Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
581
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
Published 2025-01-01“…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
Get full text
Article -
582
CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions
Published 2025-02-01“…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
Get full text
Article -
583
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
Get full text
Article -
584
Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification
Published 2024-12-01“…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
Get full text
Article -
585
Ethical Considerations in Emotion Recognition Research
Published 2025-05-01“…The development of real-time feedback loops for user awareness should be combined with clear disclosures about data use and participatory design practices. The successful oversight of these systems requires interdisciplinary work between researchers, policymakers, designers, and ethicists. …”
Get full text
Article -
586
Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews
Published 2025-06-01“…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
Get full text
Article -
587
Estimating rare disease prevalence and costs in the USA: a cohort study approach using the Healthcare Cost Institute claims data
Published 2024-04-01“…Building capabilities to use machine learning to accelerate the diagnosis of RDs would vastly improve with changes to healthcare data, such as standardising data input, linking databases, addressing privacy issues and assigning ICD-10 codes for all RDs, resulting in more robust data for RD analytics.…”
Get full text
Article -
588
Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure
Published 2025-06-01“…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
Get full text
Article -
589
-
590
Lessons Learned From European Health Data Projects With Cancer Use Cases: Implementation of Health Standards and Internet of Things Semantic Interoperability
Published 2025-03-01“…These initiatives aim to enhance the analysis of heterogeneous health data while aligning with EHDS implementation, specifically for the EHDS for the secondary use of data (EHDS2). …”
Get full text
Article -
591
Concurrent prescriptions for opioids and benzodiazepines and risk of opioid overdose: protocol for a retrospective cohort study using linked administrative data
Published 2021-02-01“…Our aim was to assess the risk of opioid overdose associated with concurrent use of opioids and benzodiazepines relative to opioids alone.Methods and analysis A retrospective cohort study will be conducted using medical claims data from adult residents of Montréal, Canada. …”
Get full text
Article -
592
A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards
Published 2025-08-01“…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
Get full text
Article -
593
A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond
Published 2025-01-01“…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
Get full text
Article -
594
Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies
Published 2023-07-01“… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
Get full text
Article -
595
Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
Published 2025-03-01“…Furthermore, this study examines the double-layer encryption architecture used to secure data in at rest and during transmission from a sensor’s gathering location to long-term storage. …”
Get full text
Article -
596
A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation
Published 2019-06-01“…The assessment results may be used to identify possible vulnerabilities in telehealth systems and practice or demonstrate to patients the sufficient security and privacy protection to patients’ data.…”
Get full text
Article -
597
Artificial Intelligence–Enabled Facial Privacy Protection for Ocular Diagnosis: Development and Validation Study
Published 2025-07-01“… Abstract BackgroundFacial biometric data, while valuable for clinical applications, poses substantial privacy and security risks. …”
Get full text
Article -
598
Prompts, privacy, and personalized learning: integrating AI into nursing education—a qualitative study
Published 2025-04-01“…However, questions remain regarding the ethical use of AI-generated outputs, data privacy concerns, and limitations in recognizing emotional nuances. …”
Get full text
Article -
599
PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation
Published 2021-12-01“…To significantly protect the user’s privacy and prevent the user’s preference disclosure from leading to malicious entrapment, we present a combination of the recommendation algorithm and the privacy protection mechanism. …”
Get full text
Article -
600
Cyber-Biosecurity Challenges in Next-Generation Sequencing: A Comprehensive Analysis of Emerging Threat Vectors
Published 2025-01-01“…Genomic data is inherently sensitive, and vulnerabilities in NGS technologies, software, data-sharing practices, and open-access databases expose it to risks concerning data confidentiality, integrity, and privacy. …”
Get full text
Article