Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddddds » \"usedddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddddddddds » \"usedddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
901
Best practices for clinical trials data harmonization and sharing on NHLBI bioData catalyst (BDC) learned from CONNECTS network COVID-19 studies
Published 2025-01-01“…Responsible data-sharing requires addressing challenges associated with data privacy and confidentiality, data linkage, data quality, variable harmonization, data formats, and comprehensive metadata documentation to produce a high-quality, contextually rich, findable, accessible, interoperable, and reusable (FAIR) dataset. …”
Get full text
Article -
902
Personalization in Mobile Activity Recognition System Using -Medoids Clustering Algorithm
Published 2013-07-01Get full text
Article -
903
-
904
Binary Classification of Customer’s Online Purchasing Behavior Using Machine Learning
Published 2023-06-01“…The workflow is simple, adaptable, and suitable for UK banks, demonstrating the potential for practical implementation and data privacy. Future work will extend our approach to UK banks, reformulate the problem as a multi-class classification, and introduce pre-training automated steps for data analysis and transformation. …”
Get full text
Article -
905
A Multi-Image Cryptosystem Using Quantum Walks and Chebyshev Map
Published 2021-01-01Get full text
Article -
906
Using Machine Learning Algorithms in Intrusion Detection Systems: A Review
Published 2024-06-01Get full text
Article -
907
Optimizing encrypted search in the cloud using autoencoder-based query approximation
Published 2024-12-01“…Our work provides a rigorous evaluation of autoencoder-based query approximation for encrypted cloud search using real-world datasets. The research implement a general framework agnostic to model type, data modality, and encryption scheme. …”
Get full text
Article -
908
DKA Prediction in Children Using Artificial Intelligence: Improved Emergency Care
Published 2024-03-01Get full text
Article -
909
Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation
Published 2025-01-01“…In that experiment, conducted using the residences of volunteers and over one month, our system detected 99.1% of all DDoS attacks launched, with no false alarms.…”
Get full text
Article -
910
Detection of Malicious Clients in Federated Learning Using Graph Neural Network
Published 2025-01-01Get full text
Article -
911
SMS spam detection using BERT and multi-graph convolutional networks
Published 2025-01-01Get full text
Article -
912
Foundational models and federated learning: survey, taxonomy, challenges and practical insights
Published 2025-07-01Get full text
Article -
913
Data analysis in the healthcare context: a smart cities perspective
Published 2023-09-01“…For this, a bibliographic review was carried out, using the Methodi Ordinatio methodology, resulting in a portfolio of articles with scientific relevance, which was the source of data collection and analysis. …”
Get full text
Article -
914
Lightweight Block and Stream Cipher Algorithm: A Review
Published 2024-06-01“…Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. …”
Get full text
Article -
915
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Published 2024-04-01“…At present, the sparse matrix multiplication encryption method is used to protect the privacy of data in the matrix multiplication verifiable calculation scheme. …”
Get full text
Article -
916
Design of shuffling protocol based on additive secret sharing
Published 2024-08-01Get full text
Article -
917
Balancing Innovation and Ethics
Published 2025-03-01“…Opponents also point out privacy concerns and insufficient consumer data protection. …”
Get full text
Article -
918
Balancing Innovation and Ethics
Published 2025-03-01“…Opponents also point out privacy concerns and insufficient consumer data protection. …”
Get full text
Article -
919
When Digital Economy Meets Web3.0: Applications and Challenges
Published 2022-01-01“…In the digital economy scenario, the centralized nature of the Internet and other characteristics usually bring about security issues such as infringement and privacy leakage. Therefore, it is necessary to investigate how to use Web3.0 technologies to solve the pain points encountered in the development of the digital economy by fully exploring the critical technologies of digital economy and Web3.0. …”
Get full text
Article -
920
A content review of COVID-19-related apps used in Vietnam
Published 2025-02-01“…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
Get full text
Article