Showing 601 - 620 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.24s Refine Results
  1. 601

    Time‐specific encrypted range query with minimum leakage disclosure by Ozgur Oksuz

    Published 2021-01-01
    “…Abstract A time‐specific encrypted range query scheme that has the following properties is proposed. (1) The proposed scheme has trapdoor privacy and data privacy so that a semi‐honest cloud is not able to get any useful information from given ciphertexts and given tokens that are used for searching ranges. (2) Unlike most of the other studies which report that the cloud server stores single encrypted keyword/element in the database, in our solution, the cloud server stores encrypted multi‐keywords/ranges in the database. …”
    Get full text
    Article
  2. 602

    A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms by Amal Albilali, Maysoon Abulkhair, Manal Bayousef, Faisal Albalwy

    Published 2024-01-01
    “…This innovative model combines the strengths of centralized efficiency and decentralized privacy, and introduces a unique mechanism that significantly enhances privacy protection and ensures data integrity. …”
    Get full text
    Article
  3. 603

    Can human rights law bend mass surveillance? by Rikke Frank Joergensen

    Published 2014-02-01
    “…This paper provides a brief introduction to PRISM, continues with an outline of the right to privacy as stipulated in the International Covenant on Civil and Political Rights (ICCPR), the European Convention on Human Rights and the EU Directive on Data Protection, and moves on to discuss whether international human rights law may be used to bend mass surveillance.…”
    Get full text
    Article
  4. 604

    A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis by Eman Shalabi, Walid Khedr, Ehab Rushdy, Ahmad Salah

    Published 2025-03-01
    “…Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training. While FL offers privacy benefits through local training, privacy-preserving strategies are needed since model updates can leak training data information due to various attacks. …”
    Get full text
    Article
  5. 605

    Differential Private POI Queries via Johnson-Lindenstrauss Transform by Mengmeng Yang, Tianqing Zhu, Bo Liu, Yang Xiang, Wanlei Zhou

    Published 2018-01-01
    “…In addition, the proposed perturbation method based on the Johnson Lindenstrauss transform satisfies the differential privacy. Two popular point of interest queries, <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>-NN and Range, are used to evaluate the method on two real-world data sets. …”
    Get full text
    Article
  6. 606

    A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain by Lakshman Kannan Venugopal, Rajappan Rajaganapathi, Abhishek Birjepatil, Sundararajan Edwin Raja, Gnanasaravanan Subramaniam

    Published 2023-12-01
    “…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
    Get full text
    Article
  7. 607

    A federated LSTM network for load forecasting using multi-source data with homomorphic encryption by Mengdi Wang, Rui Xin, Mingrui Xia, Zhifeng Zuo, Yinyin Ge, Pengfei Zhang, Hongxing Ye

    Published 2025-03-01
    “…These challenges drive the adoption of federated learning (FL) to address issues related to data silos and privacy. In this paper, a novel framework for short-term load forecasting was proposed using historical data from industries such as power, meteorology, and finance. …”
    Get full text
    Article
  8. 608
  9. 609

    Behavioural Economics and Consumer Decision-Making in the Age of Artificial Intelligence (AI), Data Science, Business Analytics, and Internet of Things (IoT) by Yuki Haruto Yamamoto

    Published 2024-05-01
    “…However, while AI and IoT facilitate more efficient and engaging consumer experiences, they introduce complex ethical and practical concerns, particularly around data privacy, algorithmic fairness, and maintenance of consumer trust. …”
    Get full text
    Article
  10. 610

    Predictive Model to Analyse Real and Synthetic Data for Learners' Performance Prediction Using Regression Techniques by SHABNAM ARA S.J, Tanuja R, Manjula S.H

    Published 2025-03-01
    “…Real-world data availability is often hampered by privacy concerns, prompting a shift towards synthetic data generation. …”
    Get full text
    Article
  11. 611

    A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology by Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed

    Published 2023-12-01
    “… Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. …”
    Get full text
    Article
  12. 612

    Secure healthcare data sharing and attack detection framework using radial basis neural network by Abhishek Kumar, Priya Batta, Pramod Singh Rathore, Sachin Ahuja

    Published 2025-05-01
    “…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
    Get full text
    Article
  13. 613
  14. 614

    Respiratory Rate Estimation from Thermal Video Data Using Spatio-Temporal Deep Learning by Mohsen Mozafari, Andrew J. Law, Rafik A. Goubran, James R. Green

    Published 2024-10-01
    “…Thermal videos provide a privacy-preserving yet information-rich data source for remote health monitoring, especially for respiration rate (RR) estimation. …”
    Get full text
    Article
  15. 615
  16. 616

    Comments on &#x201C;Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities&#x201D;&#x2014;Privacy-Preserving Certificate in V2X Communic... by Abel C. H. Chen

    Published 2025-01-01
    “…The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. …”
    Get full text
    Article
  17. 617

    Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring by Eugenia Tîrziu, Ana-Mihaela Vasilevschi, Adriana Alexandru, Eleonora Tudora

    Published 2024-12-01
    “…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
    Get full text
    Article
  18. 618

    Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV by Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu

    Published 2022-11-01
    “…Aiming at solving the challenges of the Internet of Vehicles (IoV), such as privacy sensitive data exposing, data being vulnerable to unauthorized access and tampered with and the single point of failure of the cloud server, this paper introduces a blockchain-enabled data access method based on attribute-based encryption. …”
    Get full text
    Article
  19. 619

    A flexible privacy-preservation approach for IoT-driven smart Hospital employing diverse distribution methods by Irin Loretta G., Settu Ashwini, Prameela M., Naga Malleswara Rao D.S., Kalaiyarasi M., Saravanan S.

    Published 2025-01-01
    “…DP Smart Hospital uses Laplace or exponential distributions in differential privacy strategies to protect sensitive data generated by IoT devices. …”
    Get full text
    Article
  20. 620

    Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing by Nithin Melala Eshwarappa, Hojjat Baghban, Ching-Hsien Hsu, Po-Yen Hsu, Ren-Hung Hwang, Mu-Yen Chen

    Published 2025-08-01
    “…However, the centralized learning (CL) method is problematic in terms of data privacy because of the constraint of transferring substantial volumes of data to a central server. …”
    Get full text
    Article