Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useddds » \\"usedddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
-
601
PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare
Published 2025-04-01“…PLASMA’s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. …”
Get full text
Article -
602
Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging
Published 2025-01-01“…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
Get full text
Article -
603
Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies
Published 2025-01-01“…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
Get full text
Article -
604
Do Cookie Banners Respect My Browsing Privacy? Measuring the Effectiveness of Cookie Rejection for Limiting Behavioral Advertising
Published 2024-01-01“…Online behavioral advertising (OBA) is a method within digital advertising that exploits web users’ interests to tailor ads. Its use has raised privacy concerns among researchers, regulators, and the media, emphasizing the need for a reliable mechanism to measure its prevalence. …”
Get full text
Article -
605
Investigating the Relationship between Social Skills and Social Acceptance with Academic Performance, Considering the Mediating Role of Ethical Privacy
Published 2025-05-01“…Four standard questionnaires of social skills, social acceptance, respect for moral privacy, and academic performance were used for gathering data. …”
Get full text
Article -
606
Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things.
Published 2024-01-01“…Researching the privacy protection method of public service advertising visual design is of great significance to protecting the privacy data security of public service advertising visual designers and the personal privacy of other citizens. …”
Get full text
Article -
607
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks
Published 2025-02-01“…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
Get full text
Article -
608
Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities
Published 2025-06-01“…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
Get full text
Article -
609
Optimizing malicious website prediction: An advanced XGBoost-based machine learning model
Published 2025-05-01Get full text
Article -
610
Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis
Published 2024-12-01“…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
Get full text
Article -
611
Federated Learning for Surface Roughness
Published 2025-06-01“…This study proposes a federated learning-based real-time surface roughness prediction framework for WEDM to address issues of empirical parameter tuning and data privacy. By sharing only the model parameters, cross-machine training was enabled without exposing raw data. …”
Get full text
Article -
612
A Qualitative Study of Researchers Perspective on the Use and Risks of Open Government Data
Published 2025-06-01“…This study aims to review the potential risks of data openness on government data portals from the perspective of researchers as one of the important actors who use data. …”
Get full text
Article -
613
-
614
THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS
Published 2023-04-01“…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
Get full text
Article -
615
Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice
Published 2025-06-01“…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
Get full text
Article -
616
A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption
Published 2025-01-01“…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
Get full text
Article -
617
QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles
Published 2019-07-01“…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
Get full text
Article -
618
Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions
Published 2025-01-01“…After that, these local models are aggregated towards a common, global model using secure aggregation methods, which makes sure that there is nozza of data privacy and hence, in the process making sure that more accurate models can be obtained due to diversified data sets. …”
Get full text
Article -
619
Anomaly detection in encrypted network traffic using self-supervised learning
Published 2025-07-01“…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
Get full text
Article -
620
Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response
Published 2024-07-01“…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
Get full text
Article