Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 41 - 60 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.13s Refine Results
  1. 41

    Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering by Ming Li, Lanlan Wang, Haiju Fan

    Published 2020-02-01
    “…In this article, a novel scheme for data hiding in encrypted domain is proposed using fuzzy C-means clustering and compressive sensing technologies to protect privacy of the host image. …”
    Get full text
    Article
  2. 42

    Enhance differential privacy mechanisms for clinical data analysis using CNNs and reinforcement learning by Rakesh Batchala, Priyank Jain, Manasi Gyanchandani, Sanyam Shukla, Rajesh Wadhvani

    Published 2025-07-01
    “…The primary emphasis is on predicting and optimizing ventilation and sedation strategies for patients in Intensive Care Units. We safeguard patient data in the MIMIC-III dataset while preserving analytical utility by integrating differential privacy techniques, such as Gaussian, Laplace, Exponential, Zero-Concentrated, and Rényi mechanisms. …”
    Get full text
    Article
  3. 43

    Privacy-Preserving Healthcare Data Interactions: A Multi-Agent Approach Using LLMs by Carmen De Maio, Giuseppe Fenza, Domenico Furno, Teodoro Grauso, Vincenzo Loia

    Published 2025-03-01
    “…This study builds on prior research [1] by introducing a multi-agent system that uses Large Language Models (LLMs) for secure interactions with healthcare data. …”
    Get full text
    Article
  4. 44

    Comprehensive Review of Privacy, Utility, and Fairness Offered by Synthetic Data by A. Kiran, P. Rubini, S. Saravana Kumar

    Published 2025-01-01
    “…First and foremost, how well synthetic data can preserve privacy and control disclosure, second is how good is its utility, and third, are they able to give fair results without any bias when used in machine learning. …”
    Get full text
    Article
  5. 45

    Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage by Feng Tian, Xiaolin Gui, Jian An, Pan Yang, Jianqiang Zhao, Xuejun Zhang

    Published 2014-01-01
    “…As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. …”
    Get full text
    Article
  6. 46

    Explaining the unexplainable: data sharing and privacy in Web 3.0 by Shim Jieun, Kim Jieun

    Published 2025-03-01
    “…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
    Get full text
    Article
  7. 47

    Fair payments for privacy-preserving aggregation of mobile crowdsensing data by Mallikarjun Reddy Dorsala, V.N. Sastry, Sudhakar Chapram

    Published 2022-09-01
    “…To ensure the privacy of the data, privacy-preserving aggregation (PPA) has attracted much attention since it can find aggregated statistics on the encrypted data. …”
    Get full text
    Article
  8. 48

    Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks by Yong-Ki Kim, Hyunjo Lee, Min Yoon, Jae-Woo Chang

    Published 2013-06-01
    “…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
    Get full text
    Article
  9. 49

    A Survey on Association Rule Hiding in Privacy Preserving Data Mining by Arezoo Hekmatyar, Naser Nematbakhsh, Mohammad Naderi Dehkordi

    Published 2024-02-01
    “…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
    Get full text
    Article
  10. 50

    Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization by Xiaoxiao Wang, Jingjing Zhang, Huize Wan, Yuan Yao

    Published 2025-02-01
    “…The primary contribution of this work is an innovative approach that uses metaphorical visual language to represent the flow of user data, algorithms, and information. …”
    Get full text
    Article
  11. 51
  12. 52

    Exploring the association between cultural values and the intention to use digital data wallets by Varvara Keba, Tiago Oliveira, Melanie Trabandt

    Published 2025-12-01
    “…We developed a model to examine the intention to use digital data wallets – new privacy-enhancing tools based on the privacy calculus theory and Hofstede's cultural values. …”
    Get full text
    Article
  13. 53
  14. 54

    Security and privacy within smart cities by Putnik Nenad R., Marković Jana M.

    Published 2025-01-01
    “…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
    Get full text
    Article
  15. 55

    Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN by Saleh Alabdulwahab, Young-Tak Kim, Yunsik Son

    Published 2024-11-01
    “…This study proposes a privacy-preserving synthetic data generation method using a conditional tabular generative adversarial network (CTGAN) aimed at maintaining the utility of IoT sensor network data for IDS while safeguarding privacy. …”
    Get full text
    Article
  16. 56
  17. 57

    Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations by Marzieh Faridi Masouleh, Ali Harounabadi, Asal Sayyad

    Published 2022-03-01
    “…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
    Get full text
    Article
  18. 58

    Enhancing privacy in IoT-based healthcare using provable partitioned secure blockchain principle and encryption by C. S. Madhumathi, K. Vishnu Kumar

    Published 2025-08-01
    “…Data sharing is a significant concern in healthcare because of privacy leakage and security issues. …”
    Get full text
    Article
  19. 59

    On the fidelity versus privacy and utility trade-off of synthetic patient data by Tim Adams, Colin Birkenbihl, Karen Otte, Hwei Geok Ng, Jonas Adrian Rieling, Anatol-Fiete Näher, Ulrich Sax, Fabian Prasser, Holger Fröhlich

    Published 2025-05-01
    “…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
    Get full text
    Article
  20. 60

    Towards Self-Awareness Privacy Protection for Internet of Things Data Collection by Kok-Seng Wong, Myung Ho Kim

    Published 2014-01-01
    “…IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. …”
    Get full text
    Article