Search alternatives:
\\"usedds » \\"useddds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 161 - 180 results of 2,784 for search '"\"((((\\"usedds OR \"usedddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.16s Refine Results
  1. 161
  2. 162

    A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network by Jia Jia, Sathiya Sekar Kumarasamy, Kiran Sree Pokkuluri, K. Suresh Kumar, Thella Preethi Priyanka, Feng Wang

    Published 2024-01-01
    “…So, in our model after completing the node authentication and trust detection, privacy preservation of data is performed using Optimal Key-aided Data Sanitization (OPDS). …”
    Get full text
    Article
  3. 163

    Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU by Pascal Riedel, Kaouther Belkilani, Manfred Reichert, Gerd Heilscher, Reinhold von Schwerin

    Published 2024-12-01
    “…We propose a bottom-up, privacy-preserving prediction method using differential privacy (DP) to enhance data privacy for energy analytics on the customer side. …”
    Get full text
    Article
  4. 164

    (<italic>r, k, &#x03B5;</italic>)-Anonymization: Privacy-Preserving Data Publishing Algorithm Based on Multi-Dimensional Outlier Detection, <italic>k</italic>-Anonymity, and <itali... by Burak Cem Kara, Can Eyupoglu, Oktay Karakus

    Published 2025-01-01
    “…The general data protection regulation (GDPR) implementation, on the other hand, has introduced extensive control over the use of individuals&#x2019; personal information and placed many limits. …”
    Get full text
    Article
  5. 165

    Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network by Lusheng Shi, Huibo Zhu, Lin Chen

    Published 2013-11-01
    “…The algorithm uses homomorphism encryption techniques based on elliptic curve to address data privacy protection, and uses an efficient aggregate signature scheme to ensure data integrity and authenticity. …”
    Get full text
    Article
  6. 166

    Navigating the EU data governance labyrinth: A business perspective on data sharing in the financial sector by Eugénie Coche, Ans Kolk, Martijn Dekker

    Published 2024-02-01
    “…With policy-making (“on the books”) centred on guaranteeing data privacy and data security whilst promoting innovation, firms face complexities when implementing this framework “on the ground”. …”
    Get full text
    Article
  7. 167

    Privacy Auditing of Lithium-Ion Battery Ageing Model by Recovering Time-Series Data Using Gradient Inversion Attack in Federated Learning by Kaspars Sudars, Ivars Namatevs, Arturs Nikulins, Kaspars Ozols

    Published 2025-05-01
    “…The exchange of gradients is a widely used method in modelling systems for machine learning (e.g., distributed training, federated learning) in privacy-sensitive domains. …”
    Get full text
    Article
  8. 168

    Continuous location privacy protection mechanism based on differential privacy by Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA

    Published 2021-08-01
    “…Aiming at the problem of users’ location privacy leakage caused by continuously using LBS, a road privacy level (RPL) algorithm was proposed based on road topological network, which divided the privacy level of the road sections around the sensitive locations.Then, a differential privacy location protection mechanism (DPLPM) was proposed.Privacy budget was allocated for sensitive road sections and Laplace noise was added to realize the privacy protection of location data.The experimental results show that the mechanism has high data availability while protecting the privacy of location information.…”
    Get full text
    Article
  9. 169

    Exploration of Reproductive Health Apps’ Data Privacy Policies and the Risks Posed to Users: Qualitative Content Analysis by Nina Zadushlivy, Rizwana Biviji, Karmen S Williams

    Published 2025-03-01
    “…A qualitative content analysis of the apps and a review of the literature on data use policies, governmental data privacy regulations, and best practices for mobile app data privacy were conducted between January 2023 and July 2023. …”
    Get full text
    Article
  10. 170
  11. 171

    Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design by Tomás Robles, Borja Bordel, Ramón Alcarria, Diego Sánchez-de-Rivera

    Published 2020-05-01
    “…Nevertheless, the adequate implementation of these rights is not guaranteed, as services use the received data with commercial purposes. …”
    Get full text
    Article
  12. 172

    Navigating Data Privacy in Digital Public Services: Public Perceptions and Policy Implications. Romania Case Study by Mircea POPA

    Published 2024-07-01
    “…However, this reliance on data has raised critical concerns about privacy, security, and ethical data use. …”
    Get full text
    Article
  13. 173

    A Data Protection Method for the Electricity Business Environment Based on Differential Privacy and Federal Incentive Mechanisms by Xu Zhou, Hongshan Luo, Simin Chen, Yuling He

    Published 2025-06-01
    “…This paper conducts experiments using the data of Shenzhen City, Guangdong Province. …”
    Get full text
    Article
  14. 174

    Worldwide willingness to share health data high but privacy, consent and transparency paramount, a meta-analysis by Quita Olsen, Amalie Dyda, Leanna Woods, Elton Lobo, Rebekah Eden, Michelle A. Krahe, Bernadette Richards, Nalini Pather, Lesley McGee, Clair Sullivan, Jason D. Pole

    Published 2025-08-01
    “…Articles were included if they quantitatively examined the primary outcome; the public’s willingness to share health data for secondary use, while secondary outcomes included demographic and perception measures associated with willingness to share. …”
    Get full text
    Article
  15. 175

    Membership Inference Attacks Fueled by Few-Shot Learning to Detect Privacy Leakage and Address Data Integrity by Daniel Jiménez-López, Nuria Rodríguez-Barroso, M. Victoria Luzón, Javier Del Ser, Francisco Herrera

    Published 2025-05-01
    “…Deep learning models have an intrinsic privacy issue as they memorize parts of their training data, creating a privacy leakage. …”
    Get full text
    Article
  16. 176

    Federated Analysis With Differential Privacy in Oncology Research: Longitudinal Observational Study Across Hospital Data Warehouses by Théo Ryffel, Perrine Créquit, Maëlle Baillet, Jason Paumier, Yasmine Marfoq, Olivier Girardot, Thierry Chanet, Ronan Sy, Louise Bayssat, Julien Mazières, Vincent Vuiblet, Julien Ancel, Maxime Dewolf, François Margraff, Camille Bachot, Jacek Chmiel

    Published 2025-07-01
    “…Despite some pioneering work, federated analytics is still not widely used on real-world data, and to our knowledge, no real-world study has yet combined it with other privacy-enhancing techniques such as differential privacy (DP). …”
    Get full text
    Article
  17. 177

    FWFA: Fairness-Weighted Federated Aggregation for Privacy-Aware Decision Intelligence by Rahul Haripriya, Nilay Khare, Manish Pandey, Shrijal Patel, Jaytrilok Choudhary, Dhirendra Pratap Singh, Surendra Solanki, Duansh Sharma

    Published 2025-01-01
    “…As machine learning (ML) and artificial intelligence (AI) increasingly influence such decisions, promoting responsible AI that minimizes bias while preserving data privacy has become essential. However, existing fairness-aware models are often centralized or ill-equipped to handle non-IID data, limiting their real-world applicability. …”
    Get full text
    Article
  18. 178

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  19. 179

    Blockchain-Enhanced Privacy and Security in Electronic Health Records: A Scalable Framework for Decentralised Data Management by Nagaraj Segar, Vijayarajan Vijayan

    Published 2025-07-01
    “…The framework uniquely integrates a sidechain-enabled blockchain architecture with hybrid encryption (AES-256/RSA and ECC), optimising both scalability and data protection, and is validated using the real-world MIMIC-III dataset. …”
    Get full text
    Article
  20. 180

    A Tailored Compliance Solution for Securing Personal Data privacy under Law 18-07 in Algeria by Mohamed kamel Benkaddour, Redouane Guettal, Ph.D

    Published 2025-04-01
    “…The rapid flow of information and the ubiquity of technology pose significant challenges to data security and privacy. In response to these concerns, the Algerian state enacted Law 18-07 on June 10, 2018, aimed at protecting individuals concerning the processing of their data. …”
    Get full text
    Article