Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
181
Privacy in consumer wearable technologies: a living systematic analysis of data policies across leading manufacturers
Published 2025-06-01“…In this study, we systematically evaluated the privacy policies of 17 leading wearable technology manufacturers using a novel rubric comprising 24 criteria across seven dimensions: transparency, data collection purposes, data minimization, user control and rights, third-party data sharing, data security, and breach notification. …”
Get full text
Article -
182
Federated learning with differential privacy for breast cancer diagnosis enabling secure data sharing and model integrity
Published 2025-04-01“…This mitigates adversarial attacks and prevents data leakage. The proposed work uses the Breast Cancer Wisconsin Diagnostic dataset to address critical challenges such as data heterogeneity, privacy-accuracy trade-offs, and computational overhead. …”
Get full text
Article -
183
PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services
Published 2023-12-01“…However, while cloud server provides convenience and stability, it also leads to data security and user privacy leakage. Aiming at the problems of insufficient privacy protection and inefficient query in the existing LBS data outsourcing schemes, this paper presents a novel privacy-preserving top-k query for outsourcing situations. …”
Get full text
Article -
184
Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
Published 2024-01-01“…To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently searching the data. …”
Get full text
Article -
185
-
186
Privacy-Preserving Poisoning-Resistant Blockchain-Based Federated Learning for Data Sharing in the Internet of Medical Things
Published 2025-05-01“…Although current blockchain-based federated learning (BFL) approaches aim to resolve these issues, two persistent security weaknesses remain: privacy leakage and poisoning attacks. This study proposes a privacy-preserving poisoning-resistant blockchain-based federated learning (PPBFL) scheme for secure IoMT data sharing. …”
Get full text
Article -
187
Spatio-Temporal Joint Planning for Integrated Energy Systems with Internet Data Center Considering Privacy Preservation
Published 2025-04-01“…However, because both IDC and integrated energy systems (IES) possess underlying user information, data leakage may lead to various risks. Therefore, when designing collaborative optimization solutions for IDCs and IES, it is essential to consider the privacy preservation of both systems. …”
Get full text
Article -
188
Optimizing data privacy and security measures for critical infrastructures via IoT based ADP2S technique
Published 2025-03-01“…This paper uses a reptile search optimization algorithm to offer attuned data protection with privacy scheme (ADP2S). …”
Get full text
Article -
189
Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts
Published 2025-07-01“…However, the demand for multi-party data joint analysis within these contracts faces challenges of privacy leakage and malicious deception. …”
Get full text
Article -
190
Enhanced Consumer Healthcare Data Protection Through AI-Driven TinyML and Privacy-Preserving Techniques
Published 2025-01-01“…The proposed method with TinyML looks at patient data, like ECG readings and reports of unusual heartbeats, right on local edge devices that have limited resources, enabled immediate privacy checks while using minimal computing power. …”
Get full text
Article -
191
Using UMAP for Partially Synthetic Healthcare Tabular Data Generation and Validation
Published 2024-12-01“…However, such medical data often comprise sensitive patient information, posing challenges regarding data privacy, and are resource-intensive to acquire for significant research purposes. …”
Get full text
Article -
192
Privacy-Preserving Rule Induction Using CKKS
Published 2024-01-01“…This study introduces a new approach called homomorphic encryption-based rule induction (HORI) algorithm, designed specifically for scenarios where data confidentiality is critical. This method is constructed using CKKS homomorphic encryption to make it work with encrypted data, thereby enhancing the privacy of both training data and the input for inference. …”
Get full text
Article -
193
A survey of individuals’ willingness to share real-world data postmortem with researchers
Published 2024-01-01Subjects: “…Data use…”
Get full text
Article -
194
-
195
A Hybrid Framework for Enhancing Privacy in Blockchain-Based Personal Data Sharing using Off-Chain Storage and Zero-Knowledge Proofs
Published 2025-06-01“…However, its widespread adoption is constrained by challenges such as limited scalability, privacy concerns, and conflicts with regulatory frameworks like the General Data Protection Regulation (GDPR). …”
Get full text
Article -
196
A Symmetric Projection Space and Adversarial Training Framework for Privacy-Preserving Machine Learning with Improved Computational Efficiency
Published 2025-03-01“…By designing a new projection loss function and combining autoencoders with adversarial training, the proposed method effectively balances privacy protection and model utility. Experimental results show that, for financial time-series data tasks, the model using the projection loss achieves a precision of 0.95, recall of 0.91, and accuracy of 0.93, significantly outperforming the traditional cross-entropy loss. …”
Get full text
Article -
197
Privacy-Preserving Clinical Decision Support for Emergency Triage Using LLMs: System Architecture and Real-World Evaluation
Published 2025-07-01“…We evaluate the system through two studies: (1) a benchmark of 750+ USMLE-style questions validating the medical reasoning of fine-tuned LLMs; and (2) a real-world case study (<i>n</i> = 132, 75.8% first-pass agreement) using de-identified MIMIC-III data to assess triage accuracy and responsiveness. …”
Get full text
Article -
198
A Privacy-Preserving RL-Based Secure Charging Coordinator Using Efficient FL for Smart Grid Home Batteries
Published 2025-02-01Get full text
Article -
199
Balancing Privacy and Performance: A Differential Privacy Approach in Federated Learning
Published 2024-10-01“…Federated learning (FL), a decentralized approach to machine learning, facilitates model training across multiple devices, ensuring data privacy. However, achieving a delicate privacy preservation–model convergence balance remains a major problem. …”
Get full text
Article -
200
Evaluating the effectiveness of data governance frameworks in ensuring security and privacy of healthcare data: A quantitative analysis of ISO standards, GDPR, and HIPAA in blockch...
Published 2025-01-01“…Although there are existing frameworks to govern healthcare data but they have certain limitations in effectiveness of data governance to ensure security and privacy. …”
Get full text
Article