Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
1041
Algorithmic systems: the consent is in the detail?
Published 2020-03-01“…While these applications are progressively gaining momentum, established data protection and privacy rules have struggled to incorporate the particularities of data-intensive information societies. …”
Get full text
Article -
1042
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
Published 2025-07-01“…By preserving patient data privacy at the edge, FedGCL enhances system resilience without sacrificing model performance. …”
Get full text
Article -
1043
Quantitative and Spatially Explicit Clustering of Urban Grocery Shoppers in Montreal: Integrating Loyalty Data with Synthetic Population
Published 2025-04-01“…While integrating loyalty data with synthetic populations mitigates privacy concerns, challenges remain regarding data sparsity and demographic inconsistencies. …”
Get full text
Article -
1044
Inferring Travel Modes from Cellular Signaling Data Based on the Gated Recurrent Unit Neural Network
Published 2023-01-01“…Moreover, in cooperation with the operator, we organized an experiment collecting cellular signaling data, as well as the corresponding GPS data. Using the collected dataset as ground-truth data, the performance of the method presented in this paper and other popular methods is verified and compared. …”
Get full text
Article -
1045
Integrating human biomonitoring exposure data into a primary care morbidity database: a feasibility study
Published 2025-01-01“…This feasibility study uses exposure data from one of the completed PFAS HBM studies, which included 796 individuals. …”
Get full text
Article -
1046
Integrating patient metadata and pathogen genomic data: advancing pandemic preparedness with a multi-parametric simulator
Published 2025-04-01“…However, data sharing between EU member states faces challenges due to disparities in data collection practices, standardisation, legal frameworks, privacy, security regulations, and resource allocation. …”
Get full text
Article -
1047
A review on the impact of big data analytics in transforming agricultural practices, food processing, and preservation strategies
Published 2025-12-01“…Big data is used a lot in food distribution and retail, but not enough in production, making decisions, and making things last. …”
Get full text
Article -
1048
Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data
Published 2025-01-01“…The first step involves generating synthetic TCP malware traffic data with malicious content using GPT-2. These data are then preprocessed and used in the second step, which focuses on malware classification. …”
Get full text
Article -
1049
Public Perception of the Brain-Computer Interface Based on a Decade of Data on X: Mixed Methods Study
Published 2025-06-01“…The presence of fear underscores the need to address ethical concerns, particularly around data privacy, safety, and transparency. Transparent communication and ethical considerations are essential for building public trust and reducing apprehension. …”
Get full text
Article -
1050
Gaia-X-Med: Experiences with Building Dataspaces for Medical Applications
Published 2024-12-01Get full text
Article -
1051
Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision
Published 2025-01-01“…As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. Computer vision systems can surveil and exploit data without consent. …”
Get full text
Article -
1052
Leveraging Open-Source Large Language Models for Data Augmentation in Hospital Staff Surveys: Mixed Methods Study
Published 2024-11-01“…ConclusionsThe study demonstrates the value of data augmentation with open-source LLMs, highlights the importance of privacy and ethical considerations when using LLMs, and suggests future directions for research in this field.…”
Get full text
Article -
1053
Horizontal federated learning and assessment of Cox models
Published 2025-06-01“…However, training an accurate model requires access to a sufficiently large dataset, which is often challenging due to data fragmentation. A potential solution is to combine data from multiple medical institutions, but privacy constraints typically prevent direct data sharing. …”
Get full text
Article -
1054
Analysis of Thesis Studies on Ethics in Social, Health and Educational Sciences: A Systematic Review
Published 2025-08-01Get full text
Article -
1055
Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks
Published 2025-05-01“…At the same time, the data from individual providers often exhibit imbalance and a scarcity of anomalous samples, leading to suboptimal model performance when using a single dataset. …”
Get full text
Article -
1056
Overcoming Data Scarcity in Roadside Thermal Imagery: A New Dataset and Weakly Supervised Incremental Learning Framework
Published 2025-04-01“…Roadside camera systems are commonly used for traffic data collection, yet conventional optical systems are limited by poor performance in varying weather and light conditions and are often restricted by data privacy regulations. …”
Get full text
Article -
1057
A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare
Published 2025-05-01“…Abstract The latest developments in the Internet of Medical Things (IoMT) have transformed healthcare, allowing for the easy transmission of sensitive data across networked medical equipment. However, this interconnection has produced a fertile environment for cybersecurity threats, necessitating the use of sophisticated intrusion detection systems. …”
Get full text
Article -
1058
DIGITAL DATA-DRIVEN APPROACHES TO MONITOR AND FOSTER WELL-BEING AMONG EXCHANGE STUDENTS DURING DISRUPTIVE EVENTS
Published 2025-07-01“…Special attention is given to ethical data use, privacy protection, and accessibility of technologies within educational contexts. …”
Get full text
Article -
1059
MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM
Published 2025-01-01“…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
Get full text
Article -
1060
Building and Sustaining Public Trust in Health Data Sharing for Musculoskeletal Research: Semistructured Interview and Focus Group Study
Published 2024-10-01“… BackgroundAlthough many people are supportive of their deidentified health care data being used for research, concerns about privacy, safety, and security of health care data remain. …”
Get full text
Article