Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedddds » \\"useddddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedddds » \\"useddddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
621
Human Behavior Analysis Using Radar Data: A Survey
Published 2024-01-01“…Transfer learning addresses issues related to data scarcity, while data fusion models integrate information from multiple sources. …”
Get full text
Article -
622
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities
Published 2025-02-01“…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
Get full text
Article -
623
Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective
Published 2025-05-01“…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
Get full text
Article -
624
-
625
Aerial pathways to resilience: the acceptance of drones in logistics transformation
Published 2025-05-01“…This study examines the determinants of consumer acceptance of drone delivery services, focusing on the roles of perceived usefulness, ease of use, and privacy concerns. We collected data from 1,108 Portuguese consumers through an online survey to assess how these factors influence consumer attitudes and intentions toward adopting drone delivery services. …”
Get full text
Article -
626
Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration
Published 2025-01-01“…Furthermore, the proposed framework includes a federated learning-based scheme that utilizes differential privacy and homomorphic encryption to ensure the privacy and integrity of the data to enhance model interpretability and efficiency with feature ranking to provide insights into attack patterns and anomaly characteristics. …”
Get full text
Article -
627
Privacy-Preserving Glycemic Management in Type 1 Diabetes: Development and Validation of a Multiobjective Federated Reinforcement Learning Framework
Published 2025-07-01“…Furthermore, these approaches typically rely on centralized data processing, which raises privacy concerns due to the sensitive nature of health care data. …”
Get full text
Article -
628
NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols
Published 2021-01-01“…Numerous techniques are available to address privacy infringement, including Private Information Retrieval (PIR) protocols that use peer nodes to preserve privacy. …”
Get full text
Article -
629
A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans
Published 2025-07-01“…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
Get full text
Article -
630
A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment
Published 2025-06-01“…Though sensor-driven devices have largely eased everyday lives, these healthcare systems have been suffering from various security breaches and data privacy problems. This evokes a need for designing intelligent systems to eradicate data breaches and privacy problems. …”
Get full text
Article -
631
Effect of Workshop Training on Nursing Students’ Knowledge and Attitude Regarding Children’s Privacy Protection: A Quasi-experimental Study
Published 2024-09-01“…Data analysis was performed by using descriptive (Mean±SD, frequency, percentage) and inferential statistics (Pearson correlation test and analysis of covariance). …”
Get full text
Article -
632
A Decision Cloud Ranking Approach Based on Privacy and Security in Blockchain E-Health Industry 4.0 Systems
Published 2023-12-01“…Second, the weights of each privacy and security property are calculated using the SFS-FWZIC method. …”
Get full text
Article -
633
How Social Scene Characteristics Affect Customers’ Purchase Intention: The Role of Trust and Privacy Concerns in Live Streaming Commerce
Published 2025-04-01“…The research employs Structural Equation Modeling (SEM) to test the hypothesis using data from 504 valid responses. (3) The results demonstrate that the characteristics of social scenes proposed in this study enhance consumer trust and positively impact purchase intention. …”
Get full text
Article -
634
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
Published 2024-12-01“…However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). …”
Get full text
Article -
635
Community views on the secondary use of general practice data: Findings from a mixed‐methods study
Published 2024-02-01“…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
Get full text
Article -
636
-
637
Tabular Data Augmentation Using Artificial Intelligence: A Systematic Review and Taxonomic Framework
Published 2025-01-01Get full text
Article -
638
-
639
The Impact of Artificial Intelligence on the Future Business World
Published 2024-02-01“…In order to assist businesses better understand their consumers' requirements and preferences, AI is being used to examine customer data and generate insights. …”
Get full text
Article -
640
AdaBoost algorithm based on target perturbation
Published 2023-02-01“…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
Get full text
Article