Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
-
81
Enhancing privacy in clustering and data mining: A novel approach for sensitive data protection
Published 2025-01-01“…However, these processes often involve the use of sensitive data, raising significant concerns about privacy, security, and trustworthiness. …”
Get full text
Article -
82
Right to privacy, Big Data and data protection: new challenges of the Colombian legal system
Published 2023-11-01“…Also, the perception and characteristics of Big Data are disclosed, trying to know how the rights involved in the materialization of the data analysis process can be protected; Finally, a critical sense is applied to the use of Big Data in modern political platforms, understanding the panorama for the Colombian legal system, which brings with it the probable violation of fundamental rights, such as personal privacy.…”
Get full text
Article -
83
Data structure and privacy protection analysis in big data environment based on blockchain technology
Published 2024-01-01Get full text
Article -
84
Comprehensive Review of Privacy, Utility, and Fairness Offered by Synthetic Data
Published 2025-01-01“…First and foremost, how well synthetic data can preserve privacy and control disclosure, second is how good is its utility, and third, are they able to give fair results without any bias when used in machine learning. …”
Get full text
Article -
85
Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage
Published 2014-01-01“…As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. …”
Get full text
Article -
86
Explaining the unexplainable: data sharing and privacy in Web 3.0
Published 2025-03-01“…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
Get full text
Article -
87
Fair payments for privacy-preserving aggregation of mobile crowdsensing data
Published 2022-09-01“…With the advent of mobile crowdsensing, the mobile devices equipped with a variety of sensors (such as accelerometer, gyroscope, microphone etc.) are used to collect sensory data. A data aggregator processes the collected sensor data to deliver various services such as traffic management, health care and environmental monitoring. …”
Get full text
Article -
88
Predicting chronic pain using wearable devices: a scoping review of sensor capabilities, data security, and standards compliance
Published 2025-05-01“…Current studies focus mainly on correlations between data and pain levels, but rarely use this information for accurate prediction.ObjectiveThis study aims to review recent advancements in wearable technology for CP management, emphasizing the integration of multimodal data, sensor quality, compliance with data security standards, and the effectiveness of predictive models in identifying CP episodes.MethodsA systematic search across six major databases identified studies evaluating wearable devices designed to collect pain-related parameters and predict CP. …”
Get full text
Article -
89
Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks
Published 2013-06-01“…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
Get full text
Article -
90
A Survey on Association Rule Hiding in Privacy Preserving Data Mining
Published 2024-02-01“…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
Get full text
Article -
91
Abnormality detection and privacy protection strategies for power marketing inspection business of cyber–physical–social systems using big data and artificial intelligence
Published 2025-07-01“…Subsequently, the fault interval detection algorithm is used to locate fault periods, and the electricity consumed within these intervals is dynamically estimated using a prediction algorithm. …”
Get full text
Article -
92
Developing a Model for Protecting the Privacy of Internet Customers in the Field of Health
Published 2024-10-01“…In this area, there is sensitive and personal information, and privacy can increase customers’ trust in companies and create a stronger relationship between them.Methods: The target sample was chosen using a criterion-oriented purposeful sampling method. …”
Get full text
Article -
93
Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization
Published 2025-02-01“…The primary contribution of this work is an innovative approach that uses metaphorical visual language to represent the flow of user data, algorithms, and information. …”
Get full text
Article -
94
Meta-analysis of privacy legal framework: revising the various approaches for balancing privacy risks and usability of healthcare information systems | Meta-analisi del quadro norm...
Published 2022-01-01“…A proactive approach to managing these risks involves the use of privacy by design frameworks and conceptual tools. …”
Get full text
Article -
95
Privacy-utility tradeoff method using multi-variable source coding
Published 2015-12-01“…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
Get full text
Article -
96
Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning
Published 2025-03-01“…This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights the importance of preserving privacy and authenticity in digital media. …”
Get full text
Article -
97
Revisiting the use and effectiveness of patient-held records in rural Malawi
Published 2025-06-01“…Aim This paper assessed their use and effectiveness within the health data ecosystem, and their potential impact on patient care. …”
Get full text
Article -
98
Study on choosing the parameter ε in differential privacy
Published 2015-12-01Get full text
Article -
99
Security and privacy within smart cities
Published 2025-01-01“…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
Get full text
Article -
100
On the fidelity versus privacy and utility trade-off of synthetic patient data
Published 2025-05-01“…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
Get full text
Article