Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 601 - 620 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"usedddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.18s Refine Results
  1. 601

    PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare by Hegde Manjunath, M. Karthik, Hegde Varun, Rao Rohini R., Mantoor Vinayak M., Bhat Radhakrishna

    Published 2025-04-01
    “…PLASMA’s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. …”
    Get full text
    Article
  2. 602

    Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging by Hadi Mahdipour, Jaime Laviada, Fernando Las-Heras Andres, Mehdi Sookhak

    Published 2025-01-01
    “…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
    Get full text
    Article
  3. 603

    Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies by Kumar Rahul, Shieh Chin-Shiuh, Chakrabarti Prasun, Kumar Ashok, Moolchandani Jhankar, Sinha Raj

    Published 2025-01-01
    “…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
    Get full text
    Article
  4. 604

    Do Cookie Banners Respect My Browsing Privacy? Measuring the Effectiveness of Cookie Rejection for Limiting Behavioral Advertising by Mateo Ormeno, Ha Dao, Valeria Herskovic, Kensuke Fukuda

    Published 2024-01-01
    “…Online behavioral advertising (OBA) is a method within digital advertising that exploits web users’ interests to tailor ads. Its use has raised privacy concerns among researchers, regulators, and the media, emphasizing the need for a reliable mechanism to measure its prevalence. …”
    Get full text
    Article
  5. 605

    Investigating the Relationship between Social Skills and Social Acceptance with Academic Performance, Considering the Mediating Role of Ethical Privacy by Taghreed Radhi Abdol Mohsin, Hassan Ghalavandi

    Published 2025-05-01
    “…Four standard questionnaires of social skills, social acceptance, respect for moral privacy, and academic performance were used for gathering data. …”
    Get full text
    Article
  6. 606

    Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things. by Xujun Tang

    Published 2024-01-01
    “…Researching the privacy protection method of public service advertising visual design is of great significance to protecting the privacy data security of public service advertising visual designers and the personal privacy of other citizens. …”
    Get full text
    Article
  7. 607

    Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks by Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei, Riad Alharbey

    Published 2025-02-01
    “…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
    Get full text
    Article
  8. 608

    Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities by Ahma Greta, Kadriu Arbana

    Published 2025-06-01
    “…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
    Get full text
    Article
  9. 609
  10. 610

    Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis by Madhura K., Niyaz Panakaje, S. M. Riha Parvin, Shakira Irfana, Mural Henrita Cutinha, Yatheen A, Rovina Sharon Soans

    Published 2024-12-01
    “…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
    Get full text
    Article
  11. 611

    Federated Learning for Surface Roughness by Kai-Lun Cheng, Yu-Hung Ting, Wen-Ren Jong, Shia-Chung Chen, Zhe-Wei Zhou

    Published 2025-06-01
    “…This study proposes a federated learning-based real-time surface roughness prediction framework for WEDM to address issues of empirical parameter tuning and data privacy. By sharing only the model parameters, cross-machine training was enabled without exposing raw data. …”
    Get full text
    Article
  12. 612

    A Qualitative Study of Researchers Perspective on the Use and Risks of Open Government Data by Emigawaty Emigawaty, Dinda Sukmaningrum, Wiji Nurastuti

    Published 2025-06-01
    “…This study aims to review the potential risks of data openness on government data portals from the perspective of researchers as one of the important actors who use data. …”
    Get full text
    Article
  13. 613
  14. 614

    THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS by Thi Thu Huong Hoang, Hoang Nam Vu, Thi Khanh Chi Nguyen

    Published 2023-04-01
    “…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
    Get full text
    Article
  15. 615

    Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice by Zhilong Guo

    Published 2025-06-01
    “…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
    Get full text
    Article
  16. 616

    A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption by Linh Nguyen, Quoc Bao Phan, Lan Zhang, Tuy Tan Nguyen

    Published 2025-01-01
    “…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
    Get full text
    Article
  17. 617

    QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles by Ji-ming Chen, Ting-ting Li, Liang-jun Wang

    Published 2019-07-01
    “…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
    Get full text
    Article
  18. 618

    Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions by R. Vijay Anand, G. Magesh, I. Alagiri, Madala Guru Brahmam, Balamurugan Balusamy, Chithirai Pon Selvan, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2025-01-01
    “…After that, these local models are aggregated towards a common, global model using secure aggregation methods, which makes sure that there is nozza of data privacy and hence, in the process making sure that more accurate models can be obtained due to diversified data sets. …”
    Get full text
    Article
  19. 619

    Anomaly detection in encrypted network traffic using self-supervised learning by Sadaf Sattar, Shumaila Khan, Muhammad Ismail Khan, Ainur Akhmediyarova, Orken Mamyrbayev, Dinara Kassymova, Dina Oralbekova, Janna Alimkulova

    Published 2025-07-01
    “…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
    Get full text
    Article
  20. 620

    Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response by Yan Yan, Pengbin Yan, Adnan Mahmood, Yang Zhang, Quan Z. Sheng

    Published 2024-07-01
    “…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
    Get full text
    Article