Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 701 - 720 results of 2,784 for search '"\"((((\\"useddds OR \"useddddds) OR \"useddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 701

    A data flow process for confidential data and its application in a health research project. by Samantha S R Crossfield, Kieran Zucker, Paul Baxter, Penny Wright, Jon Fistein, Alex F Markham, Mark Birkin, Adam W Glaser, Geoff Hall

    Published 2022-01-01
    “…However, using healthcare data for secondary purposes raises legal and ethical concerns relating to confidentiality, privacy and data protection rights. …”
    Get full text
    Article
  2. 702

    EXPLORING USER PERSPECTIVES ON THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN FINANCIAL TECHNOLOGY by Sadhana Tiwari, Mohammad Asif, Amar Johri, Mohammad Wasiq, Mohd Imran

    Published 2024-12-01
    “…Structural equation modeling was employed to study the relationships between the adoption of fintech AI and its predictors, namely Perceived Usefulness, Perceived Privacy and Security, Perceived Ease of Use, and Satisfaction of Fintech AI. …”
    Get full text
    Article
  3. 703

    Rich Data Versus Quantity of Data in Code Generation AI: A Paradigm Shift for Healthcare by Muthu Ramachandran, Steven Fouracre

    Published 2025-06-01
    “…Using Self-Evolving Software (SES) as a case study, the research contrasts outcomes from both paradigms and proposes a weighted matrix for data selection in Code Gen AI systems. …”
    Get full text
    Article
  4. 704
  5. 705
  6. 706

    A Signature-Based Data Security Technique for Energy-Efficient Data Aggregation in Wireless Sensor Networks by Min Yoon, Miyoung Jang, Hyeong-Il Kim, Jae-Woo Chang

    Published 2014-01-01
    “…To support privacy-preserving data aggregation and integrity checking, our technique makes use of the additive property of complex numbers. …”
    Get full text
    Article
  7. 707

    A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain by Lakshman Kannan Venugopal, Rajappan Rajaganapathi, Abhishek Birjepatil, Sundararajan Edwin Raja, Gnanasaravanan Subramaniam

    Published 2023-12-01
    “…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
    Get full text
    Article
  8. 708

    A federated LSTM network for load forecasting using multi-source data with homomorphic encryption by Mengdi Wang, Rui Xin, Mingrui Xia, Zhifeng Zuo, Yinyin Ge, Pengfei Zhang, Hongxing Ye

    Published 2025-03-01
    “…These challenges drive the adoption of federated learning (FL) to address issues related to data silos and privacy. In this paper, a novel framework for short-term load forecasting was proposed using historical data from industries such as power, meteorology, and finance. …”
    Get full text
    Article
  9. 709
  10. 710

    GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence by Mohd Anjum, Ashit Kumar Dutta, Ali Elrashidi, Sana Shahab, Asma Aldrees, Zaffar Ahmed Shaikh, Abeer Aljohani

    Published 2025-08-01
    “…Federated learning is incorporated to maintain data privacy by training models locally on each device without sharing raw data. …”
    Get full text
    Article
  11. 711

    Investigating Sensitive Issues in Class Through Randomized Response Polling by Christian Genest, James A. Hanley, Sahir R. Bhatnagar

    Published 2024-10-01
    “…This article provides an introduction to randomized response polling, a technique which was designed to allow for questioning on sensitive issues while protecting the respondent’s privacy and avoiding social desirability bias. It is described in terms that are suitable for presentation and use in any classroom environment. …”
    Get full text
    Article
  12. 712

    Predictive Model to Analyse Real and Synthetic Data for Learners' Performance Prediction Using Regression Techniques by SHABNAM ARA S.J, Tanuja R, Manjula S.H

    Published 2025-03-01
    “…Real-world data availability is often hampered by privacy concerns, prompting a shift towards synthetic data generation. …”
    Get full text
    Article
  13. 713
  14. 714
  15. 715

    A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology by Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed

    Published 2023-12-01
    “… Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. …”
    Get full text
    Article
  16. 716

    Secure healthcare data sharing and attack detection framework using radial basis neural network by Abhishek Kumar, Priya Batta, Pramod Singh Rathore, Sachin Ahuja

    Published 2025-05-01
    “…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
    Get full text
    Article
  17. 717
  18. 718

    Respiratory Rate Estimation from Thermal Video Data Using Spatio-Temporal Deep Learning by Mohsen Mozafari, Andrew J. Law, Rafik A. Goubran, James R. Green

    Published 2024-10-01
    “…Thermal videos provide a privacy-preserving yet information-rich data source for remote health monitoring, especially for respiration rate (RR) estimation. …”
    Get full text
    Article
  19. 719

    ‘Over Time Everyone’s Gonna Be Open to It’: User Attitudes Toward Security and Privacy in Continuous Authentication for Smart Homes by Heting Wang, Yu-Peng Chen, Dinank Bista, Rodrigo Calvo, Niriksha Regmi, Xuanpu Zhang, Tempestt Neal, Jaime Ruiz, Lisa Anthony

    Published 2025-01-01
    “…Participants also envisioned CA systems that offer more granular permission controls over personal data. Our findings indicate the contextual dependencies in balancing usability with privacy and security concerns. …”
    Get full text
    Article
  20. 720

    Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring by Eugenia Tîrziu, Ana-Mihaela Vasilevschi, Adriana Alexandru, Eleonora Tudora

    Published 2024-12-01
    “…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
    Get full text
    Article