Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
-
141
CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK
Published 2016-07-01“…The article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. …”
Get full text
Article -
142
Going global: Comparing Chinese mobile applications’ data and user privacy governance at home and abroad
Published 2020-09-01“…Lastly, we conducted content analysis of the terms of service and privacy policies to establish the app’s data collection, storage, transfer, use, and disclosure measures. …”
Get full text
Article -
143
Sharing extended summary data from contemporary genetics studies is unlikely to threaten subject privacy.
Published 2017-01-01Get full text
Article -
144
Privacy Protection Based Secure Data Transaction Protocol for Smart Sensor Meter in Smart Grid
Published 2013-11-01“…They could then burgle the house. We propose a privacy-enhanced secure data transaction protocol that can protect private data by encrypting them. …”
Get full text
Article -
145
IoT medical device risks: Data security, privacy, confidentiality and compliance with HIPAA and COBIT 2019
Published 2025-02-01“…Purpose: This study aimed to develop a comprehensive framework to enable the identification of risks pertaining to data security, privacy and confidentiality when using medical Internet of Things (IoT) devices. …”
Get full text
Article -
146
A hybrid encryption algorithm based approach for secure privacy protection of big data in hospitals
Published 2024-12-01“…First, collect hospital big data including hospital medical business system, mobile wearable devices and big health data; Secondly, use byte changes to compress hospital big data to achieve safe transmission of hospital big data; Then, the hospital sender uses the AES session key to encrypt the hospital big data and the ECC public key to encrypt the AES session key, uses SHA-1 to calculate the hash value of the medical big data, and uses the ECC public key to sign the hash value; The hospital receiver uses the ECC private key to verify the signature, and decrypts the AES session key using the ECC private key. …”
Get full text
Article -
147
ChatAnalysis revisited: can ChatGPT undermine privacy in smart homes with data analysis?
Published 2025-03-01“…While empowering users, this raises critical privacy concerns when used to analyze data from personal spaces, such as smart-home environments. …”
Get full text
Article -
148
Metric and classification model for privacy data based on Shannon information entropy and BP neural network
Published 2018-12-01“…The trained BP neural network was used to output the classification result of privacy data without pre-determining the metric weight. …”
Get full text
Article -
149
Metric and classification model for privacy data based on Shannon information entropy and BP neural network
Published 2018-12-01“…The trained BP neural network was used to output the classification result of privacy data without pre-determining the metric weight. …”
Get full text
Article -
150
Airbnb in New York City: whose privacy rights are threatened by a Government Data grab?
Published 2019-12-01“…Using Local Law 146 as a lens, this Note examines the privacy issues implicated by data- collection laws and discusses which parties can assert these privacy rights, particularly given recent changes in third-party doctrine jurisprudence. …”
Get full text
Article -
151
Medical data privacy protection based on blockchain asymmetric encryption algorithm and generative adversarial network
Published 2025-02-01“…In the blockchain environment, asymmetric encryption algorithms are used to generate private keys and public keys to encrypt user privacy data. …”
Get full text
Article -
152
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01“…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
Get full text
Article -
153
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01“…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
Get full text
Article -
154
A Combined Approach of Heat Map Confusion and Local Differential Privacy for the Anonymization of Mobility Data
Published 2025-07-01“…Mobility data plays a crucial role in modern location-based services (LBSs), yet it poses significant privacy risks, as it can reveal highly sensitive information such as home locations and behavioral patterns. …”
Get full text
Article -
155
Navigating the privacy paradox in a digital age: balancing innovation, data collection and ethical responsibility
Published 2025-06-01“…Purpose – The purpose of this paper is to explore the intersection of generative artificial intelligence (AI), data collection and consumer privacy, highlighting ethical tensions in AI-driven advertising. …”
Get full text
Article -
156
Mamba-fusion for privacy-preserving disease prediction
Published 2025-07-01“…Experimental results on multi-modal clinical measurements, ECG, EEG, clinical notes, and demographic data support the applied framework. We have then used Mamba-Fusion to achieve 92:4% accuracy, 0:91 F-Score, and 0:96 AUC-ROC by keeping the privacy leakage at 0:02 and communication costs to 12:5 MB, which make it superior to conventional FL techniques. …”
Get full text
Article -
157
Practical and privacy-preserving geo-social-based POI recommendation
Published 2024-03-01“…Specifically, we first utilize the quad tree to organize geographic data and the MinHash method to index social data. …”
Get full text
Article -
158
Privacy-preserving federated learning framework with dynamic weight aggregation
Published 2022-10-01“…There are two problems with the privacy-preserving federal learning framework under an unreliable central server.① A fixed weight, typically the size of each participant’s dataset, is used when aggregating distributed learning models on the central server.However, different participants have non-independent and homogeneously distributed data, then setting fixed aggregation weights would prevent the global model from achieving optimal utility.② Existing frameworks are built on the assumption that the central server is honest, and do not consider the problem of data privacy leakage of participants due to the untrustworthiness of the central server.To address the above issues, based on the popular DP-FedAvg algorithm, a privacy-preserving federated learning DP-DFL algorithm for dynamic weight aggregation under a non-trusted central server was proposed which set a dynamic model aggregation weight.The proposed algorithm learned the model aggregation weight in federated learning directly from the data of different participants, and thus it is applicable to non-independent homogeneously distributed data environment.In addition, the privacy of model parameters was protected using noise in the local model privacy protection phase, which satisfied the untrustworthy central server setting and thus reduced the risk of privacy leakage in the upload of model parameters from local participants.Experiments on dataset CIFAR-10 demonstrate that the DP-DFL algorithm not only provides local privacy guarantees, but also achieves higher accuracy rates with an average accuracy improvement of 2.09% compared to the DP-FedAvg algorithm models.…”
Get full text
Article -
159
-
160