Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,021 - 1,040 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 1021

    Large language models generating synthetic clinical datasets: a feasibility and comparative analysis with real-world perioperative data by Austin A. Barr, Joshua Quan, Eddie Guo, Emre Sezgin, Emre Sezgin

    Published 2025-02-01
    “…Synthetic data offers a promising solution to preserve privacy while enabling broader data access. …”
    Get full text
    Article
  2. 1022

    Secure federated distillation GAN for CIDS in industrial CPS by Junwei LIANG, Geng YANG, Maode MA, Sadiq Muhammad

    Published 2023-12-01
    “…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
    Get full text
    Article
  3. 1023

    A secure and scalable blockchain-based model for electronic health record management by Kalyani Pampattiwar, Pallavi Chavan

    Published 2025-04-01
    “…Abstract In the contemporary digital era, the storage of Electronic Health Records on open platforms presents significant security and privacy challenges. Addressing these concerns requires standardizing the clinical deployment models currently in use. …”
    Get full text
    Article
  4. 1024

    Factors Affecting Personal Information Sharing: Small-Scale Sample Analysis on Social Media by Belia Rida Syifa Fauzia, Lukman Yudokusumo, Yova Ruldeviyani

    Published 2024-08-01
    “…These findings indicated that users’ trust, awareness, privacy concerns, and behavioral intentions significantly and positively influence the tendency to share personal data on social media platforms. …”
    Get full text
    Article
  5. 1025

    #BeSeen: understanding young people’s views of the motivation and impacts of sharing self-harm imagery online and use of their social media data for research—a UK participatory art... by Ann John, Ashrafunnesa Khanom, Todd Smith, Amanda Marchant, Dana Dekel, Harley Morgan, Sarah Tombs, Karen Ingham

    Published 2024-07-01
    “…Participants from the RAS group were more inclined to agree to their data being used and had higher levels of trust in government.Conclusion Young people care about their privacy and use of their data even when it is publicly available. …”
    Get full text
    Article
  6. 1026
  7. 1027

    Edge-FLGuard: A Federated Learning Framework for Real-Time Anomaly Detection in 5G-Enabled IoT Ecosystems by Manuel J. C. S. Reis

    Published 2025-06-01
    “…The rapid convergence of 5G networks and Internet of Things (IoT) technologies has unlocked unprecedented connectivity and responsiveness across smart environments—but has also amplified cybersecurity risks due to device heterogeneity, data privacy concerns, and distributed attack surfaces. …”
    Get full text
    Article
  8. 1028

    Navigating challenges/opportunities in developing smart agricultural extension platforms: Multi-media data mining techniques by Josué Kpodo, A. Pouyan Nejadhashemi

    Published 2025-09-01
    “…Addressing data privacy issues involves adhering to open-access principles and enforcing strict data encryption and anonymization standards. …”
    Get full text
    Article
  9. 1029

    Cybersecurity Anomaly Detection: AI and Ethereum Blockchain for a Secure and Tamperproof IoHT Data Management by Oluwaseun Priscilla Olawale, Sahar Ebadinezhad

    Published 2024-01-01
    “…Since medical Information Technology (IT) is evolving and data privacy is a major concern with sensors generally, in healthcare IoT. …”
    Get full text
    Article
  10. 1030

    Ethical implications related to processing of personal data and artificial intelligence in humanitarian crises: a scoping review by Tino Kreutzer, James Orbinski, Lora Appel, Aijun An, Jerome Marston, Ella Boone, Patrick Vinck

    Published 2025-04-01
    “…Abstract Background Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. …”
    Get full text
    Article
  11. 1031

    Establishing a Personal Data Protection Agency for E-Commerce in Indonesia: Legal Framework and Implementation Challenges by Bilqis Laila Nuzul Sa'adah, Sukarmi, Reka Dewantara

    Published 2024-12-01
    “…The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
    Get full text
    Article
  12. 1032

    Challenges and strategies in building a foundational digital health data integration ecosystem: a systematic review and thematic synthesis by Radha Ambalavanan, R Sterling Snead, Julia Marczika, Gideon Towett, Alex Malioukis, Mercy Mbogori-Kairichi

    Published 2025-06-01
    “…A thematic synthesis approach was used to categorize findings into three primary themes: interoperability, PCC, and genomic data integration.ResultsA total of 161 studies were included. …”
    Get full text
    Article
  13. 1033

    Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing by Vinothkumar.M, R. Saravana Ram

    Published 2025-04-01
    “…Besides, a Modified Digest hashing algorithm is also used with M-AES for feeding the encrypted text and hash into data blocks. …”
    Get full text
    Article
  14. 1034

    Putting health facilities on the map: a renewed call to create geolocated, comprehensive, updated, openly licensed dataset of health facilities in sub-Saharan African countries by Peter M. Macharia, Lenka Beňová, Nicolas Ray, Aline Semaan, Moses M. Musau, John Kapoi Kipterer, Mark Herringer, Robert W. Snow, Emelda A. Okiro

    Published 2025-04-01
    “…Consequently, multiple national and subnational parallel efforts attempt to construct HFDBs, resulting in duplication and lack of governmental input, use, and validation. Main body In this paper, we advocate for a harmonized SSA-wide HFDB. …”
    Get full text
    Article
  15. 1035

    Open Power System Datasets and Open Simulation Engines: A Survey Toward Machine Learning Applications by Ignacio Aravena, Chih-Che Sun, Ranyu Shi, Subir Majumder, Weihang Yan, Jhi-Young Joo, Le Xie, Jiyu Wang

    Published 2025-01-01
    “…In comparison, power grid datasets face three major challenges: (i) real-world data is often restricted by regulatory constraints, privacy reasons, or security concerns, making it difficult to obtain and work with; (ii) synthetic datasets, which are created to address these limitations, often have incomplete information and are released using specialized tools, making them inaccessible to the broader community; and, (iii) input-output datasets are difficult to generate through simulation for non-experts because open-source simulators are not known outside the power system community. …”
    Get full text
    Article
  16. 1036

    Self-Supervised Learning Powered by Synthetic Data From Diffusion Models: Application to X-Ray Images by Abdullah Hosseini, Ahmed Serag

    Published 2025-01-01
    “…Synthetic data offers a compelling solution to the challenges associated with acquiring high-quality medical data, which is often constrained by privacy concerns and limited accessibility. …”
    Get full text
    Article
  17. 1037

    Synthetic data trained open-source language models are feasible alternatives to proprietary models for radiology reporting by Aakriti Pandita, Angela Keniston, Nikhil Madhuripan

    Published 2025-07-01
    “…Abstract The study assessed the feasibility of using synthetic data to fine-tune various open-source LLMs for free text to structured data conversation in radiology, comparing their performance with GPT models. …”
    Get full text
    Article
  18. 1038
  19. 1039

    An Examination of Human Rights Related to the Protection of Debtor Customer Data and Information Through Bank Secrecy Rules by Erma Defiana Putriyanti, Abdul Rachmad Budiono, Sukarmi Sukarmi, Reka Dewantara

    Published 2025-03-01
    “… This research aims to examine and analyse how the protection of debtor customer data and information in the perspective of human rights. …”
    Get full text
    Article
  20. 1040

    Reversible Data Hiding in Encrypted Images Based on Edge-Directed Prediction and Multi-MSB Self-Prediction by Yingqiang Qiu

    Published 2025-01-01
    “…With the development of cloud computing, reversible data hiding in encrypted images (RDH-EI) technology has gained significant attention in ensuring data security and privacy protection. …”
    Get full text
    Article