Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 821 - 840 results of 2,784 for search '"\"((((\\"useds OR \"useddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.22s Refine Results
  1. 821
  2. 822
  3. 823

    THE POSSIBILITY OF USING ELECTRONIC MEDICAL RECORDS FOR CLINICAL OBSERVATION by R. D. Kurbanov, R. Kh. Trigulova

    Published 2021-05-01
    “…Of course, there are problems and obstacles to expanding the use of EMC, and one of the solutions to these obstacles is to address issues of semantic compatibility, privacy, and security. …”
    Get full text
    Article
  4. 824

    A secure and efficient user selection scheme in vehicular crowdsensing by Min Zhang, Qing Ye, Zhimin Yuan, Kaihuan Deng

    Published 2025-05-01
    “…In addition, a prediction model based on principal component analysis-enhanced long short-term memory (PCA-Enhanced LSTM) model is constructed by combining the advantages of principal component analysis (PCA) and long short-term memory (LSTM) network. The model uses PCA for data dimensionality reduction to eliminate redundant information and then employs LSTM to process time series data, capture long-term dependencies for more accurate user credit prediction, screen high-quality users, and improve perceived data quality. …”
    Get full text
    Article
  5. 825
  6. 826

    Efficient secure federated learning aggregation framework based on homomorphic encryption by Shengxing YU, Zhong CHEN

    Published 2023-01-01
    “…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
    Get full text
    Article
  7. 827

    New cross-layer reputation mechanism for mobile cloud computing by Mengyang YU, Hui LIN, Youliang TIAN

    Published 2018-03-01
    “…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
    Get full text
    Article
  8. 828

    WiFi-Based Location Tracking: A Still Open Door on Laptops by Mariana Cunha, Ricardo Mendes, Yves-Alexandre de Montjoye, Joao P. Vilela

    Published 2025-01-01
    “…Location privacy is a major concern in the current digital society, due to the sensitive information that can be inferred from location data. …”
    Get full text
    Article
  9. 829

    KAB: A new k-anonymity approach based on black hole algorithm by Lynda Kacha, Abdelhafid Zitouni, Mahieddine Djoudi

    Published 2022-07-01
    “…K-anonymity is the most widely used approach to privacy preserving microdata which is mainly based on generalization. …”
    Get full text
    Article
  10. 830

    Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme by DUAN Jie, GU Wei, ZHANG Shujuan, GONG Xin

    Published 2025-05-01
    “…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. …”
    Get full text
    Article
  11. 831

    FFM: Flood Forecasting Model Using Federated Learning by Muhammad Shoaib Farooq, Rabia Tehseen, Junaid Nasir Qureshi, Uzma Omer, Rimsha Yaqoob, Hafiz Abdullah Tanweer, Zabihullah Atal

    Published 2023-01-01
    “…Federated Learning is the most advanced technique of machine learning (ML) that guarantees data privacy, ensures data availability, promises data security, and handles network latency trials inherent in prediction of floods by prohibiting data to be transferred over the network for model training. …”
    Get full text
    Article
  12. 832

    Ethical Challenges in Blood Donation from Viewpoint of Blood Transfusion Policymakers, Experts and Stakeholders: A Qualitative Study by forouzan akrami, Abolfazl Asghari, tooran mohammadi, abbas sedaghat

    Published 2025-01-01
    “…Purposeful sampling and focus group discussion were used to collect data. Data analysis was performed by Graneheim and Lundman inductive content analysis. …”
    Get full text
    Article
  13. 833

    Factors influencing the perceived usability of line pay: An extended technology acceptance model approach by Yogi Tri Prasetyo, Krisna Chandra Susanto, Ko-Hui Chuang, Ruo-Ting Yin, Jia-Wei Chen, Yu-Xuan Zhang, Omar Paolo Benito, Zachariah John A. Belmonte, Maela Madel L. Cahigas, Reny Nadlifatin, Ma. Janice J. Gumasing

    Published 2025-05-01
    “…Utilizing an extended Technology Acceptance Model (TAM), the research integrated additional variables such as social influence, trust, security, and environmental concerns, offering a comprehensive framework to understand user adoption dynamics. 120 Taiwanese participants were surveyed by employing the Purposive Sampling Method and data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). …”
    Get full text
    Article
  14. 834

    Based on model randomization and adaptive defense for federated learning schemes by Gaofeng Yue, Xiaowei Han

    Published 2025-02-01
    “…Abstract Federated Learning (FL) is a privacy-enhancing technique that enables multiple participants to collaboratively train machine learning models without sharing their local data. …”
    Get full text
    Article
  15. 835

    Analyzing the concept of solitude with the spatial syntax technique in the spatial organization of rural homes; case Study: Bushehr province by Farshid Mesbah, Behzad Vasigh, Mostafa Masoudinezhad

    Published 2023-03-01
    “…In the next stage, graph analysis technique was used to extract data from the drawn maps using tools such as connectivity, relationship, step depth, metric depth, and angle of view with the help of Depth Map software for sample analysis. …”
    Get full text
    Article
  16. 836
  17. 837

    A data management system for precision medicine. by John J L Jacobs, Inés Beekers, Inge Verkouter, Levi B Richards, Alexandra Vegelien, Lizan D Bloemsma, Vera A M C Bongaerts, Jacqueline Cloos, Frederik Erkens, Patrycja Gradowska, Simon Hort, Michael Hudecek, Manel Juan, Anke H Maitland-van der Zee, Sergio Navarro-Velázquez, Lok Lam Ngai, Qasim A Rafiq, Carmen Sanges, Jesse Tettero, Hendrikus J A van Os, Rimke C Vos, Yolanda de Wit, Steven van Dijk

    Published 2025-01-01
    “…This paper evaluates a MedDMS in five types of use cases for precision medicine, ranging from data collection to algorithm development and from implementation to integration with real-world data. …”
    Get full text
    Article
  18. 838

    Medical data sharing and synthetic clinical data generation – maximizing biomedical resource utilization and minimizing participant re-identification risks by Simeone Marino, Ruth Cassidy, Joseph Nanni, Yuxuan Wang, Yipeng Liu, Mingyi Tang, Yuan Yuan, Toby Chen, Anik Sinha, Balaji Pandian, Ivo D. Dinov, Michael L. Burns

    Published 2025-08-01
    “…This article introduces an end-to-end, titratable pipeline that generates privacy-preserving “digital twin” datasets from complex EHR and wearable-device records (Apple Watch data from 3029 participants) using DataSifter and Synthetic Data Vault (SDV) methods. …”
    Get full text
    Article
  19. 839

    Cybersecurity and Liability in a Big Data World by Maria Lillà Montagnani, Mirta Antonella Cavallo

    Published 2018-10-01
    “…We conclude by showing that, despite this articulate framework, big data and cloud service providers still leverage on their strong market power to use “contractual shields” and escape liability. …”
    Get full text
    Article
  20. 840

    Data Protection in Pre-Tertiary Schools In Ghana by Ephrem Kwaa-Aidoo, Elizabeth Serwaa Baah

    Published 2025-05-01
    “…The study also identifies a lack of coordination, formal guidance, inadequate consent procedures, and fragmented implementation strategies in data protection practices. Furthermore, the use of varied data protection mechanisms by different schools suggests a lack of standardised security protocols, which is likely to result in security gaps. …”
    Get full text
    Article