Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 81 - 100 results of 2,784 for search '"\"((((\\"usedds OR \"useddddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.11s Refine Results
  1. 81

    Security control scheme for cloud data copy based on differential privacy model by Jun REN, Jin-bo XIONG, Zhi-qiang YAO

    Published 2017-05-01
    “…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
    Get full text
    Article
  2. 82

    Enhancing Medical Data Privacy: Neural Network Inference with Fully Homomorphic Encryption by Maulyanda Maulyanda, Rini Deviani, Afdhaluzzikri Afdhaluzzikri

    Published 2025-04-01
    “…Protecting the privacy of medical data while enabling sophisticated data analysis is a critical challenge in modern healthcare. …”
    Get full text
    Article
  3. 83

    Privacy, personal data protection and the digital age: A (criminal) law "omnibus" by Banović Jovana M., Radisavljević Ivana M.

    Published 2025-01-01
    “…This complexity is further amplified by the development of artificial intelligence, which inherently relies on the use of vast amounts of data. The aim of this paper is to identify some of the critical elements in the protection of privacy rights, particularly those related to personal data most closely linked to individuals, and to raise the question of potential legislative amendments.…”
    Get full text
    Article
  4. 84

    Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy by Renwu Yan, Yang Zheng, Ning Yu, Cen Liang

    Published 2024-03-01
    “…Under the general trend of the rapid development of smart grids, data security and privacy are facing serious challenges; protecting the privacy data of single users under the premise of obtaining user-aggregated data has attracted widespread attention. …”
    Get full text
    Article
  5. 85

    Publishing neural networks in drug discovery might compromise training data privacy by Fabian P. Krüger, Johan Östman, Lewis Mervin, Igor V. Tetko, Ola Engkvist

    Published 2025-03-01
    “…Abstract This study investigates the risks of exposing confidential chemical structures when machine learning models trained on these structures are made publicly available. We use membership inference attacks, a common method to assess privacy that is largely unexplored in the context of drug discovery, to examine neural networks for molecular property prediction in a black-box setting. …”
    Get full text
    Article
  6. 86

    A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment by Mustafa Azeez AL Mayyahi, Seyed Amin Hosseini Seno

    Published 2022-12-01
    “…However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. …”
    Get full text
    Article
  7. 87

    Empowering open data sharing for social good: a privacy-aware approach by Tânia Carvalho, Luís Antunes, Cristina Costa Santos, Nuno Moniz

    Published 2025-02-01
    “…Such a sharing process should adhere to state-of-the-art methods in Data Protection by Design and by Default. In this paper, we use a Covid-19 data set from Portugal’s second-largest hospital to show how it is feasible to ensure data privacy while improving the quality and maintaining the utility of the data. …”
    Get full text
    Article
  8. 88

    Protection of gait data set for preserving its privacy in deep learning pipeline by Anubha Parashar, Rajveer Singh Shekhawat

    Published 2022-11-01
    “…Such modified data prevent hackers from making use of the data set for adversarial attacks. …”
    Get full text
    Article
  9. 89

    Federated learning: a privacy-preserving approach to data-centric regulatory cooperation by Alexander Horst, Paul Loustalot, Sanjeev Yoganathan, Ting Li, Joshua Xu, Weida Tong, David Schneider, Nicolas Löffler-Perez, Erminio Di Renzo, Michael Renaudin

    Published 2025-05-01
    “…Regulatory agencies aim to ensure the safety and efficacy of medical products but often face legal and privacy concerns that hinder collaboration at the data level. …”
    Get full text
    Article
  10. 90

    Privacy concerns and avoidance behaviour towards data-driven online behavioural advertising by Shradha Jain, H.C. Purohit

    Published 2022-11-01
    “…Design/methodology/approach – The study employed an online survey method for data collection using a sample size of 345. Reliability and validity of the measurement scales were ensured, and hypotheses developed were tested through PLS-SEM using SMART PLS. …”
    Get full text
    Article
  11. 91

    Desensitized Financial Data Generation Based on Generative Adversarial Network and Differential Privacy by Fan Zhang, Luyao Wang, Xinhong Zhang

    Published 2025-02-01
    “…This paper proposes a Noise Visibility Function-Differential Privacy Generative Adversarial Network (NVF-DPGAN) model, which generates privacy preserving data similar to the original data, and can be applied to data augmentation for deep learning. …”
    Get full text
    Article
  12. 92

    Internet of things data security and privacy protection based on improved federated learning by Wang Gang

    Published 2025-07-01
    “…At the same time, using the decentralized function to encrypt the privacy of the training model, the learning model can provide more secure and reliable services, aiming to solve the problem of large difference in the quality of computing nodes and data privacy leakage in the current FL. …”
    Get full text
    Article
  13. 93

    Federated learning for privacy-enhanced mental health prediction with multimodal data integration by Parul Dubey, Pushkar Dubey, Pitshou N. Bokoro

    Published 2025-12-01
    “…The proposed framework incorporates a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) network within a federated learning environment, ensuring that raw user data remains decentralised and privacy is preserved using differential privacy and encryption techniques. …”
    Get full text
    Article
  14. 94

    Privacy-Aware Table Data Generation by Adversarial Gradient Boosting Decision Tree by Shuai Jiang, Naoto Iwata, Sayaka Kamei, Kazi Md. Rokibul Alam, Yasuhiko Morimoto

    Published 2025-08-01
    “…Privacy preservation poses significant challenges in third-party data sharing, particularly when handling table data containing personal information such as demographic and behavioral records. …”
    Get full text
    Article
  15. 95
  16. 96

    Legitimate Expectations of Privacy in the Era of Digitalization by E. Ostanina, E. Titova

    Published 2023-04-01
    “…This article contends that in the present era of digitalization people’s right to privacy should be protected no less than it was before the widespread use of digital technologies. …”
    Get full text
    Article
  17. 97

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…However, this extensive coverage raises substantial concerns about data privacy and traceability, particularly during the claim process, as policyholders currently have limited control over and insight into how their data is accessed and used.MethodsTo address these challenges, we propose a blockchain-based model designed to enhance policyholders’ private control over data access and improve traceability throughout the NHI claim process. …”
    Get full text
    Article
  18. 98

    Sharing is CAIRing: Characterizing principles and assessing properties of universal privacy evaluation for synthetic tabular data by Tobias Hyrup, Anton Danholt Lautrup, Arthur Zimek, Peter Schneider-Kamp

    Published 2024-12-01
    “…However, the ability to share data is hindered by regulations protecting the privacy of natural persons. …”
    Get full text
    Article
  19. 99

    Privacy under threat – The intersection of IoT and mass surveillance by Siniša Domazet, Darko Marković, Tatjana Skakavac

    Published 2024-10-01
    “…It has been shown that there are issues with applying existing regulations to IoT and mass surveillance and that no universal legal framework currently exists to protect the right to privacy. The use of IoT technology, especially given the rapid development of artificial intelligence, will in the future raise numerous dilemmas regarding the entities responsible for collecting personal data, the consents required for data usage and processing, where the collected personal data will be used, and for what purposes. …”
    Get full text
    Article
  20. 100