Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddddddds » \"useddddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 481 - 500 results of 2,784 for search '"\"((((\\"useds OR \"usedddddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 481

    GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence by Mohd Anjum, Ashit Kumar Dutta, Ali Elrashidi, Sana Shahab, Asma Aldrees, Zaffar Ahmed Shaikh, Abeer Aljohani

    Published 2025-08-01
    “…Federated learning is incorporated to maintain data privacy by training models locally on each device without sharing raw data. …”
    Get full text
    Article
  2. 482

    Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems by Firdous Kausar, Sambrdhi Deo, Sajid Hussain, Zia Ul Haque

    Published 2024-10-01
    “…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
    Get full text
    Article
  3. 483

    Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption by Filip Jerkovic, Nurul I. Sarkar, Jahan Ali

    Published 2025-06-01
    “…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
    Get full text
    Article
  4. 484

    Fused federated learning framework for secure and decentralized patient monitoring in healthcare 5.0 using IoMT by Bassam Almogadwy, Abdulrahman Alqarafi

    Published 2025-07-01
    “…Abstract Federated Learning (FL) enables artificial intelligence frameworks to train on private information without compromising privacy, which is especially useful in the medical and healthcare industries where the knowledge or data at hand is never enough. …”
    Get full text
    Article
  5. 485

    Scalable architecture for autonomous malware detection and defense in software-defined networks using federated learning approaches by Ripal Ranpara, Shobhit K. Patel, Om Prakash Kumar, Fahad Ahmed Al-Zahrani

    Published 2025-08-01
    “…Our architecture minimizes privacy risks by ensuring that raw data never leaves the device; only model updates are shared for aggregation at the global level. …”
    Get full text
    Article
  6. 486

    Legal grounds for police officers' body-worn cameras by Milidragović Dragan, Milić Nenad, Petrović Zlatko

    Published 2025-01-01
    “…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
    Get full text
    Article
  7. 487
  8. 488

    Balancing act: Europeans' privacy calculus and security concerns in online CSAM detection by Răzvan Rughiniş, Simona-Nicoleta Vulpe, Dinu Ţurcanu, Daniel Rosner

    Published 2025-01-01
    “…This study examines privacy calculus in online child sexual abuse material (CSAM) detection across Europe, using Flash Eurobarometer 532 data. …”
    Get full text
    Article
  9. 489

    COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App by Mona Naomi Lintvedt

    Published 2021-12-01
    “…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
    Get full text
    Article
  10. 490
  11. 491

    Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population by Aaro Tupasela, Juanita Devis Clavijo, Marjut Salokannel, Christoph Fink

    Published 2023-03-01
    “…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
    Get full text
    Article
  12. 492
  13. 493

    Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age by Ahmad Mansour, Khaled Alshaketheep, Hind Al-Ahmed, Ahmad Shajrawi, Arafat Deeb

    Published 2025-06-01
    “…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
    Get full text
    Article
  14. 494

    Social Media Suicide Watch by Katherine Prothro

    Published 2025-07-01
    “…There was an immediate backlash due to concerns over privacy and the potential for stalkers and bullies to misuse this data and encourage suicide or self-harm, like Roy’s girlfriend did. …”
    Get full text
    Article
  15. 495

    Redefining customer connections in the UAE’s digital era: A study on emerging technological synergies by Hussam Ali, Ehab Haikal

    Published 2025-06-01
    “…This study investigates the socio-technical implications of IoT integration, particularly its effects on operational efficiency, customer engagement, digital inclusivity, ethical data practices, and sustainability. The research used a quantitative cross-sectional survey conducted from February to April 2024 across the UAE. …”
    Get full text
    Article
  16. 496
  17. 497

    Optimization of machine learning methods for de-anonymization in social networks by Nurzhigit Smailov, Fatima Uralova, Rashida Kadyrova, Raiymbek Magazov, Akezhan Sabibolda

    Published 2025-03-01
    “…Anonymity features are widely used to help individuals maintain their privacy, but they can also be exploited for malicious purposes. …”
    Get full text
    Article
  18. 498

    Social Implications of Technological Advancements in Sentiment Analysis: A Literature Review on Potential and Consequences over the Next 20 Years by Daryanto, Ika Safitri Windiarti, Bagus Setya Rintyarna

    Published 2025-02-01
    “…It enables more responsive policy design by understanding public emotions in political and social contexts. However, data privacy, misinformation, and diminished critical thinking persist. …”
    Get full text
    Article
  19. 499

    Artificial Intelligence-Driven Facial Image Analysis for the Early Detection of Rare Diseases: Legal, Ethical, Forensic, and Cybersecurity Considerations by Peter Kováč, Peter Jackuliak, Alexandra Bražinová, Ivan Varga, Michal Aláč, Martin Smatana, Dušan Lovich, Andrej Thurzo

    Published 2024-06-01
    “…Current and future developments must focus on securing AI models against attacks, ensuring data integrity, and safeguarding the privacy of individuals within this technological landscape.…”
    Get full text
    Article
  20. 500