Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 121 - 140 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.11s Refine Results
  1. 121
  2. 122

    Advancing Data Privacy in Cloud Storage: A Novel Multi-Layer Encoding Framework by Kamta Nath Mishra, Rajesh Kumar Lal, Paras Nath Barwal, Alok Mishra

    Published 2025-07-01
    “…Data privacy is a crucial concern for individuals using cloud storage services, and cloud service providers are increasingly focused on meeting this demand. …”
    Get full text
    Article
  3. 123

    South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions by Nawal Omar, Scott Timcke

    Published 2024-12-01
    “…The analysis revealed several security and privacy concerns, including inadequately secured API keys, the potential for unauthorised access, and the potential for data breaches. …”
    Get full text
    Article
  4. 124

    Privacy Risk Assessment of Medical Big Data Based on Information Entropy and FCM Algorithm by Xiaoliang Zhang, Tianwei Guo

    Published 2024-01-01
    “…However, the high sensitivity and privacy of medical data also bring serious security challenges. …”
    Get full text
    Article
  5. 125

    DP-FedCMRS: Privacy-Preserving Federated Learning Algorithm to Solve Heterogeneous Data by Yang Zhang, Shigong Long, Guangyuan Liu, Junming Zhang

    Published 2025-01-01
    “…In federated learning, non-independently and non-identically distributed heterogeneous data on the clients can limit both the convergence speed and model utility of federated learning, and gradients can be used to infer original data, posing a threat to user privacy. …”
    Get full text
    Article
  6. 126

    A Blockchain-Based Secure Data Transaction and Privacy Preservation Scheme in IoT System by Jing Wu, Zeteng Bian, Hongmin Gao, Yuzhe Wang

    Published 2025-08-01
    “…With the explosive growth of Internet of Things (IoT) devices, massive amounts of heterogeneous data are continuously generated. However, IoT data transactions and sharing face multiple challenges such as limited device resources, untrustworthy network environment, highly sensitive user privacy, and serious data silos. …”
    Get full text
    Article
  7. 127

    Ethical Dilemmas and Coping Strategies in the Use of Psychological Scales in the Era of Big Data by Lirong LIU, Yanan ZHENG

    Published 2025-04-01
    “…Focusing on the ethical risks arising from the reconstruction of psychological scales due to innovations in big data technology, a systematic analysis is conducted on the research and current use of psychological scales within the context of big data. …”
    Get full text
    Article
  8. 128

    Multi-party summation query method based on differential privacy by Xianmang HE

    Published 2020-06-01
    “…Differential privacy is considered to be a very reliable protection mechanism because it does not require the a prior knowledge for the attacker.However,differential privacy is rarely used in a multi-party environment.In view of this,the differential privacy is applied to the data summation query in multi-party environment.This method was described in detail and proved the security of the method.…”
    Get full text
    Article
  9. 129

    Knowledge Distillation for Face Recognition Using Synthetic Data With Dynamic Latent Sampling by Hatef Otroshi Shahreza, Anjith George, Sebastien Marcel

    Published 2024-01-01
    “…We propose a new framework (called SynthDistill) to train lightweight face recognition models by distilling the knowledge from a pretrained teacher model using synthetic data. We generate synthetic face images without identity labels, mitigating the problems in the intra-class variation generation of synthetic datasets, and dynamically sample from the intermediate latent space of a face generator network to generate new variations of the challenging images while further exploring new face images. …”
    Get full text
    Article
  10. 130
  11. 131

    Federated LeViT-ResUNet for Scalable and Privacy-Preserving Agricultural Monitoring Using Drone and Internet of Things Data by Mohammad Aldossary, Jaber Almutairi, Ibrahim Alzamil

    Published 2025-04-01
    “…New drone photography and IoT sensors offer quick, high-resolution, multimodal agricultural data collecting. Regional diversity, data heterogeneity, and privacy problems make it hard to conclude these data. …”
    Get full text
    Article
  12. 132
  13. 133

    Efficient and Privacy-Preserving Decision Tree Inference via Homomorphic Matrix Multiplication and Leaf Node Pruning by Satoshi Fukui, Lihua Wang, Seiichi Ozawa

    Published 2025-05-01
    “…Cloud computing is widely used by organizations and individuals to outsource computation and data storage. …”
    Get full text
    Article
  14. 134

    A differentially-private mechanism for multi-level data publishing by Wen-jing ZHANG, Hui LI

    Published 2015-12-01
    “…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
    Get full text
    Article
  15. 135
  16. 136
  17. 137

    What we do with data: a performative critique of data 'collection' by Garfield Benjamin

    Published 2021-12-01
    “…How do terms and practices relate in defining the norms of data in society? This article undertakes a critique of data collection using data feminism and a performative theory of privacy: as a resource, an objective discovery and an assumption. …”
    Get full text
    Article
  18. 138

    A comprehensive survey on big data privacy and Hadoop security: Insights into encryption mechanisms and emerging trends by Youness Filaly, Nisrine Berros, Fatna El mendili, Younes El Bouzekri EL idrissi

    Published 2025-09-01
    “…We find weaknesses in existing techniques via a comparative study and provide a hybrid encryption system aimed at secure and efficient data processing in Hadoop settings. Researchers and practitioners searching for scalable, privacy-preserving big data platform solutions should use this paper as a reference.…”
    Get full text
    Article
  19. 139

    Privacy-Aware Detection for Large Language Models Using a Hybrid BiLSTM-HMM Approach by Maryam Abbasalizadeh, Sashank Narain

    Published 2025-01-01
    “…However, their deployment introduces significant privacy concerns, including the memorization and unintended disclosure of sensitive data. …”
    Get full text
    Article
  20. 140

    When Poor-Quality Data Meet Anonymization Models: Threats and Countermeasures by Abdul Majeed, Seong Oun Hwang

    Published 2025-01-01
    “…For example, skewed data may lead to imbalanced learning when used in machine learning (ML) classifiers. …”
    Get full text
    Article