Showing 901 - 920 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.17s Refine Results
  1. 901

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
    Get full text
    Article
  2. 902

    A Data-Driven Approach for Generating Synthetic Load Profiles with GANs by Tsvetelina Kaneva, Irena Valova, Katerina Gabrovska-Evstatieva, Boris Evstatiev

    Published 2025-07-01
    “…The generation of realistic electrical load profiles is essential for advancing smart grid analytics, demand forecasting, and privacy-preserving data sharing. Traditional approaches often rely on large, high-resolution datasets and complex recurrent neural architectures, which can be unstable or ineffective when training data are limited. …”
    Get full text
    Article
  3. 903

    Dynamic Ensemble Selection for EEG Signal Classification in Distributed Data Environments by Małgorzata Przybyła-Kasperek, Jakub Sacewicz

    Published 2025-05-01
    “…This study presents a novel approach to EEG signal classification in distributed environments using dynamic ensemble selection. In scenarios where data dispersion arises due to privacy constraints or decentralized data collection, traditional global modelling is impractical. …”
    Get full text
    Article
  4. 904

    Shopping Data for Population Health Surveillance: Opportunities, Challenges, and Future Directions by Alisha Suhag, Romana Burgess, Anya Skatova

    Published 2025-08-01
    “…This paper explores the potential of loyalty card data to strengthen public health surveillance across 4 key behavioral risk domains: diet, alcohol, tobacco, and over-the-counter medication use. …”
    Get full text
    Article
  5. 905

    SHARE: An ethical framework for equitable data sharing in Caribbean health research by Michael H. Campbell, Natalie S. Greaves

    Published 2024-12-01
    “…Using the SHARE framework can support regionally relevant and culturally responsive work already underway in the region and further develop capacity for intentional sharing and (re)use of Caribbean health data.…”
    Get full text
    Article
  6. 906

    Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization by Ahmad Musamih, Khaled Salah, Raja Jayaraman, Samer Ellaham, Mohammed Omar, Ibrar Yaqoob

    Published 2025-01-01
    “…In this paper, we propose a blockchain and NFT-based solution that addresses the challenges of managing, sharing, and monetizing genomic data while preserving privacy using Threshold Cryptography and Fully Homomorphic Encryption (FHE). …”
    Get full text
    Article
  7. 907

    Generating and evaluating synthetic data in digital pathology through diffusion models by Matteo Pozzi, Shahryar Noei, Erich Robbi, Luca Cima, Monica Moroni, Enrico Munari, Evelin Torresani, Giuseppe Jurman

    Published 2024-11-01
    “…Abstract Synthetic data is becoming a valuable tool for computational pathologists, aiding in tasks like data augmentation and addressing data scarcity and privacy. …”
    Get full text
    Article
  8. 908

    Trusted access control mechanism for data with blockchain-assisted attribute encryption by Chang Liu, Dong Wang, Da Li, Shaoyong Guo, Wenjing Li, Xuesong Qiu

    Published 2025-06-01
    “…Ciphertext policy attribute-based encryption (CP-ABE) model is widely used in cloud data sharing scenarios, but there are problems such as privacy leakage of access policy, irrevocability of user or attribute, key escrow, and trust bottleneck. …”
    Get full text
    Article
  9. 909

    Efficient unpaired data validation and aggregation protocol in industrial Internet of things by MA Rong, FENG Tao

    Published 2024-10-01
    “…Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. …”
    Get full text
    Article
  10. 910

    Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges by Mohsen Marjani, Fariza Nasaruddin, Abdullah Gani, Ahmad Karim, Ibrahim Abaker Targio Hashem, Aisha Siddiqa, Ibrar Yaqoob

    Published 2017-01-01
    “…However, such data are not useful without analytic power. Numerous big data, IoT, and analytics solutions have enabled people to obtain valuable insight into large data generated by IoT devices. …”
    Get full text
    Article
  11. 911

    A Web-Based Application for Smart City Data Analysis and Visualization by Panagiotis Karampakakis, Despoina Ioakeimidou, Periklis Chatzimisios, Konstantinos A. Tsintotas

    Published 2025-05-01
    “…Smart cities are urban areas that use contemporary technology to improve citizens’ overall quality of life. …”
    Get full text
    Article
  12. 912

    A COMPREHENSIVE REVIEW OF GENERATIVE ARTIFICIAL INTELLIGENCE APPLICATIONS IN DATA VISUALIZATION by Luong Thi Minh Hue*, Nguyen The Vinh, Nguyen Van Viet, Nguyen Huu Khanh, Nguyen Kim Son, Duong Thuy Huong

    Published 2025-06-01
    “…Using natural language to generate visual representations of data (NL2VIS) is emerging as a promising research direction, driven by the rapid development of Generative AI (GenAI). …”
    Get full text
    Article
  13. 913

    PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing by Sreeja Cherillath Sukumaran, Mohammed Misbahuddin

    Published 2021-05-01
    “…Mobile Cloud Computing (MCC) allows users more possibilities to access services conveniently. But data security and privacy issues still act as barriers for adoption to cloud technology when dealing with confidential data. …”
    Get full text
    Article
  14. 914

    A Remedy for Heterogeneous Data: Clustered Federated Learning with Gradient Trajectory by Ruiqi Liu, Songcan Yu, Linsi Lan, Junbo Wang, Krishna Kant, Neville Calleja

    Published 2024-12-01
    “…Federated Learning (FL) has recently attracted a lot of attention due to its ability to train a machine learning model using data from multiple clients without divulging their privacy. …”
    Get full text
    Article
  15. 915
  16. 916

    An Artificial Intelligence Pipeline for Hepatocellular Carcinoma: From Data to Treatment Recommendations by Zhang X, Yang L, Liu C, Yuan X, Zhang Y

    Published 2025-07-01
    “…However, challenges such as data quality, standardization, and privacy remain. …”
    Get full text
    Article
  17. 917
  18. 918

    Securing the metaverse: Machine learning–based perspectives on risk, trust, and governance by Krishnashree Achuthan, Sasangan Ramanathan, Raghu Raman

    Published 2025-12-01
    “…The rapid expansion of the metaverse presents significant cybersecurity and privacy challenges, requiring structured, data-driven analysis. …”
    Get full text
    Article
  19. 919

    A novel ε-sensitive correlation indistinguishable scheme for publishing location data. by Wang Bin, Zhang Lei, Zhang Guoyin

    Published 2019-01-01
    “…So the published data had to be disposed to protect the privacy. In order to cope with this problem, a number of algorithms based on the strategy of k-anonymity were proposed, but this is not enough for the privacy protection, as the correlation between the sensitive region and the background knowledge can be used to infer the real location. …”
    Get full text
    Article
  20. 920

    New frontiers in migration statistics: a narrative review on big data’s role by Ahmad Wali Ahmad Yar, Tuba Bircan

    Published 2025-08-01
    “…However, its use remains largely experimental, with key concerns around data access, representativeness, privacy, and the integration with official statistics. …”
    Get full text
    Article