It enables more responsive policy design by understanding public emotions in political and social contexts. However, data privacy, misinformation, and diminished critical thinking persist. …”
Get full text
Article -
437
Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection
Published 2025-01-01“…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
Get full text
Article -
438
COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App
Published 2021-12-01“…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
Get full text
Article -
439
Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population
Published 2023-03-01“…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
Get full text
Article -
440