Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddddds » \"useddddddds (Expand Search)
\"usedds » \"useddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 861 - 880 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"usedds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.24s Refine Results
  1. 861
  2. 862

    Advancing Early Detection of Major Depressive Disorder Using Multisite Functional Magnetic Resonance Imaging Data: Comparative Analysis of AI Models by Masab Mansoor, Kashif Ansari

    Published 2025-07-01
    “…MethodsWe used functional magnetic resonance imaging data from 1200 participants (600 with early-stage MDD and 600 healthy controls) across 3 public datasets. …”
    Get full text
    Article
  3. 863
  4. 864

    ChildDiffusion: Unlocking the Potential of Generative AI and Controllable Augmentations for Child Facial Data Using Stable Diffusion and Large Language Models by Muhammad Ali Farooq, Wang Yao, Peter Corcoran

    Published 2025-01-01
    “…This research advances generative AI by addressing data scarcity and ethical challenges, showcasing how diffusion models can produce realistic child facial data while ensuring compliance with privacy standards. …”
    Get full text
    Article
  5. 865

    De novo non-canonical nanopore basecalling enables private communication using heavily-modified DNA data at single-molecule level by Qingyuan Fan, Xuyang Zhao, Junyao Li, Ronghui Liu, Ming Liu, Qishun Feng, Yanping Long, Yang Fu, Jixian Zhai, Qing Pan, Yi Li

    Published 2025-05-01
    “…Abstract Hidden messages in DNA molecules by employing chemical modifications has been suggested for private data storage and transmission at high information density. …”
    Get full text
    Article
  6. 866

    Deriving and validating a risk prediction model for long COVID-19: protocol for an observational cohort study using linked Scottish data by Jennifer K Quint, Aziz Sheikh, Chris Robertson, Srinivasa Vittal Katikireddi, Emily Moore, Colin R Simpson, Luke Daines, Eleftheria Vasileiou, Syed Ahmar Shah, Rachel H Mulholland, Vicky Hammersley, Steven Kerr, Ting Shi, David Weatherill, Elisa Pesenti

    Published 2022-07-01
    “…In this protocol, we describe plans to develop a prediction model to identify individuals at risk of developing long-COVID.Methods and analysis We will use the national Early Pandemic Evaluation and Enhanced Surveillance of COVID-19 (EAVE II) platform, a population-level linked dataset of routine electronic healthcare data from 5.4 million individuals in Scotland. …”
    Get full text
    Article
  7. 867

    Deep Learning for Medical Image Analysis Applications in Disease Detection and Diagnosis by Panchadhyayee Swagata, N Shirisha, S Sureshkumar, Priya S Harthy Ruby, Ramalingam Vanaja, M Mahima

    Published 2025-01-01
    “…Its potential applications are indeed great, but realising its potential has been slow owing to a host of challenges such as implementing it in a real-life scenario, data privacy challenges, ethical concerns, AI models being biased, operating system structures needing to be interoperable with existing systems, and their compliance with regulating standards. …”
    Get full text
    Article
  8. 868

    Health Unchained Podcast on New Decentralized Industry Coalition by Ray Dogum

    Published 2025-04-01
    “…Concepts explored during the conversation include: • Financial systems interacting with health • AI agents interacting with AI agents, exchanging value and micro payments • Building frameworks that make it easy to consume for CIOs around globe • Blockchain transaction framework • AI analytical framework • Privacy preservation data complying with HIPAA and HL7 • Coming together to solve industry problems  • Real world implementations, use cases - including reporting, health data, and DeSci, clinical innovations and research, tokenization, ethical AI, and verifiable intelligence • Stable coins for cross border payments • Full access to data, and payments around globe • Supply chain ecosystem, pharmacy, pharma, insurance/payors, clinics, doctors, and patients • Who will new intermediaries be to move data, bill, and secure the data? …”
    Get full text
    Article
  9. 869

    Real-Time Tracking of Diagnostic Discrepancies in Electronic Health Records for Improved Predictive Modeling by Elizabeth A. Trader, Varadraj P. Gurupur

    Published 2025-01-01
    “…This paper highlights the critical role of diagnostic discrepancy statistics in overcoming these challenges and proposes a standardized data schema that ensures interoperable, real-time, and historical data without compromising patient privacy. …”
    Get full text
    Article
  10. 870

    Data Confidentiality in Artificial Intelligence-Assisted Medicine: The Main Ethical Issue by Raluca DUMACHE, Camelia MURESAN, Marina Adriana MERCIONI, Alin IONESCU, Nina IVANOVIC, Alexandra ENACHE

    Published 2025-05-01
    “…Although there are many potential advantages of using AI to enhance medical care, they must be weighed against potential risks to patient privacy and data security. …”
    Get full text
    Article
  11. 871

    Securing gait recognition with homomorphic encryption by Marina Banov, Domagoj Pinčić, Diego Sušanj, Kristijan Lenac

    Published 2025-08-01
    “…At the same time, they raise significant privacy concerns because compromised biometric data cannot be revoked. …”
    Get full text
    Article
  12. 872

    Balancing public safety and civil rights: Successes and challenges of AI-based video surveillance systems by S.S. Vaddiparti, F. Babaiev

    Published 2025-05-01
    “…AI-powered video analytics has had a profound impact on the right to privacy, particularly due to the mass collection of biometric data and automated profiling, sparking debate over compliance with international standards such as the General Data Protection Regulation and the Convention for the Protection of Human Rights. …”
    Get full text
    Article
  13. 873

    Facebook as a Surveillance Tool: From the Perspective of the User by Ekaterina Petrovna Netchitailova

    Published 2012-09-01
    “…With the increasing use of online social networks such as Facebook in recent years, a lot of research has been focussing on the privacy issue of the network. …”
    Get full text
    Article
  14. 874
  15. 875

    A Digital Twin Comprehensive Monitoring System for Ship Equipment by Miao Zhe, Zhao Yong, Su Shaojuan, Song Nanzhe

    Published 2024-12-01
    “…In addition, the system optimises the user experience through multi-round feedback testing, and ensures data security and privacy protection through multi-layer encryption, identity verification, and role-based access control. …”
    Get full text
    Article
  16. 876

    Political Factors in Global Communication Platforms: Pavel Durov’s Case by Choi Keunwon, Zotova Tatyana Andreevna

    Published 2025-06-01
    “…The French authorities applied institutional pressure by using institutional advantages to achieve control over the private data of Telegram users. …”
    Get full text
    Article
  17. 877

    HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework by Mohammad Moshawrab, Mehdi Adda, Abdenour Bouzouane, Hussein Ibrahim, Ali Raad

    Published 2025-06-01
    “…Abstract Protecting user privacy is essential in machine learning research, especially in the context of data collection. …”
    Get full text
    Article
  18. 878

    Conditions for anonymity in some generic public-key encryption constructions by TIAN Yuan, DENG Lu-yao, ZHANG Hao

    Published 2009-01-01
    “…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
    Get full text
    Article
  19. 879
  20. 880

    Conditions for anonymity in some generic public-key encryption constructions by TIAN Yuan, DENG Lu-yao, ZHANG Hao

    Published 2009-01-01
    “…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
    Get full text
    Article