Search alternatives:
\\"useds » \\"uses (Expand Search)
Showing 121 - 140 results of 2,784 for search '"\"((((\\"useds OR \"usedddds) OR \"used) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.23s Refine Results
  1. 121

    Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology by Md. Mazharul Islam, Mubasshir Ahmed, Rajesh Palit, Mohammad Shahriar Rahman, Salekul Islam

    Published 2025-08-01
    “…To address these issues, this paper proposes a system that ensures patient anonymity through secure credentials and advanced fraud detection mechanisms. Privacy is preserved using cryptographic techniques such as secure hashing and anonymous credentials, which ensure that sensitive patient information remains confidential throughout the claim process. …”
    Get full text
    Article
  2. 122

    Automated Redaction of Personally Identifiable Information on Drug Labels Using Optical Character Recognition and Large Language Models for Compliance with Thailand’s Personal Data... by Parinya Thetbanthad, Benjaporn Sathanarugsawait, Prasong Praneetpolgrang

    Published 2025-04-01
    “…The rapid proliferation of artificial intelligence (AI) across various industries presents both opportunities and challenges, particularly concerning personal data privacy. With the enforcement of regulations like Thailand’s Personal Data Protection Act (PDPA), organizations face increasing pressure to protect sensitive information found in diverse data sources, including product and shipping labels. …”
    Get full text
    Article
  3. 123

    Context-Contingent Privacy Concerns and Exploration of the Privacy Paradox in the Age of AI, Augmented Reality, Big Data, and the Internet of Things: Systematic Review by Christian Herriger, Omar Merlo, Andreas B Eisingerich, Annisa Rizkia Arigayota

    Published 2025-05-01
    “… BackgroundDespite extensive research into technology users’ privacy concerns, a critical gap remains in understanding why individuals adopt different standards for data protection across contexts. …”
    Get full text
    Article
  4. 124
  5. 125

    Balancing Ethics and Privacy in the Use of Artificial Intelligence in Institutions of Higher Learning: A Framework for Responsive AI Systems by Belinda Ndlovu, Kudakwashe Maguraushe

    Published 2025-07-01
    “…Thematic analysis identified ten critical themes centred around benefits, challenges, applications, responsible use, privacy and data security, ethical considerations, institutional policies and frameworks, training, equity, and sustainable AI use. …”
    Get full text
    Article
  6. 126

    Fostering social media user intentions: AI-enabled privacy and intrusiveness concerns by Muhammad Haroon Shoukat, Islam Elgammal, Kareem M. Selem, Ali Elsayed Shehata

    Published 2025-03-01
    “…Findings – Privacy concerns significantly affect perceived usefulness. …”
    Get full text
    Article
  7. 127
  8. 128

    An Efficient Privacy-preserving Deep Learning Scheme for Medical Image Analysis by J. Andrew Onesimu, J Karthikeyan

    Published 2020-12-01
    “…Data providers morph the images without privacy information using image morphing component. …”
    Get full text
    Article
  9. 129

    Protection of gait data set for preserving its privacy in deep learning pipeline by Anubha Parashar, Rajveer Singh Shekhawat

    Published 2022-11-01
    “…Such modified data prevent hackers from making use of the data set for adversarial attacks. …”
    Get full text
    Article
  10. 130

    An approach that utilizes blockchain to effectively and securely preserve data privacy for location data from IoT in smart cities by D. Rawal, J. Seedorf, B. Patil

    Published 2025-07-01
    “…Environmental surveillance, emergency response, and smart city planning all require the use of geospatial data, which includes satellite imagery, cartographic records, and real-time GPS coordinates. …”
    Get full text
    Article
  11. 131

    Security control scheme for cloud data copy based on differential privacy model by Jun REN, Jin-bo XIONG, Zhi-qiang YAO

    Published 2017-05-01
    “…In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in constructing a hybrid cloud framework.Then file was encrypted for second times by using the privacy protection parameters of differential privacy as well as the key of the file computed by convergent encryption algorithm.After the file is uploaded,each file has only one copy in the server.Meanwhile,compared with the scheme that use setting threshold value to control the number of copies,the proposed scheme can resist against the side channel attack,related files attack,and the specific attack of encryption algorithm and save the network bandwidth and disk storage space.…”
    Get full text
    Article
  12. 132

    Enhancing Medical Data Privacy: Neural Network Inference with Fully Homomorphic Encryption by Maulyanda Maulyanda, Rini Deviani, Afdhaluzzikri Afdhaluzzikri

    Published 2025-04-01
    “…Protecting the privacy of medical data while enabling sophisticated data analysis is a critical challenge in modern healthcare. …”
    Get full text
    Article
  13. 133

    Privacy, personal data protection and the digital age: A (criminal) law "omnibus" by Banović Jovana M., Radisavljević Ivana M.

    Published 2025-01-01
    “…This complexity is further amplified by the development of artificial intelligence, which inherently relies on the use of vast amounts of data. The aim of this paper is to identify some of the critical elements in the protection of privacy rights, particularly those related to personal data most closely linked to individuals, and to raise the question of potential legislative amendments.…”
    Get full text
    Article
  14. 134

    A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment by Mustafa Azeez AL Mayyahi, Seyed Amin Hosseini Seno

    Published 2022-12-01
    “…Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. …”
    Get full text
    Article
  15. 135

    Publishing neural networks in drug discovery might compromise training data privacy by Fabian P. Krüger, Johan Östman, Lewis Mervin, Igor V. Tetko, Ola Engkvist

    Published 2025-03-01
    “…Abstract This study investigates the risks of exposing confidential chemical structures when machine learning models trained on these structures are made publicly available. We use membership inference attacks, a common method to assess privacy that is largely unexplored in the context of drug discovery, to examine neural networks for molecular property prediction in a black-box setting. …”
    Get full text
    Article
  16. 136

    Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy by Renwu Yan, Yang Zheng, Ning Yu, Cen Liang

    Published 2024-03-01
    “…Under the general trend of the rapid development of smart grids, data security and privacy are facing serious challenges; protecting the privacy data of single users under the premise of obtaining user-aggregated data has attracted widespread attention. …”
    Get full text
    Article
  17. 137

    Empowering open data sharing for social good: a privacy-aware approach by Tânia Carvalho, Luís Antunes, Cristina Costa Santos, Nuno Moniz

    Published 2025-02-01
    “…Such a sharing process should adhere to state-of-the-art methods in Data Protection by Design and by Default. In this paper, we use a Covid-19 data set from Portugal’s second-largest hospital to show how it is feasible to ensure data privacy while improving the quality and maintaining the utility of the data. …”
    Get full text
    Article
  18. 138

    Federated learning: a privacy-preserving approach to data-centric regulatory cooperation by Alexander Horst, Paul Loustalot, Sanjeev Yoganathan, Ting Li, Joshua Xu, Weida Tong, David Schneider, Nicolas Löffler-Perez, Erminio Di Renzo, Michael Renaudin

    Published 2025-05-01
    “…Regulatory agencies aim to ensure the safety and efficacy of medical products but often face legal and privacy concerns that hinder collaboration at the data level. …”
    Get full text
    Article
  19. 139

    Privacy concerns and avoidance behaviour towards data-driven online behavioural advertising by Shradha Jain, H.C. Purohit

    Published 2022-11-01
    “…Design/methodology/approach – The study employed an online survey method for data collection using a sample size of 345. Reliability and validity of the measurement scales were ensured, and hypotheses developed were tested through PLS-SEM using SMART PLS. …”
    Get full text
    Article
  20. 140

    Desensitized Financial Data Generation Based on Generative Adversarial Network and Differential Privacy by Fan Zhang, Luyao Wang, Xinhong Zhang

    Published 2025-02-01
    “…This study conducts experiments using financial data from China Stock Market & Accounting Research (CSMAR) database. …”
    Get full text
    Article