Showing 2,001 - 2,020 results of 2,784 for search '"\"((((\\"usedds OR \"usedddddds) OR \"uses) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.16s Refine Results
  1. 2001

    Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty by Yanchen Wang, Lisa Singh

    Published 2025-03-01
    “…One approach to improve trustworthiness and fairness in AI systems is to use bias mitigation algorithms. However, most bias mitigation algorithms require data sets that contain sensitive attribute values to assess the fairness of the algorithm. …”
    Get full text
    Article
  2. 2002

    Enhancing medical image classification via federated learning and pre-trained model by Parvathaneni Naga Srinivasu, G. Jaya Lakshmi, Sujatha Canavoy Narahari, Jana Shafi, Jaeyoung Choi, Muhammad Fazal Ijaz

    Published 2024-09-01
    “…Federated learning (FL) offers a promising method for collaborative training on distributed data held by various entities, ensuring the privacy of patient information. …”
    Get full text
    Article
  3. 2003

    Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers by Idham Qrida Nusa, Bambang Sugiri, Yuliati Yuliati, Faizin Sulistio

    Published 2025-06-01
    “…The analysis highlights the use of cloud storage as a media to store the proceeds of crime, in the form of data privacy. …”
    Get full text
    Article
  4. 2004
  5. 2005

    Algorithms weighing lives and freedoms: The case of China’s health code by Ina Virtosu, Chen Li

    Published 2023-03-01
    “…Digital contact tracing has attracted enormous interest among academics and legislators since the outbreak of COVID-19, which resulted in several policy papers and research works, discussing issues, such as the effectiveness and accuracy of virus detection, as well concerns in regard to discrimination and data privacy. However, most of the articles refers to technologies and its implications in the West, and less to the peculiarities and problems related to the use of Chinese health code. …”
    Get full text
    Article
  6. 2006

    HIV Self-Testing among Men Who Have Sex with Men (MSM) in the UK: A Qualitative Study of Barriers and Facilitators, Intervention Preferences and Perceived Impacts. by T Charles Witzel, Alison J Rodger, Fiona M Burns, Tim Rhodes, Peter Weatherburn

    Published 2016-01-01
    “…The window period was the most important element of an HIVST, with strong preference for 4th generation testing. Kits which used a blood sample were more popular than those using saliva due to higher perceived accuracy although phobia of needles and/or blood meant some would only access HIVST if a saliva sample option was available. …”
    Get full text
    Article
  7. 2007

    Unsupervised intrusion detection model based on temporal convolutional network by LIAO Jinju, DING Jiawei, FENG Guanghui

    Published 2025-01-01
    “…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. In addition, UDMT can adopt different privacy layer modes, and the configuration was flexible to meet the requirements of different detection rates and detection delays. …”
    Get full text
    Article
  8. 2008

    The nature of online civil dispute resolution in modern India by Irina A. Gronic

    Published 2024-12-01
    “…Some believe that the introduction of information technology in the activities of the courts creates high risks for the security and privacy of data and the lack of digital literacy will contribute to this, while others believe that the future belongs to virtual courts and online dispute resolution.…”
    Get full text
    Article
  9. 2009

    Automotive Cybersecurity: A Survey on Frameworks, Standards, and Testing and Monitoring Technologies by Claudiu Vasile Kifor, Aurelian Popescu

    Published 2024-09-01
    “…To sustain and enhance the performance, quality, and reliability of vehicle systems, software engineers face significant challenges, including in diverse communication channels, software integration, complex testing, compatibility, core reusability, safety and reliability assurance, data privacy, and software security. Addressing cybersecurity risks presents a substantial challenge in finding practical solutions to these issues. …”
    Get full text
    Article
  10. 2010

    Decentralized Distributed Sequential Neural Networks Inference on Low-Power Microcontrollers in Wireless Sensor Networks: A Predictive Maintenance Case Study by Yernazar Bolat, Iain Murray, Yifei Ren, Nasim Ferdosian

    Published 2025-07-01
    “…The growing adoption of IoT applications has led to increased use of low-power microcontroller units (MCUs) for energy-efficient, local data processing. …”
    Get full text
    Article
  11. 2011

    Agents for Change: Artificial Intelligent Workflows for Quantitative Clinical Pharmacology and Translational Sciences by Mohamed H. Shahin, Srijib Goswami, Sebastian Lobentanzer, Brian W. Corrigan

    Published 2025-03-01
    “…By integrating domain‐specific tools while maintaining data privacy and regulatory standards, well‐designed agentic workflows empower scientists to automate routine tasks and make more informed decisions. …”
    Get full text
    Article
  12. 2012

    الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى by د. مها أحمد ابراهیم

    Published 2019-10-01
    “…The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. …”
    Get full text
    Article
  13. 2013

    Bridging the Gap between Neuroarchitecture, Artificial Intelligence, and Sustainability: A Systematic Review of Mental Health in the Built Environment by Esraa Elazab, Ahmed ELtawil

    Published 2025-09-01
    “…Ethical considerations related to data privacy and consent are also discussed, providing a comprehensive understanding of the potential and challenges in designing AI-driven neuroarchitecture-sustainable adaptive designs.…”
    Get full text
    Article
  14. 2014
  15. 2015

    Decision-making model in digital commerce: electronic trust-based purchasing intention through online food delivery applications (OFDAs) by Muhammad Asif Zaheer, Tanveer Muhammad Anwar, Laszlo Barna Iantovics, Maryam Manzoor, Muhammad Ali Raza, Zoia Khan

    Published 2024-09-01
    “…Design/methodology/approach – Data from 493 food consumers collected from Federal Capital Territory (FCT) Pakistan, who were regular users of OFDAs. …”
    Get full text
    Article
  16. 2016

    Encrypted traffic identification scheme based on sliding window and randomness features by LIU Jiachi, KUANG Boyu, SU Mang, XU Yaqian, FU Anmin

    Published 2024-08-01
    “…Specifically, the scheme involved sampling the payloads of data packets in sessions using a sliding window mechanism to obtain data block sequences that reflect the information patterns of the original traffic. …”
    Get full text
    Article
  17. 2017

    Factors that affect clinical youth engagement in digital mental health research: a qualitative sub-study nested within a prospective cohort study by Amanda Bye, Emma Wilson-Lemoine, Kylee Trevillion, Ben Carter, Rina Dutta

    Published 2025-04-01
    “…Methods Semi-structured interviews were conducted with a purposive sample of participants from the 3S-YP study. Interview data was analysed using codebook thematic analysis. …”
    Get full text
    Article
  18. 2018

    GOVERNANCE TOKENS IN THE CONCEPT OF ELECTRONIC GOVERNMENT by Oleksii Dotsenko, Marko Zelenskyi

    Published 2023-12-01
    “…We emphasized that the use of blockchain technology raises significant privacy concerns, as many e-government services involve personal data that must be properly protected to avoid situations where the blockchain could become the target of attacks by attackers trying to obtain unauthorized access to the personal information of citizens. …”
    Get full text
    Article
  19. 2019

    ENGLISH:FROM MANUSCRIPTS TO MONITORS: THE DIGITAL EVOLUTION OF ISLAMIC KNOWLEDGE AND THE ROLE OF COMPUTERIZING IN SAFEGUARDING TRADITION FOR FUTURE GENERATIONS by Tariq Hussain Jalbani, Muhammad Irfan Baloch, Syed Abrar Ali Shah

    Published 2024-06-01
    “…The paper explores the danger of breaching privacy and the abuse of personal data pointing to the necessity and effectiveness of a policy against such issues. …”
    Get full text
    Article
  20. 2020

    New forgery attack on the authenticated cipher SCREAM and iSCREAM by Yu-dan TIAN, Yong-zhuang WEI

    Published 2016-01-01
    “…Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. …”
    Get full text
    Article