Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 281 - 300 results of 2,784 for search '"\"((((\\"useds OR \"useddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.21s Refine Results
  1. 281

    Enhanced Privacy and Communication Efficiency in Non-IID Federated Learning With Adaptive Quantization and Differential Privacy by Emre Ardic, Yakup Genc

    Published 2025-01-01
    “…We evaluate our approach through extensive experiments on CIFAR10, MNIST, and medical imaging datasets, using non-IID data distributions across varying client counts, bit-length schedulers, and privacy budgets. …”
    Get full text
    Article
  2. 282

    Enhancing uploads of health data in the electronic health record—The role of framing and length of privacy information: A survey study in Germany by Niklas von Kalckreuth, Markus A Feufel

    Published 2025-07-01
    “…Background The German electronic health record (EHR) aims to enhance patient care and reduce costs, but users often worry about data security. In this article, we propose and test communication strategies to mitigate privacy concerns and increase EHR uploads. …”
    Get full text
    Article
  3. 283

    Exploring the General Data Protection Regulation (GDPR) compliance in cloud services: insights from Swedish public organizations on privacy compliance by Awatef Issaoui, Jenny Örtensjö, M. Sirajul Islam

    Published 2023-12-01
    “…The collected data were analyzed and classified using the seven privacy threat categories outlined in the LINDDUN framework. …”
    Get full text
    Article
  4. 284

    Googling Patients by Emily Beer

    Published 2022-11-01
    “…It can be difficult to determine which health data is truly private or confidential. In our collective effort to decide how to categorize and use data, it is important not to muddy the waters unnecessarily by applying concepts of privacy and confidentiality to data that definitely does not meet those criteria and simply is not private. …”
    Get full text
    Article
  5. 285

    Human Behavior Analysis Using Radar Data: A Survey by Patrycja Miazek, Alicja Zmudzinska, Pawel karczmarek, Adam Kiersztyn

    Published 2024-01-01
    “…In this study, we focus not only on the analysis of human behavior using radar but also on video observations. We review methods of human activity recognition using LiDAR. …”
    Get full text
    Article
  6. 286

    Social Aspects of Democratic Safeguards in Privacy Rights: A Qualitative Study of the European Union and China by Polonca Kovač, Grega Rudolf

    Published 2022-05-01
    “… Purpose: The primary objective of the present research is to identify the basic tools and restrictions concerning the protection of privacy and personal data in the EU and China as two fundamentally different cultural systems. …”
    Get full text
    Article
  7. 287

    Research and prospect of reversible data hiding method with contrast enhancement by Yang YANG, Wei-ming ZHANG, ong-dong HOUD, Hui WANG, Neng-hai YU

    Published 2016-04-01
    “…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
    Get full text
    Article
  8. 288

    THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS by Thi Thu Huong Hoang, Hoang Nam Vu, Thi Khanh Chi Nguyen

    Published 2023-04-01
    “…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
    Get full text
    Article
  9. 289

    Human Daily Indoor Action (HDIA) Dataset: Privacy-Preserving Human Action Recognition Using Infrared Camera and Wearable Armband Sensors by Jongbum Park, Kyoung Ok Yang, Sunme Park, Jun Won Choi

    Published 2025-01-01
    “…The use of IR sensors enhances privacy, making the dataset ethically suitable for long-term monitoring. …”
    Get full text
    Article
  10. 290
  11. 291

    Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice by Zhilong Guo

    Published 2025-06-01
    “…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
    Get full text
    Article
  12. 292

    A Qualitative Study of Researchers Perspective on the Use and Risks of Open Government Data by Emigawaty Emigawaty, Dinda Sukmaningrum, Wiji Nurastuti

    Published 2025-06-01
    “…This study aims to review the potential risks of data openness on government data portals from the perspective of researchers as one of the important actors who use data. …”
    Get full text
    Article
  13. 293

    A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption by Linh Nguyen, Quoc Bao Phan, Lan Zhang, Tuy Tan Nguyen

    Published 2025-01-01
    “…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
    Get full text
    Article
  14. 294

    Anomaly detection in encrypted network traffic using self-supervised learning by Sadaf Sattar, Shumaila Khan, Muhammad Ismail Khan, Ainur Akhmediyarova, Orken Mamyrbayev, Dinara Kassymova, Dina Oralbekova, Janna Alimkulova

    Published 2025-07-01
    “…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
    Get full text
    Article
  15. 295

    Optimizing Customer Data Security in Water Meter Data Management Based on RESTful API and Data Encryption Using AES-256 Algorithm by Syahrul Adrianto, Bambang Agus Herlambang, Ramadhan Renaldy

    Published 2025-06-01
    “…To increase the security of customer data, a cryptographic algorithm is used, namely the Advanced Encryption Standard (AES) algorithm with a 256-bit key length to secure data that is considered sensitive and contains high privacy. …”
    Get full text
    Article
  16. 296
  17. 297

    Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations by ANGPan Y, UIXiao-lin G, AOJing Y, INJian-cai L, IANFeng T, HANGXue-jun Z

    Published 2015-01-01
    “…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
    Get full text
    Article
  18. 298

    Building Equi-Width Histograms on Homomorphically Encrypted Data by Dragoș Lazea, Anca Hangan, Tudor Cioara

    Published 2025-06-01
    “…Histograms are widely used for summarizing data distributions, detecting anomalies, and improving machine learning models’ accuracy. …”
    Get full text
    Article
  19. 299

    Privacy-Preserving Process Mining: A Blockchain-Based Privacy-Aware Reversible Shared Image Approach by Xianwen Fang, Mengyao Li

    Published 2024-12-01
    “…Deeper integration of cross-organizational business process sharing and process mining has advanced the Industrial Internet. Privacy breaches and data security risks limit its use. …”
    Get full text
    Article
  20. 300

    EXPLORING USER PERSPECTIVES ON THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN FINANCIAL TECHNOLOGY by Sadhana Tiwari, Mohammad Asif, Amar Johri, Mohammad Wasiq, Mohd Imran

    Published 2024-12-01
    “…Structural equation modeling was employed to study the relationships between the adoption of fintech AI and its predictors, namely Perceived Usefulness, Perceived Privacy and Security, Perceived Ease of Use, and Satisfaction of Fintech AI. …”
    Get full text
    Article