Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,241 - 1,260 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"usedddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.22s Refine Results
  1. 1241

    Synthetic ECG signal generation using generative neural networks. by Edmond Adib, Fatemeh Afghah, John J Prevost

    Published 2025-01-01
    “…Electrocardiogram (ECG) datasets tend to be highly imbalanced due to the scarcity of abnormal cases. Additionally, the use of real patients' ECGs is highly regulated due to privacy issues. …”
    Get full text
    Article
  2. 1242

    A qualitative study on ethical issues related to the use of AI-driven technologies in foreign language learning by Marcel Pikhart, Blanka Klimova

    Published 2025-07-01
    “…The results also highlight several grave ethical issues related to privacy in foreign language learning apps. This is the first research drawing attention to the topic of ethical issues when using AI-driven foreign language learning apps and it can be considered a pioneering work in this neglected area.…”
    Get full text
    Article
  3. 1243

    Development and implementation of an electronic health record system for use in humanitarian emergencies, disaster response, and conflict zones. by Sarah D Draugelis, Erik C Brown, Donald A Donahue, Justin Hickman, Sean G Smith, Philip Sutherland, George A Yendewa, Amir M Mohareb

    Published 2025-01-01
    “…Ongoing and future work in adapting electronic health records to international humanitarian response will emphasize data security, patient privacy, equity, and the rapid translation of electronic health data to improve population health. …”
    Get full text
    Article
  4. 1244
  5. 1245
  6. 1246

    Anonymization in web auctions using Zero-Knowledge Proof in Blockchain technology by Marlena Broniszewska, Wiktor B. Daszczuk, Denny B. Czejdo

    Published 2025-06-01
    “…However, the centralized nature of traditional e-commerce platforms raises concerns about data control, privacy, and potential single points of failure. …”
    Get full text
    Article
  7. 1247

    Fingernail analysis management system using microscopy sensor and blockchain technology by Shih Hsiung Lee, Chu Sing Yang

    Published 2018-03-01
    “…This work uses the highly anonymous blockchain technology to effectively protect data privacy and manage each user’s data through the blockchain, in which any change or manipulation can be recorded and tracked, and the data security is improved. …”
    Get full text
    Article
  8. 1248

    Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution by Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai

    Published 2025-05-01
    “…By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
    Get full text
    Article
  9. 1249

    Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector by Germán Rodríguez-Galán, Eduardo Benavides-Astudillo, Daniel Nuñez-Agurto, Pablo Puente-Ponce, Sonia Cárdenas-Delgado, Mauricio Loachamín-Valencia

    Published 2025-06-01
    “…Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple platforms. …”
    Get full text
    Article
  10. 1250
  11. 1251
  12. 1252

    The algorithmic consumer: A conceptual investigation of AI’s influence on consumer preferences and decisions by Annur Islam Sifat

    Published 2025-08-01
    “…By a thorough literature review and commentary, I critically analyzed the impact of AI’s personalization algorithm and addressed ethical implications in terms of potential bias, data privacy, and transparency. This paper establishes a conceptual framework to illustrate how AI technologies, including machine learning, natural language processing, and predictive analytics, intersect with facets of consumer psychology, allowing for personalization of experiences, market segmentation, and influencing behaviour in real time. …”
    Get full text
    Article
  13. 1253

    Global Health care Professionals’ Perceptions of Large Language Model Use In Practice: Cross-Sectional Survey Study by Ecem Ozkan, Aysun Tekin, Mahmut Can Ozkan, Daniel Cabrera, Alexander Niven, Yue Dong

    Published 2025-05-01
    “…The majority of our participants found ChatGPT to be useful; however, there are concerns about patient privacy, data security, and its legal and ethical issues as well as the accuracy of its information. …”
    Get full text
    Article
  14. 1254

    Binary Classification of Customer’s Online Purchasing Behavior Using Machine Learning by Ahmad Aldelemy, Raed A. Abd-Alhameed

    Published 2023-06-01
    “…The workflow is simple, adaptable, and suitable for UK banks, demonstrating the potential for practical implementation and data privacy. Future work will extend our approach to UK banks, reformulate the problem as a multi-class classification, and introduce pre-training automated steps for data analysis and transformation. …”
    Get full text
    Article
  15. 1255
  16. 1256
  17. 1257

    Optimizing encrypted search in the cloud using autoencoder-based query approximation by Mahmoud Mohamed, Khaled Alosman

    Published 2024-12-01
    “…Our work provides a rigorous evaluation of autoencoder-based query approximation for encrypted cloud search using real-world datasets. The research implement a general framework agnostic to model type, data modality, and encryption scheme. …”
    Get full text
    Article
  18. 1258
  19. 1259

    Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation by Gabriel Mendonca, Rosa M. M. Leao, Edmundo De Souza E. Silva, Don Towsley

    Published 2025-01-01
    “…We collect data on DDoS attacks by generating real attack traffic from the homes of a selected group of volunteers, utilizing authentic malware source code. …”
    Get full text
    Article
  20. 1260

    Ethical guidelines for journalistic use of GenAI. The main trends in the international debate and progress in self-regulation in Spain by Rosana Sanahuja-Sanahuja, Pablo López-Rabadán

    Published 2025-03-01
    “…To deal with this situation, academics and the journalistic sector have been publishing different professional guidelines and codes in an attempt to guide the ethical use of this technology. Based on the systematic review of three sets of academic guidelines and 18 important professional publications, and including data from more than 60 countries, this study establishes a double objective: to identify the main trends determining the international ethical debate; and to examine the degree of correspondence between these trends and the first self-regulation initiatives launched by the Spanish media. …”
    Get full text
    Article