Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 901 - 920 results of 2,784 for search '"\"((((\\"useds OR \"useddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.20s Refine Results
  1. 901

    Best practices for clinical trials data harmonization and sharing on NHLBI bioData catalyst (BDC) learned from CONNECTS network COVID-19 studies by Jeran K. Stratford, Huaqin Helen Pan, Alex Mainor, Edvin Music, Joshua Froess, Alex C. Cheng, Alexandra Weissman, David T. Huang, Elizabeth C. Oelsner, Sonia M. Thomas

    Published 2025-01-01
    “…Responsible data-sharing requires addressing challenges associated with data privacy and confidentiality, data linkage, data quality, variable harmonization, data formats, and comprehensive metadata documentation to produce a high-quality, contextually rich, findable, accessible, interoperable, and reusable (FAIR) dataset. …”
    Get full text
    Article
  2. 902
  3. 903
  4. 904

    Binary Classification of Customer’s Online Purchasing Behavior Using Machine Learning by Ahmad Aldelemy, Raed A. Abd-Alhameed

    Published 2023-06-01
    “…The workflow is simple, adaptable, and suitable for UK banks, demonstrating the potential for practical implementation and data privacy. Future work will extend our approach to UK banks, reformulate the problem as a multi-class classification, and introduce pre-training automated steps for data analysis and transformation. …”
    Get full text
    Article
  5. 905
  6. 906
  7. 907

    Optimizing encrypted search in the cloud using autoencoder-based query approximation by Mahmoud Mohamed, Khaled Alosman

    Published 2024-12-01
    “…Our work provides a rigorous evaluation of autoencoder-based query approximation for encrypted cloud search using real-world datasets. The research implement a general framework agnostic to model type, data modality, and encryption scheme. …”
    Get full text
    Article
  8. 908
  9. 909

    Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation by Gabriel Mendonca, Rosa M. M. Leao, Edmundo De Souza E. Silva, Don Towsley

    Published 2025-01-01
    “…In that experiment, conducted using the residences of volunteers and over one month, our system detected 99.1% of all DDoS attacks launched, with no false alarms.…”
    Get full text
    Article
  10. 910
  11. 911
  12. 912
  13. 913

    Data analysis in the healthcare context: a smart cities perspective by Fabiane Florencio de Souza, Alana Corsi, Clayton Pereira de Sá, Regina Negri Pagani, João Luiz Kovaleski

    Published 2023-09-01
    “…For this, a bibliographic review was carried out, using the Methodi Ordinatio methodology, resulting in a portfolio of articles with scientific relevance, which was the source of data collection and analysis. …”
    Get full text
    Article
  14. 914

    Lightweight Block and Stream Cipher Algorithm: A Review by Suaad Ali Abead, Nada Hussein M. Ali

    Published 2024-06-01
    “…Fortunately, various lightweight encryption algorithms could be used to increase defense against various attacks to preserve the privacy and integrity of such applications. …”
    Get full text
    Article
  15. 915

    Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination by ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao

    Published 2024-04-01
    “…At present, the sparse matrix multiplication encryption method is used to protect the privacy of data in the matrix multiplication verifiable calculation scheme. …”
    Get full text
    Article
  16. 916
  17. 917

    Balancing Innovation and Ethics by Anisa Patel

    Published 2025-03-01
    “…Opponents also point out privacy concerns and insufficient consumer data protection.  …”
    Get full text
    Article
  18. 918

    Balancing Innovation and Ethics by Anisa Patel

    Published 2025-03-01
    “…Opponents also point out privacy concerns and insufficient consumer data protection.  …”
    Get full text
    Article
  19. 919

    When Digital Economy Meets Web3.0: Applications and Challenges by Chuan Chen, Lei Zhang, Yihao Li, Tianchi Liao, Siran Zhao, Zibin Zheng, Huawei Huang, Jiajing Wu

    Published 2022-01-01
    “…In the digital economy scenario, the centralized nature of the Internet and other characteristics usually bring about security issues such as infringement and privacy leakage. Therefore, it is necessary to investigate how to use Web3.0 technologies to solve the pain points encountered in the development of the digital economy by fully exploring the critical technologies of digital economy and Web3.0. …”
    Get full text
    Article
  20. 920

    A content review of COVID-19-related apps used in Vietnam by Linh Tran, Federica Cucé, Nguyen Thanh An, Kadek Agus Surya Dila, Nguyen Hai Nam, Doan Le Nguyet Cat, Lee Wei Jun, Farrukh Ansar, Fatima Abdallh, Au Vo, Nguyen Tien Huy

    Published 2025-02-01
    “…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
    Get full text
    Article