Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1021
Large language models generating synthetic clinical datasets: a feasibility and comparative analysis with real-world perioperative data
Published 2025-02-01“…Synthetic data offers a promising solution to preserve privacy while enabling broader data access. …”
Get full text
Article -
1022
Secure federated distillation GAN for CIDS in industrial CPS
Published 2023-12-01“…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
Get full text
Article -
1023
A secure and scalable blockchain-based model for electronic health record management
Published 2025-04-01“…Abstract In the contemporary digital era, the storage of Electronic Health Records on open platforms presents significant security and privacy challenges. Addressing these concerns requires standardizing the clinical deployment models currently in use. …”
Get full text
Article -
1024
Factors Affecting Personal Information Sharing: Small-Scale Sample Analysis on Social Media
Published 2024-08-01“…These findings indicated that users’ trust, awareness, privacy concerns, and behavioral intentions significantly and positively influence the tendency to share personal data on social media platforms. …”
Get full text
Article -
1025
#BeSeen: understanding young people’s views of the motivation and impacts of sharing self-harm imagery online and use of their social media data for research—a UK participatory art...
Published 2024-07-01“…Participants from the RAS group were more inclined to agree to their data being used and had higher levels of trust in government.Conclusion Young people care about their privacy and use of their data even when it is publicly available. …”
Get full text
Article -
1026
Sustainability of the Digital Economy in Indonesia: Opportunities, Challenges and Future Development
Published 2023-01-01Get full text
Article -
1027
Edge-FLGuard: A Federated Learning Framework for Real-Time Anomaly Detection in 5G-Enabled IoT Ecosystems
Published 2025-06-01“…The rapid convergence of 5G networks and Internet of Things (IoT) technologies has unlocked unprecedented connectivity and responsiveness across smart environments—but has also amplified cybersecurity risks due to device heterogeneity, data privacy concerns, and distributed attack surfaces. …”
Get full text
Article -
1028
Navigating challenges/opportunities in developing smart agricultural extension platforms: Multi-media data mining techniques
Published 2025-09-01“…Addressing data privacy issues involves adhering to open-access principles and enforcing strict data encryption and anonymization standards. …”
Get full text
Article -
1029
Cybersecurity Anomaly Detection: AI and Ethereum Blockchain for a Secure and Tamperproof IoHT Data Management
Published 2024-01-01“…Since medical Information Technology (IT) is evolving and data privacy is a major concern with sensors generally, in healthcare IoT. …”
Get full text
Article -
1030
Ethical implications related to processing of personal data and artificial intelligence in humanitarian crises: a scoping review
Published 2025-04-01“…Abstract Background Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. …”
Get full text
Article -
1031
Establishing a Personal Data Protection Agency for E-Commerce in Indonesia: Legal Framework and Implementation Challenges
Published 2024-12-01“…The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
Get full text
Article -
1032
Challenges and strategies in building a foundational digital health data integration ecosystem: a systematic review and thematic synthesis
Published 2025-06-01“…A thematic synthesis approach was used to categorize findings into three primary themes: interoperability, PCC, and genomic data integration.ResultsA total of 161 studies were included. …”
Get full text
Article -
1033
Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing
Published 2025-04-01“…Besides, a Modified Digest hashing algorithm is also used with M-AES for feeding the encrypted text and hash into data blocks. …”
Get full text
Article -
1034
Putting health facilities on the map: a renewed call to create geolocated, comprehensive, updated, openly licensed dataset of health facilities in sub-Saharan African countries
Published 2025-04-01“…Consequently, multiple national and subnational parallel efforts attempt to construct HFDBs, resulting in duplication and lack of governmental input, use, and validation. Main body In this paper, we advocate for a harmonized SSA-wide HFDB. …”
Get full text
Article -
1035
Open Power System Datasets and Open Simulation Engines: A Survey Toward Machine Learning Applications
Published 2025-01-01“…In comparison, power grid datasets face three major challenges: (i) real-world data is often restricted by regulatory constraints, privacy reasons, or security concerns, making it difficult to obtain and work with; (ii) synthetic datasets, which are created to address these limitations, often have incomplete information and are released using specialized tools, making them inaccessible to the broader community; and, (iii) input-output datasets are difficult to generate through simulation for non-experts because open-source simulators are not known outside the power system community. …”
Get full text
Article -
1036
Self-Supervised Learning Powered by Synthetic Data From Diffusion Models: Application to X-Ray Images
Published 2025-01-01“…Synthetic data offers a compelling solution to the challenges associated with acquiring high-quality medical data, which is often constrained by privacy concerns and limited accessibility. …”
Get full text
Article -
1037
Synthetic data trained open-source language models are feasible alternatives to proprietary models for radiology reporting
Published 2025-07-01“…Abstract The study assessed the feasibility of using synthetic data to fine-tune various open-source LLMs for free text to structured data conversation in radiology, comparing their performance with GPT models. …”
Get full text
Article -
1038
-
1039
An Examination of Human Rights Related to the Protection of Debtor Customer Data and Information Through Bank Secrecy Rules
Published 2025-03-01“… This research aims to examine and analyse how the protection of debtor customer data and information in the perspective of human rights. …”
Get full text
Article -
1040
Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction
Published 2025-01-01“…With the development of cloud computing, reversible data hiding in encrypted images (RDH-EI) technology has gained significant attention in ensuring data security and privacy protection. …”
Get full text
Article