Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useddds » \\"usedddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
-
481
Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability
Published 2024-01-01“…However, traditional donation systems, typically centralized, are prone to issues such as data redundancy, vulnerability to single-point failures, and a deficiency in transparency and traceability. …”
Get full text
Article -
482
A lightweight and secure authentication and privacy protection scheme for internet of medical things
Published 2025-07-01“…However, transmitting sensitive patient data through IoMT devices raises significant security and privacy concerns. …”
Get full text
Article -
483
A robust and personalized privacy-preserving approach for adaptive clustered federated distillation
Published 2025-04-01“…Meta-learning is used in each cluster to enhance the personalization of the local models and the classification accuracy of the non-independent and Identically distributed (non-IID) data distributions. …”
Get full text
Article -
484
The Looming Privacy Challenges Posed by Commercial Satellite Imaging: Remedies and Research Directions
Published 2025-01-01“…While these technologies benefit applications such as natural disaster monitoring and precision agriculture, they also introduce novel privacy risks. This perspective paper provides several contributions: we start by analyzing privacy risks using the LINDDUN privacy framework, categorizing threats like linking, identification, and data disclosure. …”
Get full text
Article -
485
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01“…This architecture entails data privacy and confidentiality, auditability and traceability, and withstanding evolving threats, including potential threats in terms of quantum attacks. …”
Get full text
Article -
486
Self-Disclosure on Professional Social Networking Sites: A Privacy Calculus Perspective
Published 2023-01-01“…A model contextualizing privacy calculus theory combined with the trust factor was developed and evaluated using 661 quantitative data collected through a questionnaire. …”
Get full text
Article -
487
Privacy preserving strategies for electronic health records in the era of large language models
Published 2025-01-01“…Risks can be reduced by using strategies like privacy-preserving locally deployed LLMs, synthetic data generation, differential privacy, and deidentification. …”
Get full text
Article -
488
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01“…The ViT (vision transformer) inference framework, which was widely used in image processing, was found to have a risk of leaking user privacy data. …”
Get full text
Article -
489
Sharing images of children on social media: British motherhood influencers and the privacy paradox.
Published 2025-01-01“…This study examines the extent to which popular British motherhood influencers infringe on their children's privacy by posting images of them online. We conducted a content analysis of 5,253 Instagram posts from ten UK-based influencers, supplemented by self-reported data from these influencers. …”
Get full text
Article -
490
Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey
Published 2024-12-01“…Aim This study presents a cutting-edge survey on privacy issues, security attacks, countermeasures and open problems in FL.Methodology The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used to determine the research domain, establish a search query, and analyze all retrieved articles from the selected scientific databases (i.e. …”
Get full text
Article -
491
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
Published 2025-01-01“…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
Get full text
Article -
492
CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions
Published 2025-02-01“…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
Get full text
Article -
493
THE USE OF HUMAN CHIP IMPLANTS FROM THE HADITH PERSPECTIVE
Published 2025-07-01“…Chip implants are permitted for clear medical purposes that do not cause harm, while their use for non-medical purposes or those that potentially violate privacy and pose risks is prohibited in Islam. …”
Get full text
Article -
494
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
Get full text
Article -
495
Cultural Differences in the Use of Augmented Reality Smart Glasses (ARSGs) Between the U.S. and South Korea: Privacy Concerns and the Technology Acceptance Model
Published 2025-07-01“…Korea = 898) perceived usefulness, perceived ease of use, attitude toward using, and behavioral intention to use ARSGs were impacted by privacy concerns. …”
Get full text
Article -
496
Multiple modes of data sharing can facilitate secondary use of sensitive health data for research
Published 2023-10-01“…Increasing volumes of highly granular data provide opportunities to leverage the evidence base, with growing recognition that health data are highly sensitive and onward research use may create privacy issues for individuals providing data. …”
Get full text
Article -
497
A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards
Published 2025-08-01“…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
Get full text
Article -
498
A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond
Published 2025-01-01“…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
Get full text
Article -
499
Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies
Published 2023-07-01“… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
Get full text
Article -
500
Artificial Intelligence–Enabled Facial Privacy Protection for Ocular Diagnosis: Development and Validation Study
Published 2025-07-01“… Abstract BackgroundFacial biometric data, while valuable for clinical applications, poses substantial privacy and security risks. …”
Get full text
Article