Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddddddds » \"useddddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 681 - 700 results of 2,784 for search '"\"((((\\"useds OR \"usedddddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.23s Refine Results
  1. 681

    Quality and Privacy Policy Compliance of Mental Health Care Apps in China: Cross-Sectional Evaluation Study by Xinying Lin, Xingxing Wu, Ziping Zhu, Danting Chen, Hong Li, Rong Lin

    Published 2025-07-01
    “…Each app was assessed for general characteristics, professional context, functionality, quality, and privacy policy compliance using a previously published privacy policy compliance scale and the MARS. …”
    Get full text
    Article
  2. 682

    A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems by Yukun Niu, Xiaopeng Han, Chuan He, Yunfan Wang, Zhigang Cao, Ding Zhou

    Published 2025-07-01
    “…Comprehensive evaluations using natural gas pipeline pressure control and smart grid voltage control systems demonstrate superior performance: the proposed method achieves 100% system availability compared to 62.57% for static redundancy and 86.53% for moving target defense, maintains 99.98% availability even under common-mode attacks (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>10</mn><mrow><mo>−</mo><mn>2</mn></mrow></msup></semantics></math></inline-formula> probability), and consistently outperforms moving target defense methods integrated with state-of-the-art detection mechanisms (99.7790% and 99.6735% average availability when false data deviations from true values are 5% and 3%, respectively) across different attack detection scenarios, validating its effectiveness in defending against availability attacks and privacy leakage threats in cloud–edge collaboration environments.…”
    Get full text
    Article
  3. 683

    Neutrosophic Logic for Secure Hand-Based Biometrics: Quantifying Privacy-Security Tradeoffs in Remote Authentication Systems by A. A. Salama, Abdelnasser Mohamed, Huda E. Khalid, Ahmed K. Essa, Doaa E. Mossa

    Published 2025-07-01
    “…To address this gap, we propose a vulnerability assessment framework grounded in neutrosophic logic [11], which evaluates system robustness through truth (T), indeterminacy (I), and falsity (F) membership functions, and this approach quantifies the trade-offs between security and privacy, revealing that hand-based biometrics achieve 92% security effectiveness (T = 0.8) while retaining an 18% uncertainty factor ( 𝐼 = 0.4 ) concerning potential vulnerabilities, and added analysis further identifies deficiencies in template protection (F = 0.2) and data transmission protocols, and we, proposed framework advances us the evaluation of biometric systems by using integrating neutrosophic uncertainty modeling, and it provides actionable insights for designing secure remote authentication architectures. …”
    Get full text
    Article
  4. 684

    A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network by Jin Wang, Hao Wu, Yudian Liu

    Published 2015-10-01
    “…While obtaining convenient services, the exploitation of mass location data is inevitably leading to a serious concern about location privacy security. …”
    Get full text
    Article
  5. 685
  6. 686
  7. 687
  8. 688

    Dynamic selectout and voting-based federated learning for enhanced medical image analysis by Saeed Iqbal, Adnan N Qureshi, Musaed Alhussein, Khursheed Aurangzeb, Atif Mahmood, Saaidal Razalli Bin Azzuhri

    Published 2025-01-01
    “…This strategy has a lot of potential to improve FL across a range of applications, especially those that prioritize data privacy, diversity, and performance.…”
    Get full text
    Article
  9. 689

    Vehicle Trajectory Generation Based on Generation Adversarial Network by Zhonghe He, Renchi Shao, Sijia Xiang

    Published 2024-06-01
    “…In this paper, the vehicle travel time of sample trajectory data and virtual trajectory data is used as indicators for statistical analysis. …”
    Get full text
    Article
  10. 690
  11. 691

    Hybrid Optimization Machine Learning Framework for Enhancing Trust and Security in Cloud Network by Himani Saini, Gopal Singh, Amrinder Kaur, Sunil Saini, Niyaz Ahmad Wani, Vikram Chopra, Zahid Akhtar, Shahid Ahmad Bhat

    Published 2024-01-01
    “…The rapidly evolving field of cloud-based data sharing faces critical challenges in ensuring comprehensive privacy protection and trust for both data producers and seekers. …”
    Get full text
    Article
  12. 692

    Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach by Vankamamidi S. Naresh, Sivaranjani Reddi

    Published 2025-02-01
    “…Abstract Homomorphic Encryption (HE) offers a revolutionary cryptographic approach to safeguarding privacy in machine learning (ML), especially in processing sensitive healthcare data. …”
    Get full text
    Article
  13. 693

    Design of an improved graph-based model for real-time anomaly detection in healthcare using hybrid CNN-LSTM and federated learning by G Muni Nagamani, Chanumolu Kiran Kumar

    Published 2024-12-01
    “…This system processes over 100,000 messages per second with less than 50 ms of inference latency to enable the prompting of clinical responses. We use Federated Learning combined with Differential Privacy to solve our data security and privacy tasks. …”
    Get full text
    Article
  14. 694

    Security and privacy in online teaching during the COVID-19 pandemic: experiences and concerns of academics in Saudi higher education by Basmah Almekhled, Helen Petrie

    Published 2024-11-01
    “…The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. …”
    Get full text
    Article
  15. 695

    Old MacDonald and His Hackable Smartphone Application: A Security and Privacy Analysis of Android Agriculture Applications by Logan Mears, Rachel Donner, George Grispos

    Published 2025-01-01
    “…Despite the widespread use of smartphones among farmers increasing from 77% in 2021 to 82% in 2023, minimal research has examined the security and privacy implications of agricultural smartphone applications, potentially used on these devices. …”
    Get full text
    Article
  16. 696

    Collaborative and privacy-preserving cross-vendor united diagnostic imaging via server-rotating federated machine learning by Hao Wang, Xiaoyu Zhang, Xuebin Ren, Zheng Zhang, Shusen Yang, Chunfeng Lian, Jianhua Ma, Dong Zeng

    Published 2025-08-01
    “…Additionally, the communication protocol of SRFLM provides strong privacy guarantees using differential privacy. We extensively evaluate SRFLM across multiple cross-vendor diagnostic imaging tasks. …”
    Get full text
    Article
  17. 697

    Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR) System by G. Nouskalis

    Published 2011-01-01
    “…The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. …”
    Get full text
    Article
  18. 698

    PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare by Hegde Manjunath, M. Karthik, Hegde Varun, Rao Rohini R., Mantoor Vinayak M., Bhat Radhakrishna

    Published 2025-04-01
    “…PLASMA’s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. …”
    Get full text
    Article
  19. 699

    Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging by Hadi Mahdipour, Jaime Laviada, Fernando Las-Heras Andres, Mehdi Sookhak

    Published 2025-01-01
    “…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
    Get full text
    Article
  20. 700

    Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies by Kumar Rahul, Shieh Chin-Shiuh, Chakrabarti Prasun, Kumar Ashok, Moolchandani Jhankar, Sinha Raj

    Published 2025-01-01
    “…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
    Get full text
    Article