Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddddddds » \"useddddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
701
Do Cookie Banners Respect My Browsing Privacy? Measuring the Effectiveness of Cookie Rejection for Limiting Behavioral Advertising
Published 2024-01-01“…Online behavioral advertising (OBA) is a method within digital advertising that exploits web users’ interests to tailor ads. Its use has raised privacy concerns among researchers, regulators, and the media, emphasizing the need for a reliable mechanism to measure its prevalence. …”
Get full text
Article -
702
Investigating the Relationship between Social Skills and Social Acceptance with Academic Performance, Considering the Mediating Role of Ethical Privacy
Published 2025-05-01“…Four standard questionnaires of social skills, social acceptance, respect for moral privacy, and academic performance were used for gathering data. …”
Get full text
Article -
703
Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things.
Published 2024-01-01“…The digital watermark privacy protection method and the public service advertising work push privacy protection method are used to provide an innovative solution for public service advertising privacy protection. …”
Get full text
Article -
704
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks
Published 2025-02-01“…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
Get full text
Article -
705
Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities
Published 2025-06-01“…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
Get full text
Article -
706
Optimizing malicious website prediction: An advanced XGBoost-based machine learning model
Published 2025-05-01Get full text
Article -
707
Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis
Published 2024-12-01“…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
Get full text
Article -
708
The Adoption of Virtual Fitting Rooms in Iranian Sportswear Industries: A Mixed-Methods Study Based on TAM Model
Published 2024-02-01“…Structural equation modelling was used to test the hypotheses. SMART PLS and SPSS 23 software were used for data analysis.Findings: The results supported the positive effect of the factors perceived ease of use, perceived usefulness, perceived enjoyment, and fashion leadership, as well as the negative impact of technology anxiety on adopting this technology. …”
Get full text
Article -
709
Federated Learning for Surface Roughness
Published 2025-06-01“…A custom data acquisition system collected discharge current and spindle current signals, which were solely used as input features to train the deep learning model. …”
Get full text
Article -
710
-
711
QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles
Published 2019-07-01“…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
Get full text
Article -
712
Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response
Published 2024-07-01“…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
Get full text
Article -
713
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities
Published 2025-02-01“…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
Get full text
Article -
714
Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective
Published 2025-05-01“…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
Get full text
Article -
715
-
716
Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration
Published 2025-01-01“…Furthermore, the proposed framework includes a federated learning-based scheme that utilizes differential privacy and homomorphic encryption to ensure the privacy and integrity of the data to enhance model interpretability and efficiency with feature ranking to provide insights into attack patterns and anomaly characteristics. …”
Get full text
Article -
717
Privacy-Preserving Glycemic Management in Type 1 Diabetes: Development and Validation of a Multiobjective Federated Reinforcement Learning Framework
Published 2025-07-01“…Furthermore, these approaches typically rely on centralized data processing, which raises privacy concerns due to the sensitive nature of health care data. …”
Get full text
Article -
718
NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols
Published 2021-01-01“…Numerous techniques are available to address privacy infringement, including Private Information Retrieval (PIR) protocols that use peer nodes to preserve privacy. …”
Get full text
Article -
719
A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans
Published 2025-07-01“…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
Get full text
Article -
720
A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment
Published 2025-06-01“…Though sensor-driven devices have largely eased everyday lives, these healthcare systems have been suffering from various security breaches and data privacy problems. This evokes a need for designing intelligent systems to eradicate data breaches and privacy problems. …”
Get full text
Article