Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\"uses » \"used (Expand Search), \"useds (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
681
Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response
Published 2024-07-01“…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
Get full text
Article -
682
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities
Published 2025-02-01“…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
Get full text
Article -
683
Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective
Published 2025-05-01“…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
Get full text
Article -
684
-
685
Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration
Published 2025-01-01“…Furthermore, the proposed framework includes a federated learning-based scheme that utilizes differential privacy and homomorphic encryption to ensure the privacy and integrity of the data to enhance model interpretability and efficiency with feature ranking to provide insights into attack patterns and anomaly characteristics. …”
Get full text
Article -
686
Privacy-Preserving Glycemic Management in Type 1 Diabetes: Development and Validation of a Multiobjective Federated Reinforcement Learning Framework
Published 2025-07-01“…Furthermore, these approaches typically rely on centralized data processing, which raises privacy concerns due to the sensitive nature of health care data. …”
Get full text
Article -
687
A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans
Published 2025-07-01“…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
Get full text
Article -
688
Multimodal Video Analysis for Crowd Anomaly Detection Using Open Access Tourism Cameras
Published 2024-11-01Get full text
Article -
689
A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment
Published 2025-06-01“…Though sensor-driven devices have largely eased everyday lives, these healthcare systems have been suffering from various security breaches and data privacy problems. This evokes a need for designing intelligent systems to eradicate data breaches and privacy problems. …”
Get full text
Article -
690
Effect of Workshop Training on Nursing Students’ Knowledge and Attitude Regarding Children’s Privacy Protection: A Quasi-experimental Study
Published 2024-09-01“…Data analysis was performed by using descriptive (Mean±SD, frequency, percentage) and inferential statistics (Pearson correlation test and analysis of covariance). …”
Get full text
Article -
691
A Decision Cloud Ranking Approach Based on Privacy and Security in Blockchain E-Health Industry 4.0 Systems
Published 2023-12-01“…Second, the weights of each privacy and security property are calculated using the SFS-FWZIC method. …”
Get full text
Article -
692
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
Published 2024-12-01“…However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). …”
Get full text
Article -
693
-
694
-
695
-
696
Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring
Published 2024-12-01“…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
Get full text
Article -
697
The Impact of Artificial Intelligence on the Future Business World
Published 2024-02-01“…In order to assist businesses better understand their consumers' requirements and preferences, AI is being used to examine customer data and generate insights. …”
Get full text
Article -
698
Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System
Published 2025-06-01“…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
Get full text
Article -
699
FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer
Published 2024-01-01“…After aggregating the model parameters sent by clients, the server performs a second iterative training on the aggregated model using its own metadata, thereby reducing data heterogeneity and improving model performance. …”
Get full text
Article -
700
Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data
Published 2025-07-01“…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
Get full text
Article