Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddddds » \"usedddddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 1,001 - 1,020 results of 2,784 for search '"\"((((\\"useds OR \"useddddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.16s Refine Results
  1. 1001

    Conditions for anonymity in some generic public-key encryption constructions by TIAN Yuan, DENG Lu-yao, ZHANG Hao

    Published 2009-01-01
    “…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
    Get full text
    Article
  2. 1002
  3. 1003

    Conditions for anonymity in some generic public-key encryption constructions by TIAN Yuan, DENG Lu-yao, ZHANG Hao

    Published 2009-01-01
    “…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
    Get full text
    Article
  4. 1004

    Artificial Intelligence in Retail: Benefits and Risks Associated With Mobile Shopping Applications by Victoria Stanciu, Sînziana-Maria Rîndașu

    Published 2021-02-01
    “…The objective of the study is to examine the practical implications of using artificial intelligence (AI) based solutions in the case of retail mobile applications, to enhance the online shopping experience and improve the engagement by also having in mind the privacy of the users. …”
    Get full text
    Article
  5. 1005

    Examining inclusivity: the use of AI and diverse populations in health and social care: a systematic review by John Gabriel O. Marko, Ciprian Daniel Neagu, P. B. Anand

    Published 2025-02-01
    “…A holistic approach must be used to address disparities, enforce effective regulations, safeguard privacy, promote inclusion and equity, and emphasize rigorous validation.…”
    Get full text
    Article
  6. 1006
  7. 1007

    Investigating High School Students’ Attitudes Toward the Use of AI in Education: Evidence from Cambodia by Sarin Sok, Kimkong Heng, Mengkorn Pum

    Published 2025-07-01
    “…Utilizing evidence from an online survey with 315 students (female = 62.50%), the study showed that Cambodian high school students expressed generally favorable attitudes toward utilizing AI-powered tools in education, particularly pertaining to the use of AI to aid in completing school work. However, the study identified key concerns about data privacy and security issues, the risk of becoming over-dependent on AI, and limited originality about students’ work. …”
    Get full text
    Article
  8. 1008

    Telemedicine data secure sharing scheme based on heterogeneous federated learning by Nansen Wang, Jianing Zhang, Ju Huang, Wei Ou, Wenbao Han, Qionglu Zhang

    Published 2024-10-01
    “…However, the reuse process of telemedicine user privacy data based on federated learning also faces significant challenges. …”
    Get full text
    Article
  9. 1009
  10. 1010

    Promises and Pitfalls of Internet Search Data in Mental Health: Critical Review by Alexandre Andrade Loch, Roman Kotov

    Published 2025-02-01
    “…In this paper, we discuss the various problems related to the use of these data in research and clinical practice, including privacy concerns, integration with clinical information, and technical limitations. …”
    Get full text
    Article
  11. 1011

    Establishing A Personal Data Protection Agency for E-Commerce in Indonesia by Bilqis Laila Nuzul Sa'adah, Sukarmi Sukarmi, Reka Dewantara

    Published 2024-12-01
    “… The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
    Get full text
    Article
  12. 1012

    Live research dialogue on the benefits, costs and utility of synthetic data for researchers by Emily Oliver, Fiona Lugg-Widger, Maureen Haaker, Cristina Magder, Emma Gordon

    Published 2024-11-01
    “… • To discuss governance frameworks essential for the routine creation, dissemination, and use of synthetic data. • Drawing on the experience of international participants, explore measures to mitigate risks to data privacy and public perception relating to synthetic data creation and use whilst maximising its utility. …”
    Get full text
    Article
  13. 1013

    A Data-Driven Approach for Generating Synthetic Load Profiles with GANs by Tsvetelina Kaneva, Irena Valova, Katerina Gabrovska-Evstatieva, Boris Evstatiev

    Published 2025-07-01
    “…The generation of realistic electrical load profiles is essential for advancing smart grid analytics, demand forecasting, and privacy-preserving data sharing. Traditional approaches often rely on large, high-resolution datasets and complex recurrent neural architectures, which can be unstable or ineffective when training data are limited. …”
    Get full text
    Article
  14. 1014

    Dynamic Ensemble Selection for EEG Signal Classification in Distributed Data Environments by Małgorzata Przybyła-Kasperek, Jakub Sacewicz

    Published 2025-05-01
    “…This study presents a novel approach to EEG signal classification in distributed environments using dynamic ensemble selection. In scenarios where data dispersion arises due to privacy constraints or decentralized data collection, traditional global modelling is impractical. …”
    Get full text
    Article
  15. 1015

    Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization by Mohamed Abd Elaziz, Mohamed Abd Elaziz, Mohamed Abd Elaziz, Ibrahim A. Fares, Abdelghani Dahou, Mansour Shrahili

    Published 2025-05-01
    “…The goal of the developed framework is to improve the detection of IDS without using centralized data to preserve privacy. Whereas it enhances the processing and detection capability of huge amounts of data generated from IoT devices. …”
    Get full text
    Article
  16. 1016

    Shopping Data for Population Health Surveillance: Opportunities, Challenges, and Future Directions by Alisha Suhag, Romana Burgess, Anya Skatova

    Published 2025-08-01
    “…This paper explores the potential of loyalty card data to strengthen public health surveillance across 4 key behavioral risk domains: diet, alcohol, tobacco, and over-the-counter medication use. …”
    Get full text
    Article
  17. 1017

    Comprehensive testing of large language models for extraction of structured data in pathology by Bastian Grothey, Jan Odenkirchen, Adnan Brkic, Birgid Schömig-Markiefka, Alexander Quaas, Reinhard Büttner, Yuri Tolkach

    Published 2025-03-01
    “…While recent studies show promise in using advanced language models for structuring pathology data, they primarily rely on proprietary models, raising cost and privacy concerns. …”
    Get full text
    Article
  18. 1018

    SHARE: An ethical framework for equitable data sharing in Caribbean health research by Michael H. Campbell, Natalie S. Greaves

    Published 2024-12-01
    “…Using the SHARE framework can support regionally relevant and culturally responsive work already underway in the region and further develop capacity for intentional sharing and (re)use of Caribbean health data.…”
    Get full text
    Article
  19. 1019

    Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization by Ahmad Musamih, Khaled Salah, Raja Jayaraman, Samer Ellaham, Mohammed Omar, Ibrar Yaqoob

    Published 2025-01-01
    “…In this paper, we propose a blockchain and NFT-based solution that addresses the challenges of managing, sharing, and monetizing genomic data while preserving privacy using Threshold Cryptography and Fully Homomorphic Encryption (FHE). …”
    Get full text
    Article
  20. 1020

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
    Get full text
    Article