Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 261 - 280 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"usedddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.15s Refine Results
  1. 261

    FedSVD: Asynchronous Federated Learning With Stale Weight Vector Decomposition by Giwon Sur, Hyejin Kim, Seunghyun Yoon, Hyuk Lim

    Published 2025-01-01
    “…Federated learning (FL) emerges as a collaborative learning framework that addresses the critical needs for privacy preservation and communication efficiency. …”
    Get full text
    Article
  2. 262

    Using the LTO Network Level 1 Blockchain to Automate Inter-Organizational Business Processes by Khrypko Serhii L., Shcherbakov Serhii S.

    Published 2024-06-01
    “…The author explains the operation of a private event chain as an ad-hoc private blockchain that ensures the consistency of the process state between nodes. Methods of ensuring data privacy are discussed. The second part of the article is devoted to the global public blockchain LTO to confirm information from private event chains. …”
    Get full text
    Article
  3. 263

    Convolutional neural network model over encrypted data based on functional encryption by Chen WANG, Jiarun LI, Jian XU

    Published 2024-03-01
    “…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
    Get full text
    Article
  4. 264

    Approach to keyword search over encrypted data in cloud by Peng ZHANG, Yan LI, Hai-lun LIN, Rong YANG, Qing-yun LIU

    Published 2014-11-01
    “…With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.…”
    Get full text
    Article
  5. 265

    Collection of location data in criminal proceedings – European (the EU and Strasbourg) standards by Dominika Czerniak

    Published 2021-03-01
    “…This article deals with the problem of collecting, retaining and processing location data for use in criminal proceedings. The collection of location data is an interference with the right to privacy (the Article 8 of the ECHR, the Article 7 of the Charter). …”
    Get full text
    Article
  6. 266

    How good is your synthetic data? SynthRO, a dashboard to evaluate and benchmark synthetic tabular data by Gabriele Santangelo, Giovanna Nicora, Riccardo Bellazzi, Arianna Dagliati

    Published 2025-02-01
    “…Conclusions Synthetic data mitigate concerns about privacy and data accessibility, yet lacks standardized evaluation metrics. …”
    Get full text
    Article
  7. 267

    Secure and trusted sharing mechanism of private data for Internet of Things by Mengyuan Li, Shaoyong Guo, Wenjing Li, Ao Xiong, Xiaoming Zhou, Jun Qi, Feng Qi, Dong Wang, Da Li

    Published 2025-06-01
    “…This practice creates the risk of privacy breaches on IoT data sharing platforms, including issues such as data tampering and data breaches. …”
    Get full text
    Article
  8. 268

    The tension of usable safety, security and privacy by Kaufhold Marc-André, Mentler Tilo, Nestler Simon, Reuter Christian

    Published 2025-03-01
    “…In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people’s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).…”
    Get full text
    Article
  9. 269

    Survey on privacy protection indoor positioning by Zhiheng WANG, Yanyan XU

    Published 2023-09-01
    “…Smartphones are usually provided with indoor positioning services by third-party positioning service providers, in which the unique privacy leakage risk has become a major factor limiting its development.How to protect the privacy of users and data in the positioning process has become an important issue to be solved.The research progress of indoor positioning privacy protection in recent years was reviewed.The commonly used indoor positioning technologies were introduced, different implementation architectures of indoor positioning systems and their threat models, privacy protection requirements were discussed, security technologies applied to indoor positioning privacy protection were summarized, indoor positioning privacy protection schemes for different architectures were classified and introduced, and the performance of different schemes and their advantages and disadvantages were comprehensively compared and analyzed, and finally future research trends were summarized and looked forward to.…”
    Get full text
    Article
  10. 270

    Examining privacy concerns and conversations before, during, and after the onset of the COVID-19 pandemic: an analysis of r/privacy by Erica Shusas, Shruti Sannon, Katie Teitelbaum, Patrick Skeba, Eric P. S. Baumer, Andrea Forte

    Published 2025-03-01
    “…The COVID-19 pandemic brought about new and far-ranging uses of technology that have engendered numerous privacy concerns among the public. …”
    Get full text
    Article
  11. 271

    Revisiting the use and effectiveness of patient-held records in rural Malawi by Amelia Taylor, Paul Kazembe

    Published 2025-06-01
    “…Aim This paper assessed their use and effectiveness within the health data ecosystem, and their potential impact on patient care. …”
    Get full text
    Article
  12. 272

    Research on privacy preservation of member inference attacks in online inference process for vertical federated learning linear model by Hongshu YIN, Xuhua ZHOU, Wenjun ZHOU

    Published 2022-09-01
    “…With the development of big data and the introduction of data security regulations, the awareness of privacy protection has gradually increased, and the phenomenon of data isolation has become more and more serious.Federated learning technology as one of the effective methods to solve this problem has become a hot spot of concern.In the online inference process of vertical federated learning, the current mainstream methods do not consider the protection of data identity, which is easy to leak user privacy.A privacy protection method for member inference attacks was proposed in the online inference process of the vertical federated linear model.A filter with a false positive rate was constructed to avoid the accurate positioning of data identity to ensure the security of data.Homomorphic encryption was used to realize the full encrypted state of the online inference process and protect the intermediate calculation results.According to the ciphertext multiplication property of homomorphic encryption, the random number multiplication method was used to mask data, which ensured the security of the final inference result.This scheme further improved the security of user privacy in the online inference process of vertical federated learning and had lower computation overhead and communication costs.…”
    Get full text
    Article
  13. 273

    Integration of metaheuristic based feature selection with ensemble representation learning models for privacy aware cyberattack detection in IoT environments by M. Karthikeyan, R. Brindha, Maria Manuel Vianny, V. Vaitheeshwaran, Mrinal Bachute, Sanket Mishra, Bibhuti Bhusan Dash

    Published 2025-07-01
    “…Abstract The Internet of Things (IoT) connects virtual and physical objects inserted with software, devices, and other technology that interchange data utilizing the Internet. It enables diverse devices and individuals to exchange data, interconnect, and personalize services to ease usage. …”
    Get full text
    Article
  14. 274

    Integrating advanced neural network architectures with privacy enhanced encryption for secure and intelligent healthcare analytics by C. Ramesh Babu Durai, S. Dhanasekaran, M. Jamuna Rani, Sindhu Chandra Sekharan

    Published 2025-08-01
    “…Detailed evaluation accepts the performance of structure in maintaining privacy through providing high-demonstration analysis for healthcare data protection. …”
    Get full text
    Article
  15. 275
  16. 276

    Protection of personal data under martial law in Ukraine by V. A. Svitlychnyi

    Published 2023-09-01
    “…Implementation of effective personal data protection measures during martial law is an important task to ensure the security and privacy of people. …”
    Get full text
    Article
  17. 277
  18. 278

    Traversable Ledger for Responsible Data Sharing and Access Control in Health Research by Sunanda Bose, Dusica Marijan

    Published 2024-12-01
    “…Healthcare institutions and health registries often store patients’ health data. In order to ensure privacy, sensitive medical information is stored separately from the identifying information of the patient. …”
    Get full text
    Article
  19. 279

    Malaysian Public’s Perception Toward Event Data Recorder (EDR) in Vehicles by Fadhlan Hafizhelmi Kamaru Kamaru Zaman, Ismail Danish Rozaimi, Syahrul Afzal Che Abdullah, Lucyantie Mazalan, Husna Zainol Abidin, Amir Radzi Ab. Ghani, Yahaya Ahmad

    Published 2024-12-01
    “…Besides, 40.3% expressed concern about potential privacy breaches and misuse of EDR data. Despite that, nearly 80% of respondents were in favor of installing EDR in their vehicles and allowing the data to be used in court. …”
    Get full text
    Article
  20. 280

    Evaluating the Impact of Artificial Intelligence Tools on Enhancing Student Academic Performance: Efficacy Amidst Security and Privacy Concerns by Jwern Tick Kiet Phua, Han-Foon Neo, Chuan-Chin Teo

    Published 2025-05-01
    “…This research investigates the perceptions and attitudes of students towards the use of AI tools in their academic activities, focusing on constructs such as perceived usefulness, the perceived ease of use, security and privacy concerns, and both positive and negative attitudes towards AI. …”
    Get full text
    Article