Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
41
Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering
Published 2020-02-01“…In this article, a novel scheme for data hiding in encrypted domain is proposed using fuzzy C-means clustering and compressive sensing technologies to protect privacy of the host image. …”
Get full text
Article -
42
Enhance differential privacy mechanisms for clinical data analysis using CNNs and reinforcement learning
Published 2025-07-01“…The primary emphasis is on predicting and optimizing ventilation and sedation strategies for patients in Intensive Care Units. We safeguard patient data in the MIMIC-III dataset while preserving analytical utility by integrating differential privacy techniques, such as Gaussian, Laplace, Exponential, Zero-Concentrated, and Rényi mechanisms. …”
Get full text
Article -
43
Privacy-Preserving Healthcare Data Interactions: A Multi-Agent Approach Using LLMs
Published 2025-03-01“…This study builds on prior research [1] by introducing a multi-agent system that uses Large Language Models (LLMs) for secure interactions with healthcare data. …”
Get full text
Article -
44
Comprehensive Review of Privacy, Utility, and Fairness Offered by Synthetic Data
Published 2025-01-01“…First and foremost, how well synthetic data can preserve privacy and control disclosure, second is how good is its utility, and third, are they able to give fair results without any bias when used in machine learning. …”
Get full text
Article -
45
Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage
Published 2014-01-01“…As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. …”
Get full text
Article -
46
Explaining the unexplainable: data sharing and privacy in Web 3.0
Published 2025-03-01“…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
Get full text
Article -
47
Fair payments for privacy-preserving aggregation of mobile crowdsensing data
Published 2022-09-01“…To ensure the privacy of the data, privacy-preserving aggregation (PPA) has attracted much attention since it can find aggregated statistics on the encrypted data. …”
Get full text
Article -
48
Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks
Published 2013-06-01“…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
Get full text
Article -
49
A Survey on Association Rule Hiding in Privacy Preserving Data Mining
Published 2024-02-01“…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
Get full text
Article -
50
Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization
Published 2025-02-01“…The primary contribution of this work is an innovative approach that uses metaphorical visual language to represent the flow of user data, algorithms, and information. …”
Get full text
Article -
51
Meta-analysis of privacy legal framework: revising the various approaches for balancing privacy risks and usability of healthcare information systems | Meta-analisi del quadro norm...
Published 2022-01-01“…A proactive approach to managing these risks involves the use of privacy by design frameworks and conceptual tools. …”
Get full text
Article -
52
Exploring the association between cultural values and the intention to use digital data wallets
Published 2025-12-01“…We developed a model to examine the intention to use digital data wallets – new privacy-enhancing tools based on the privacy calculus theory and Hofstede's cultural values. …”
Get full text
Article -
53
Study on choosing the parameter ε in differential privacy
Published 2015-12-01Get full text
Article -
54
Security and privacy within smart cities
Published 2025-01-01“…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
Get full text
Article -
55
Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN
Published 2024-11-01“…This study proposes a privacy-preserving synthetic data generation method using a conditional tabular generative adversarial network (CTGAN) aimed at maintaining the utility of IoT sensor network data for IDS while safeguarding privacy. …”
Get full text
Article -
56
Disease prevention versus data privacy: using landcover maps to inform spatial epidemic models.
Published 2012-01-01Get full text
Article -
57
Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations
Published 2022-03-01“…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
Get full text
Article -
58
Enhancing privacy in IoT-based healthcare using provable partitioned secure blockchain principle and encryption
Published 2025-08-01“…Data sharing is a significant concern in healthcare because of privacy leakage and security issues. …”
Get full text
Article -
59
On the fidelity versus privacy and utility trade-off of synthetic patient data
Published 2025-05-01“…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
Get full text
Article -
60
Towards Self-Awareness Privacy Protection for Internet of Things Data Collection
Published 2014-01-01“…IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. …”
Get full text
Article