Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useddds » \\"usedddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1741
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01“…Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. …”
Get full text
Article -
1742
Knowledge and Attitudes Related to Telemedicine among Nursing Staff at the Selected Tertiary Care Hospital, Karnataka, India
Published 2025-04-01“…Methodology: The cross-sectional study was conducted among 201 staff nurses. The data were collected using a self-structured questionnaire after thorough review of the literature. …”
Get full text
Article -
1743
Machine Learning Threatens 5G Security
Published 2020-01-01“…Scrutinizing the data, on the other hand, opens privacy challenges. …”
Get full text
Article -
1744
The role of cognitive computing in NLP
Published 2025-01-01“…Ethical concerns, including biases in AI, data privacy and societal impact, are critical to address for responsible deployment. …”
Get full text
Article -
1745
Backdoor Attack Against Dataset Distillation in Natural Language Processing
Published 2024-12-01“…We introduce malicious triggers into synthetic data during the distillation phase to execute a backdoor attack on downstream models trained with these data. …”
Get full text
Article -
1746
Maintaining research integrity in the age of GenAI: an analysis of ethical challenges and recommendations to researchers
Published 2025-07-01“…Results The analysis revealed several ethical concerns, including a lack of transparency, bias, censorship, fabrication (e.g. hallucinations and false data generation), copyright violations, and privacy issues. …”
Get full text
Article -
1747
Human rights, vulnerability and artificial intelligence: an analysis in constitutional perspective
Published 2024-12-01“…It also highlights the risk of algorithmic biases in the processing of personal data, highlighting the need to protect the privacy and data of individuals as fundamental elements to ensure an AI that respects human rights. …”
Get full text
Article -
1748
Challenges and opportunities with ChatGPT in oral oncology: The journey ahead
Published 2024-06-01“…However, challenges such as ethical considerations regarding patient privacy, data security, and biases in AI algorithms require careful attention. …”
Get full text
Article -
1749
The Parla-CLARIN Recommendations for Encoding Corpora of Parliamentary Proceedings
Published 2022-04-01“…Parliamentary proceedings are a rich source of data that can be used by scholars in various humanities and social sciences disciplines. …”
Get full text
Article -
1750
AI-Augmented Netnography: Ethical and Methodological Frameworks for Responsible Digital Research
Published 2025-04-01“…Although AI provides improved data processing abilities, it also introduces ethical and methodological concerns about privacy, transparency, authenticity, and possible bias. …”
Get full text
Article -
1751
LEGAL LABYRINTH OF CYBERSPACE – A MAP FOR THE RESPONSIBLE USER
Published 2024-12-01“…On the one hand, the Internet provides unlimited possibilities of freedom, access to the source of all information, but on the other hand it can be perceived as a source of threats to the accepted social order and legal order. Attacks using it are directed, among others, at systems, data and computer programs, user privacy and intellectual property. …”
Get full text
Article -
1752
MOVILIDAD Y TRANSPORTE INTELIGENTE: UNA REVISIÓN DE APLICACIONES Y TECNOLOGÍAS EMERGENTES EN EL CONTEXTO DE UNA CIUDAD INTELIGENTE
Published 2023-07-01“…Furthermore, the article highlights the importance of collectingand analyzing large volumes of data in real time to improve decision-making in intelligent transportation, addressingissues related to data privacy and security in this context, thus, the transformative role of applications and technologiesin transportation, and their proper implementation can contribute to the construction of smarter, more connected andsustainable cities in the future.…”
Get full text
Article -
1753
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01“…It also delves into DLT’s regulatory landscape, addressing compliance, data privacy and governance, while assessing the potential for regulatory clarity and international cooperation. …”
Get full text
Article -
1754
FedDL: personalized federated deep learning for enhanced detection and classification of diabetic retinopathy
Published 2024-12-01“…Our primary goal is to develop a system that can monitor various medical facilities while ensuring privacy during the training of DL models. This is made possible through federated learning (FL), which allows for the sharing of parameters instead of actual data, employing a decentralized training approach. …”
Get full text
Article -
1755
Internet of Things in healthcare: An adaptive ethical framework for IoT in digital health
Published 2024-12-01“…This approach was employed to validate and refine the AEFIDH, ensuring it encapsulates critical ethical dimensions, including data privacy, informed consent, user autonomy, algorithmic fairness, regulatory compliance, ethical design, and equitable access to healthcare services. …”
Get full text
Article -
1756
From motion to meaning: understanding students’ seating preferences in libraries through PIR-enabled machine learning and explainable AI
Published 2025-07-01“…This study presents a comprehensive, data-driven investigation into students’ seating preferences within academic library environments, aiming to inform user-centered spatial design. …”
Get full text
Article -
1757
Secure and Trustworthy Open Radio Access Network (O-RAN) Optimization: A Zero-Trust and Federated Learning Framework for 6G Networks
Published 2025-05-01“…To mitigate these, we design a Zero-Trust Architecture (ZTA) enforcing continuous authentication and micro-segmentation for RIC components, coupled with an FL framework that enables collaborative ML training across operators without exposing raw network data. A differential privacy mechanism is applied to global model updates to prevent inference attacks. …”
Get full text
Article -
1758
Challenges Faced By Female Counselors in Providing HIV Testing and Counseling Services in Kashmir: A Qualitative Interpretive Inquiry
Published 2025-04-01“…One interview with a counselor from Leh was conducted via Zoom. Data were transcribed and analyzed using IPA to identify the key themes. …”
Get full text
Article -
1759
Impact of e-banking service quality on e-loyalty in pandemic times through interplay of e-satisfaction
Published 2020-12-01“…Design/methodology/approach – The data was collected through an adapted questionnaire by using emails and messaging applications. …”
Get full text
Article -
1760
ESMART: Energy-Efficient Slice-Mix-Aggregate for Wireless Sensor Network
Published 2013-12-01“…The proposed scheme performs secure data aggregation in a more efficient way while keeping a good performance of privacy preservation. …”
Get full text
Article