Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useddds » \\"usedddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useddds » \\"usedddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\\"use » \\"used (Expand Search)
-
521
A privacy budget adaptive optimization scheme for federated computing power Internet of things
Published 2024-12-01“…Furthermore, by assessing the similarity between the local model and the aggregated model, as well as their respective privacy budget proportions, the global contribution of each node was determined, which was used to fairly, also in real time, optimize and adjust the privacy budget settings in conjunction with the estimated privacy budget. …”
Get full text
Article -
522
Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing
Published 2025-01-01“…This paper introduces a Federated Learning Trust Model (FLTM) to assess trustworthiness across 2000 resources while preserving data privacy. FLTM incorporates six critical metrics: Availability, Reliability, Data Integrity, Identity, Computational Capability, and Throughput. …”
Get full text
Article -
523
-
524
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…Deep learning and fully homomorphic encryption (FHE) are integrated for privacy-preserving fingerprint recognition. Convolutional neural network (CNN) extract fingerprint features encrypted using the Cheon-Kim-Kim-Song (CKKS) FHE scheme. …”
Get full text
Article -
525
Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
Published 2024-08-01“…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
Get full text
Article -
526
-
527
Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation
Published 2025-03-01“…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
Get full text
Article -
528
Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission
Published 2025-01-01“…Furthermore, useful insights on the privacy-utility trade-off are also provided.…”
Get full text
Article -
529
Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub
Published 2025-08-01“…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
Get full text
Article -
530
Human Daily Indoor Action (HDIA) Dataset: Privacy-Preserving Human Action Recognition Using Infrared Camera and Wearable Armband Sensors
Published 2025-01-01“…The use of IR sensors enhances privacy, making the dataset ethically suitable for long-term monitoring. …”
Get full text
Article -
531
Optimizing Customer Data Security in Water Meter Data Management Based on RESTful API and Data Encryption Using AES-256 Algorithm
Published 2025-06-01“…To increase the security of customer data, a cryptographic algorithm is used, namely the Advanced Encryption Standard (AES) algorithm with a 256-bit key length to secure data that is considered sensitive and contains high privacy. …”
Get full text
Article -
532
STF-LPPVA: Local Privacy-Preserving Method for Vehicle Assignment Based on Spatial–Temporal Fusion
Published 2025-01-01“…There are user privacy risks in cloud-based vehicle dispatch platforms due to the unauthorized collection, use, and dissemination of data. …”
Get full text
Article -
533
Recent Advances in Federated Learning for Connected Autonomous Vehicles: Addressing Privacy, Performance, and Scalability Challenges
Published 2025-01-01“…FL presents a decentralized infrastructure that allows collaborative learning, while also ensuring data privacy, as CAVs increasingly rely on machine learning to process large amounts of sensor data. …”
Get full text
Article -
534
-
535
Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks
Published 2019-07-01“…The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. To protect node data privacy, Shamir’s secret sharing technology is used to prevent internal attackers from stealing the sensitive data of the surrounding nodes. …”
Get full text
Article -
536
Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT)
Published 2023-01-01“…Federated learning is a distributed data analysis approach used in many IoT applications, including IoMT, due to its ability to provide acceptable accuracy and privacy. …”
Get full text
Article -
537
A Collaborative Framework for Privacy Preserving Fuzzy Co-Clustering of Vertically Distributed Cooccurrence Matrices
Published 2015-01-01“…In many real world data analysis tasks, it is expected that we can get much more useful knowledge by utilizing multiple databases stored in different organizations, such as cooperation groups, state organs, and allied countries. …”
Get full text
Article -
538
Privacy-enhanced skin disease classification: integrating federated learning in an IoT-enabled edge computing
Published 2025-04-01“…Most existing automated detection/classification approaches that utilize machine learning or deep learning poses privacy issues, as they involve centralized computing and require local storage for data training.MethodsKeeping the privacy of sensitive patient data as a primary objective, in addition to ensuring accuracy and efficiency, this paper presents an algorithm that integrates Federated learning techniques into an IoT-based edge-computing environment. …”
Get full text
Article -
539
Enhancing Privacy in IoT-Enabled Digital Infrastructure: Evaluating Federated Learning for Intrusion and Fraud Detection
Published 2025-05-01“…These methods work with data locality during training at local clients without exposing data, while maintaining global convergence to enhance the privacy of local models within the framework. …”
Get full text
Article -
540
Shielding Communication Privacy: Unveiling The Strategic Utilization Of Instagram’s Second Account Feature By Millennial Generation
Published 2023-07-01“…Even though the person who is selected to enter the second account circle is also vulnerable to opening the data privacy of the account owner and even spreading it. …”
Get full text
Article