Search alternatives:
\\"useds » \\"uses (Expand Search)
Showing 701 - 720 results of 2,784 for search '"\"((((\\"useds OR \"usedddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.15s Refine Results
  1. 701

    Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging by Hadi Mahdipour, Jaime Laviada, Fernando Las-Heras Andres, Mehdi Sookhak

    Published 2025-01-01
    “…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
    Get full text
    Article
  2. 702

    Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things. by Xujun Tang

    Published 2024-01-01
    “…The digital watermark privacy protection method and the public service advertising work push privacy protection method are used to provide an innovative solution for public service advertising privacy protection. …”
    Get full text
    Article
  3. 703

    Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies by Kumar Rahul, Shieh Chin-Shiuh, Chakrabarti Prasun, Kumar Ashok, Moolchandani Jhankar, Sinha Raj

    Published 2025-01-01
    “…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
    Get full text
    Article
  4. 704

    Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks by Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei, Riad Alharbey

    Published 2025-02-01
    “…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
    Get full text
    Article
  5. 705

    Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities by Ahma Greta, Kadriu Arbana

    Published 2025-06-01
    “…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
    Get full text
    Article
  6. 706
  7. 707

    Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis by Madhura K., Niyaz Panakaje, S. M. Riha Parvin, Shakira Irfana, Mural Henrita Cutinha, Yatheen A, Rovina Sharon Soans

    Published 2024-12-01
    “…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
    Get full text
    Article
  8. 708

    Federated Learning for Surface Roughness by Kai-Lun Cheng, Yu-Hung Ting, Wen-Ren Jong, Shia-Chung Chen, Zhe-Wei Zhou

    Published 2025-06-01
    “…A custom data acquisition system collected discharge current and spindle current signals, which were solely used as input features to train the deep learning model. …”
    Get full text
    Article
  9. 709

    The Adoption of Virtual Fitting Rooms in Iranian Sportswear Industries: A Mixed-Methods Study Based on TAM Model by Seyyed Iman Ghaffarisadr, Farzad Nobakht Sareban

    Published 2024-02-01
    “…Structural equation modelling was used to test the hypotheses. SMART PLS and SPSS 23 software were used for data analysis.Findings: The results supported the positive effect of the factors perceived ease of use, perceived usefulness, perceived enjoyment, and fashion leadership, as well as the negative impact of technology anxiety on adopting this technology. …”
    Get full text
    Article
  10. 710
  11. 711

    QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles by Ji-ming Chen, Ting-ting Li, Liang-jun Wang

    Published 2019-07-01
    “…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
    Get full text
    Article
  12. 712

    Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities by Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, Rania Aboalela, Naif Alsaadi, Louai A. Maghrabi, Khalid H. Allehaibi

    Published 2025-02-01
    “…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
    Get full text
    Article
  13. 713

    A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans by Abdullah Al-Saleh, Ghanshyam G. Tejani, Shailendra Mishra, Sunil Kumar Sharma, Seyed Jalaleddin Mousavirad

    Published 2025-07-01
    “…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
    Get full text
    Article
  14. 714

    Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response by Yan Yan, Pengbin Yan, Adnan Mahmood, Yang Zhang, Quan Z. Sheng

    Published 2024-07-01
    “…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
    Get full text
    Article
  15. 715

    Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective by Augustino Mwogosi

    Published 2025-05-01
    “…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
    Get full text
    Article
  16. 716

    A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment by Ponugoti Kalpana, Sunitha Tappari, L. Smitha, Dasari Madhavi, K. Naresh, Maddala Vijayalakshmi

    Published 2025-06-01
    “…Though sensor-driven devices have largely eased everyday lives, these healthcare systems have been suffering from various security breaches and data privacy problems. This evokes a need for designing intelligent systems to eradicate data breaches and privacy problems. …”
    Get full text
    Article
  17. 717
  18. 718

    Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration by Pedamallu Sai Mrudula, Rayappa David Amar Raj, Archana Pallakonda, Yanamala Rama Muni Reddy, K. Krishna Prakasha, V. Anandkumar

    Published 2025-01-01
    “…Furthermore, the proposed framework includes a federated learning-based scheme that utilizes differential privacy and homomorphic encryption to ensure the privacy and integrity of the data to enhance model interpretability and efficiency with feature ranking to provide insights into attack patterns and anomaly characteristics. …”
    Get full text
    Article
  19. 719

    Privacy-Preserving Glycemic Management in Type 1 Diabetes: Development and Validation of a Multiobjective Federated Reinforcement Learning Framework by Fatemeh Sarani Rad, Juan Li

    Published 2025-07-01
    “…Furthermore, these approaches typically rely on centralized data processing, which raises privacy concerns due to the sensitive nature of health care data. …”
    Get full text
    Article
  20. 720

    NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols by Rafiullah Khan, Mohib Ullah, Atif Khan, Muhammad Irfan Uddin, Maha Al-Yahya

    Published 2021-01-01
    “…Numerous techniques are available to address privacy infringement, including Private Information Retrieval (PIR) protocols that use peer nodes to preserve privacy. …”
    Get full text
    Article