Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 581 - 600 results of 2,784 for search '"\"((((\\"useddds OR \"usedddddds) OR \"useddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 581

    Neutrosophic Logic for Secure Hand-Based Biometrics: Quantifying Privacy-Security Tradeoffs in Remote Authentication Systems by A. A. Salama, Abdelnasser Mohamed, Huda E. Khalid, Ahmed K. Essa, Doaa E. Mossa

    Published 2025-07-01
    “…To address this gap, we propose a vulnerability assessment framework grounded in neutrosophic logic [11], which evaluates system robustness through truth (T), indeterminacy (I), and falsity (F) membership functions, and this approach quantifies the trade-offs between security and privacy, revealing that hand-based biometrics achieve 92% security effectiveness (T = 0.8) while retaining an 18% uncertainty factor ( 𝐼 = 0.4 ) concerning potential vulnerabilities, and added analysis further identifies deficiencies in template protection (F = 0.2) and data transmission protocols, and we, proposed framework advances us the evaluation of biometric systems by using integrating neutrosophic uncertainty modeling, and it provides actionable insights for designing secure remote authentication architectures. …”
    Get full text
    Article
  2. 582

    A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network by Jin Wang, Hao Wu, Yudian Liu

    Published 2015-10-01
    “…While obtaining convenient services, the exploitation of mass location data is inevitably leading to a serious concern about location privacy security. …”
    Get full text
    Article
  3. 583
  4. 584
  5. 585
  6. 586

    Dynamic selectout and voting-based federated learning for enhanced medical image analysis by Saeed Iqbal, Adnan N Qureshi, Musaed Alhussein, Khursheed Aurangzeb, Atif Mahmood, Saaidal Razalli Bin Azzuhri

    Published 2025-01-01
    “…This strategy has a lot of potential to improve FL across a range of applications, especially those that prioritize data privacy, diversity, and performance.…”
    Get full text
    Article
  7. 587

    Vehicle Trajectory Generation Based on Generation Adversarial Network by Zhonghe He, Renchi Shao, Sijia Xiang

    Published 2024-06-01
    “…In this paper, the vehicle travel time of sample trajectory data and virtual trajectory data is used as indicators for statistical analysis. …”
    Get full text
    Article
  8. 588
  9. 589

    Hybrid Optimization Machine Learning Framework for Enhancing Trust and Security in Cloud Network by Himani Saini, Gopal Singh, Amrinder Kaur, Sunil Saini, Niyaz Ahmad Wani, Vikram Chopra, Zahid Akhtar, Shahid Ahmad Bhat

    Published 2024-01-01
    “…The rapidly evolving field of cloud-based data sharing faces critical challenges in ensuring comprehensive privacy protection and trust for both data producers and seekers. …”
    Get full text
    Article
  10. 590

    Federated Mental Wellbeing Assessment Using Smartphone Sensors Under Unreliable Participation by Gavryel Martis, Ryan McConville

    Published 2025-01-01
    “…The findings suggested that given the widespread use of such devices, FL holds great potential in mood and depression detection while protecting data privacy. …”
    Get full text
    Article
  11. 591
  12. 592

    Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach by Vankamamidi S. Naresh, Sivaranjani Reddi

    Published 2025-02-01
    “…Abstract Homomorphic Encryption (HE) offers a revolutionary cryptographic approach to safeguarding privacy in machine learning (ML), especially in processing sensitive healthcare data. …”
    Get full text
    Article
  13. 593
  14. 594

    Cross-Company Data Sharing Using Distributed Analytics by Soo-Yon Kim, Stefanie Berninger, Max Kocher, Martin Perau, Sandra Geisler

    Published 2025-05-01
    “…Furthermore, we find that the framework supports integration of data quality assessment and privacy preservation mechanisms. …”
    Get full text
    Article
  15. 595
  16. 596

    Identification of hazardous road locations using ambulance data by Anne Vingaard Olesen, Tim Alex Lindskou, Rasmus Øhlenschlæger, Torben Anders Kløjgaard, Anders Brogaard Tallaksen, Jens Lauritsen, Erika Frischknecht Christensen, Harry Lahrmann

    Published 2025-03-01
    “…Results: Compared to police data in the same study period, we found 3.2 times as many unique crash sites through the use of combined hospital patient and ambulance data. …”
    Get full text
    Article
  17. 597

    Security and privacy in online teaching during the COVID-19 pandemic: experiences and concerns of academics in Saudi higher education by Basmah Almekhled, Helen Petrie

    Published 2024-11-01
    “…The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. …”
    Get full text
    Article
  18. 598

    Old MacDonald and His Hackable Smartphone Application: A Security and Privacy Analysis of Android Agriculture Applications by Logan Mears, Rachel Donner, George Grispos

    Published 2025-01-01
    “…Despite the widespread use of smartphones among farmers increasing from 77% in 2021 to 82% in 2023, minimal research has examined the security and privacy implications of agricultural smartphone applications, potentially used on these devices. …”
    Get full text
    Article
  19. 599

    Collaborative and privacy-preserving cross-vendor united diagnostic imaging via server-rotating federated machine learning by Hao Wang, Xiaoyu Zhang, Xuebin Ren, Zheng Zhang, Shusen Yang, Chunfeng Lian, Jianhua Ma, Dong Zeng

    Published 2025-08-01
    “…Abstract Federated Learning (FL) is a distributed framework that enables collaborative training of a server model across medical data vendors while preserving data privacy. However, conventional FL faces two key challenges: substantial data heterogeneity among vendors and limited flexibility from a fixed server, leading to suboptimal performance in diagnostic-imaging tasks. …”
    Get full text
    Article
  20. 600

    Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR) System by G. Nouskalis

    Published 2011-01-01
    “…The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. …”
    Get full text
    Article