Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 81 - 100 results of 2,784 for search '"\"((((\\"useds OR \"useddddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.24s Refine Results
  1. 81

    Enhancing privacy in clustering and data mining: A novel approach for sensitive data protection by Haythem Hayouni

    Published 2025-01-01
    “…However, these processes often involve the use of sensitive data, raising significant concerns about privacy, security, and trustworthiness. …”
    Get full text
    Article
  2. 82

    Right to privacy, Big Data and data protection: new challenges of the Colombian legal system by Dayron Dannylo Reyes Quintero, Margarita Rosa Lobo Contreras, Lucía Dayana Amaya Barbosa

    Published 2023-11-01
    “…Also, the perception and characteristics of Big Data are disclosed, trying to know how the rights involved in the materialization of the data analysis process can be protected; Finally, a critical sense is applied to the use of Big Data in modern political platforms, understanding the panorama for the Colombian legal system, which brings with it the probable violation of fundamental rights, such as personal privacy.…”
    Get full text
    Article
  3. 83
  4. 84

    Comprehensive Review of Privacy, Utility, and Fairness Offered by Synthetic Data by A. Kiran, P. Rubini, S. Saravana Kumar

    Published 2025-01-01
    “…First and foremost, how well synthetic data can preserve privacy and control disclosure, second is how good is its utility, and third, are they able to give fair results without any bias when used in machine learning. …”
    Get full text
    Article
  5. 85

    Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage by Feng Tian, Xiaolin Gui, Jian An, Pan Yang, Jianqiang Zhao, Xuejun Zhang

    Published 2014-01-01
    “…As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. …”
    Get full text
    Article
  6. 86

    Explaining the unexplainable: data sharing and privacy in Web 3.0 by Shim Jieun, Kim Jieun

    Published 2025-03-01
    “…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
    Get full text
    Article
  7. 87

    Fair payments for privacy-preserving aggregation of mobile crowdsensing data by Mallikarjun Reddy Dorsala, V.N. Sastry, Sudhakar Chapram

    Published 2022-09-01
    “…With the advent of mobile crowdsensing, the mobile devices equipped with a variety of sensors (such as accelerometer, gyroscope, microphone etc.) are used to collect sensory data. A data aggregator processes the collected sensor data to deliver various services such as traffic management, health care and environmental monitoring. …”
    Get full text
    Article
  8. 88

    Predicting chronic pain using wearable devices: a scoping review of sensor capabilities, data security, and standards compliance by Johannes C. Ayena, Johannes C. Ayena, Amina Bouayed, Amina Bouayed, Myriam Ben Arous, Myriam Ben Arous, Youssef Ouakrim, Youssef Ouakrim, Karim Loulou, Karim Loulou, Darine Ameyed, Isabelle Savard, Leila El Kamel, Neila Mezghani, Neila Mezghani

    Published 2025-05-01
    “…Current studies focus mainly on correlations between data and pain levels, but rarely use this information for accurate prediction.ObjectiveThis study aims to review recent advancements in wearable technology for CP management, emphasizing the integration of multimodal data, sensor quality, compliance with data security standards, and the effectiveness of predictive models in identifying CP episodes.MethodsA systematic search across six major databases identified studies evaluating wearable devices designed to collect pain-related parameters and predict CP. …”
    Get full text
    Article
  9. 89

    Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks by Yong-Ki Kim, Hyunjo Lee, Min Yoon, Jae-Woo Chang

    Published 2013-06-01
    “…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
    Get full text
    Article
  10. 90

    A Survey on Association Rule Hiding in Privacy Preserving Data Mining by Arezoo Hekmatyar, Naser Nematbakhsh, Mohammad Naderi Dehkordi

    Published 2024-02-01
    “…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
    Get full text
    Article
  11. 91

    Abnormality detection and privacy protection strategies for power marketing inspection business of cyber–physical–social systems using big data and artificial intelligence by Li Kai, Mo Pingyan, Yang Yongjiao, Xie Hanyang, Shen Zhixiong

    Published 2025-07-01
    “…Subsequently, the fault interval detection algorithm is used to locate fault periods, and the electricity consumed within these intervals is dynamically estimated using a prediction algorithm. …”
    Get full text
    Article
  12. 92

    Developing a Model for Protecting the Privacy of Internet Customers in the Field of Health by Zahra Sharifi, Mohammad Ali Keramati, Mehrzad Minooei

    Published 2024-10-01
    “…In this area, there is sensitive and personal information, and privacy can increase customers’ trust in companies and create a stronger relationship between them.Methods: The target sample was chosen using a criterion-oriented purposeful sampling method. …”
    Get full text
    Article
  13. 93

    Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization by Xiaoxiao Wang, Jingjing Zhang, Huize Wan, Yuan Yao

    Published 2025-02-01
    “…The primary contribution of this work is an innovative approach that uses metaphorical visual language to represent the flow of user data, algorithms, and information. …”
    Get full text
    Article
  14. 94
  15. 95

    Privacy-utility tradeoff method using multi-variable source coding by Yong-hao GU, Jiu-chuan LIN

    Published 2015-12-01
    “…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
    Get full text
    Article
  16. 96

    Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning by Saud Sohail, Syed Muhammad Sajjad, Adeel Zafar, Zafar Iqbal, Zia Muhammad, Muhammad Kazim

    Published 2025-03-01
    “…This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights the importance of preserving privacy and authenticity in digital media. …”
    Get full text
    Article
  17. 97

    Revisiting the use and effectiveness of patient-held records in rural Malawi by Amelia Taylor, Paul Kazembe

    Published 2025-06-01
    “…Aim This paper assessed their use and effectiveness within the health data ecosystem, and their potential impact on patient care. …”
    Get full text
    Article
  18. 98
  19. 99

    Security and privacy within smart cities by Putnik Nenad R., Marković Jana M.

    Published 2025-01-01
    “…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
    Get full text
    Article
  20. 100

    On the fidelity versus privacy and utility trade-off of synthetic patient data by Tim Adams, Colin Birkenbihl, Karen Otte, Hwei Geok Ng, Jonas Adrian Rieling, Anatol-Fiete Näher, Ulrich Sax, Fabian Prasser, Holger Fröhlich

    Published 2025-05-01
    “…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
    Get full text
    Article