Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
781
Ethical and regulatory challenges in machine learning-based healthcare systems: A review of implementation barriers and future directions
Published 2025-03-01“…Key issues concern patient data privacy, algorithmic bias, absence of transparency, and ambiguous legal liability. …”
Get full text
Article -
782
Synthetic data production for biomedical research
Published 2025-04-01“…Synthetic data, generated using advanced artificial intelligence (AI) techniques, replicates the statistical properties of real-world datasets while excluding identifiable information. …”
Get full text
Article -
783
Establishing and evaluating trustworthy AI: overview and research challenges
Published 2024-11-01Get full text
Article -
784
HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers
Published 2025-04-01“…Although, fully homomorphic encryption (FHE)-based methods have been proposed to maintain data confidentiality and privacy, however, existing FHE deep convolutional neural network (CNN) models still face some issues such as low accuracy, high encryption/decryption latency, energy inefficiency, long feature extraction times, and significant cipher-image expansion. …”
Get full text
Article -
785
Precision Oncology Program (POP), an observational study using real-world data and imaging mass cytometry to explore decision support for the Molecular Tumor Board: study protocol
Published 2025-03-01“…In this case, a signed general consent form must be available. Data privacy is ensured by unique patient numbers for pseudo-anonymised data. …”
Get full text
Article -
786
A secure and efficient user selection scheme in vehicular crowdsensing
Published 2025-05-01“…In addition, a prediction model based on principal component analysis-enhanced long short-term memory (PCA-Enhanced LSTM) model is constructed by combining the advantages of principal component analysis (PCA) and long short-term memory (LSTM) network. The model uses PCA for data dimensionality reduction to eliminate redundant information and then employs LSTM to process time series data, capture long-term dependencies for more accurate user credit prediction, screen high-quality users, and improve perceived data quality. …”
Get full text
Article -
787
Neuroethical issues in adopting brain imaging for personalized chronic pain management: Attitudes of people with lived experience of chronic pain
Published 2024-05-01“…However, they worried that brain scans could be used to dismiss their pain self-report. Most respondents felt there were policies to protect their brain data, but 40% were concerned about privacy and brain scan use against them by their employers/insurers. …”
Get full text
Article -
788
Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks
Published 2025-04-01“…This prevalence poses challenges for secure image forwarding, as it is susceptible to privacy leaks when sharing data. While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. …”
Get full text
Article -
789
Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic
Published 2022-01-01“…The positive aspects of this kind of communication are undoubtedly obvious and necessary, but they also created new forms of victimization due to insecure protocols for sending e-mails, inadequate level of privacy protection, insufficient information security, the existence of so-called security holes and the use of the same devices and digital services for professional and private purposes. …”
Get full text
Article -
790
A technological and legal investigation into how smart states deploy collective intelligence for security and surveillance purposes
Published 2025-03-01“…The article debates the relation between data protection and public and national security in democratic states and shows how the evolving threat landscape influences both the practice and the legislative process around personal data protection and deployment of emerging technologies and use of collective intelligence for security purposes. …”
Get full text
Article -
791
Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing
Published 2024-01-01“…However, in the Industrial Internet of Things (IIoT), the sharing of data has bandwidth, computational, and privacy issues. …”
Get full text
Article -
792
Decades in the Making: The Evolution of Digital Health Research Infrastructure Through Synthetic Data, Common Data Models, and Federated Learning
Published 2024-12-01“…The same way that drug trials require infrastructure to support their conduct, digital health also necessitates new and disruptive research data infrastructure. Novel methods such as common data models, federated learning, and synthetic data generation are emerging to enhance the utility of research using RWD, which are often siloed across health systems. …”
Get full text
Article -
793
Normative framework for the protection against genetic discrimination in Serbia
Published 2015-01-01“…The analysis has shown that the rules on protection of the genetic data and the use of genetic samples, which are crucially important for prevention of genetic discrimination, have not been harmonized with contemporary ethical and legal standards. …”
Get full text
Article -
794
Covert surveillance of communications: Compliance with the practice of the European court of human rights
Published 2014-01-01Get full text
Article -
795
BANK INDONESIA’S ROLE IN MITIGATING ISSUES OF MONETARY ECONOMIC SOVEREIGNTY AND HUMAN RIGHTS
Published 2024-09-01Get full text
Article -
796
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01“…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
Get full text
Article -
797
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01“…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
Get full text
Article -
798
WiFi-Based Location Tracking: A Still Open Door on Laptops
Published 2025-01-01“…Location privacy is a major concern in the current digital society, due to the sensitive information that can be inferred from location data. …”
Get full text
Article -
799
KAB: A new k-anonymity approach based on black hole algorithm
Published 2022-07-01“…K-anonymity is the most widely used approach to privacy preserving microdata which is mainly based on generalization. …”
Get full text
Article -
800
Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme
Published 2025-05-01“…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. …”
Get full text
Article