Showing 661 - 680 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.16s Refine Results
  1. 661

    Do Cookie Banners Respect My Browsing Privacy? Measuring the Effectiveness of Cookie Rejection for Limiting Behavioral Advertising by Mateo Ormeno, Ha Dao, Valeria Herskovic, Kensuke Fukuda

    Published 2024-01-01
    “…Online behavioral advertising (OBA) is a method within digital advertising that exploits web users’ interests to tailor ads. Its use has raised privacy concerns among researchers, regulators, and the media, emphasizing the need for a reliable mechanism to measure its prevalence. …”
    Get full text
    Article
  2. 662

    Collaborative and privacy-preserving cross-vendor united diagnostic imaging via server-rotating federated machine learning by Hao Wang, Xiaoyu Zhang, Xuebin Ren, Zheng Zhang, Shusen Yang, Chunfeng Lian, Jianhua Ma, Dong Zeng

    Published 2025-08-01
    “…Additionally, the communication protocol of SRFLM provides strong privacy guarantees using differential privacy. We extensively evaluate SRFLM across multiple cross-vendor diagnostic imaging tasks. …”
    Get full text
    Article
  3. 663

    PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare by Hegde Manjunath, M. Karthik, Hegde Varun, Rao Rohini R., Mantoor Vinayak M., Bhat Radhakrishna

    Published 2025-04-01
    “…PLASMA’s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. …”
    Get full text
    Article
  4. 664

    Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging by Hadi Mahdipour, Jaime Laviada, Fernando Las-Heras Andres, Mehdi Sookhak

    Published 2025-01-01
    “…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
    Get full text
    Article
  5. 665

    Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption by Filip Jerkovic, Nurul I. Sarkar, Jahan Ali

    Published 2025-06-01
    “…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
    Get full text
    Article
  6. 666

    Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things. by Xujun Tang

    Published 2024-01-01
    “…The digital watermark privacy protection method and the public service advertising work push privacy protection method are used to provide an innovative solution for public service advertising privacy protection. …”
    Get full text
    Article
  7. 667

    Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies by Kumar Rahul, Shieh Chin-Shiuh, Chakrabarti Prasun, Kumar Ashok, Moolchandani Jhankar, Sinha Raj

    Published 2025-01-01
    “…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
    Get full text
    Article
  8. 668

    Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks by Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei, Riad Alharbey

    Published 2025-02-01
    “…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
    Get full text
    Article
  9. 669

    Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities by Ahma Greta, Kadriu Arbana

    Published 2025-06-01
    “…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
    Get full text
    Article
  10. 670
  11. 671

    Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis by Madhura K., Niyaz Panakaje, S. M. Riha Parvin, Shakira Irfana, Mural Henrita Cutinha, Yatheen A, Rovina Sharon Soans

    Published 2024-12-01
    “…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
    Get full text
    Article
  12. 672

    Federated Learning for Surface Roughness by Kai-Lun Cheng, Yu-Hung Ting, Wen-Ren Jong, Shia-Chung Chen, Zhe-Wei Zhou

    Published 2025-06-01
    “…A custom data acquisition system collected discharge current and spindle current signals, which were solely used as input features to train the deep learning model. …”
    Get full text
    Article
  13. 673

    Self-monitoring of health - user viewpoints on gathering data using consumer health technologies during leisure time by Nora Weinberger, Martina F. Baumann, Maria Maia

    Published 2025-06-01
    “…It focuses on attitudes toward health data collection, data sharing, privacy concerns, and the use of EEG-supported devices.ResultsFindings reveal a complex landscape of trust and concern. …”
    Get full text
    Article
  14. 674

    Using big data analytics to improve HIV medical care utilisation in South Carolina: A study protocol by Mohammad Rifat Haider, Bankole Olatosi, Jiajia Zhang, Sharon Weissman, Jianjun Hu, Xiaoming Li

    Published 2019-07-01
    “…The RFA is authorised to collect and merge data from these different sources and to ensure the privacy of all PLWH. …”
    Get full text
    Article
  15. 675

    Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing by P. Anbumani, R. Dhanapal

    Published 2023-03-01
    “…Secondly, the user's privacy may be adequately protected with a secure authentication paradigm that employs ABS to safeguard the user's private data. …”
    Get full text
    Article
  16. 676
  17. 677

    Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study by Denise Lee, Akhil Vaid, Kartikeya M Menon, Robert Freeman, David S Matteson, Michael L Marin, Girish N Nadkarni

    Published 2025-04-01
    “…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
    Get full text
    Article
  18. 678

    QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles by Ji-ming Chen, Ting-ting Li, Liang-jun Wang

    Published 2019-07-01
    “…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
    Get full text
    Article
  19. 679

    Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities by Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, Rania Aboalela, Naif Alsaadi, Louai A. Maghrabi, Khalid H. Allehaibi

    Published 2025-02-01
    “…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
    Get full text
    Article
  20. 680

    A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans by Abdullah Al-Saleh, Ghanshyam G. Tejani, Shailendra Mishra, Sunil Kumar Sharma, Seyed Jalaleddin Mousavirad

    Published 2025-07-01
    “…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
    Get full text
    Article