Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 561 - 580 results of 2,784 for search '"\"((((\\"useds OR \"usedddds) OR \"usedddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.22s Refine Results
  1. 561

    Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication by U. Sumalatha, K. Krishna Prakasha, Srikanth Prabhu, Vinod C. Nayak

    Published 2025-01-01
    “…Deep learning and fully homomorphic encryption (FHE) are integrated for privacy-preserving fingerprint recognition. Convolutional neural network (CNN) extract fingerprint features encrypted using the Cheon-Kim-Kim-Song (CKKS) FHE scheme. …”
    Get full text
    Article
  2. 562

    Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram by TIAN Yuechi, LI Fenghua, ZHOU Zejun, SUN Zhe, GUO Shoukun, NIU Ben

    Published 2024-08-01
    “…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
    Get full text
    Article
  3. 563
  4. 564

    Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation by Min Hou, Yue Wu

    Published 2025-03-01
    “…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
    Get full text
    Article
  5. 565
  6. 566

    Navigating ethics in HIV data and biomaterial management within Black, African, and Caribbean communities in Canada by Rusty Souleymanov, Bolaji Akinyele-Akanbi, Chinyere Njeze, Patricia Ukoli, Paula Migliardi, Linda Larcombe, Gayle Restall, Laurie Ringaert, Michael Payne, John Kim, Wangari Tharao, Ayn Wilcox

    Published 2025-01-01
    “…The study employed iterative inductive thematic data analysis. Findings Participants expressed significant concerns about the collection, sharing, and use of HIV data from healthcare encounters, revealing mistrust towards institutions like police, child welfare, and immigration accessing their health information. …”
    Get full text
    Article
  7. 567
  8. 568
  9. 569

    Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub by Yu (Andrew) Liu, Gurpreet Kaur, Natasha Kholgade Banerjee, Sean Banerjee

    Published 2025-08-01
    “…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
    Get full text
    Article
  10. 570

    Time Series Classification Using Federated Convolutional Neural Networks and Image-Based Representations by Felipe A. R. Silva, Omid Orang, Fabricio Javier Erazo-Costa, Petronio C. L. Silva, Pedro H. Barros, Ricardo P. M. Ferreira, Frederico Gadelha Guimaraes

    Published 2025-01-01
    “…Federated Learning (FL) enables collaborative training across distributed clients while ensuring data privacy. The method&#x2019;s effectiveness is evaluated using 40 datasets from the UCR Archive. …”
    Get full text
    Article
  11. 571

    Exploring the Use of AI in Qualitative Data Analysis: Comparing Manual Processing with Avidnote for Theme Generation by S. M. Akramul Kabir, Fareeha Ali, Rana Lotfy Ahmed, Ruqayya Sulaiman-Hill

    Published 2025-04-01
    “…However, fundamental concerns persist regarding the robustness, generalisability, credibility, reliability and trustworthiness of qualitative research when using AI technologies. Ethical considerations, such as data security and privacy, also need to be addressed in research settings. …”
    Get full text
    Article
  12. 572

    Federated target trial emulation using distributed observational data for treatment effect estimation by Haoyang Li, Chengxi Zang, Zhenxing Xu, Weishen Pan, Suraj Rajendran, Yong Chen, Fei Wang

    Published 2025-07-01
    “…Abstract Target trial emulation (TTE) aims to estimate treatment effects by simulating randomized controlled trials using real-world observational data. Applying TTE across distributed datasets shows great promise in improving generalizability and power but is always infeasible due to privacy and data-sharing constraints. …”
    Get full text
    Article
  13. 573

    A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques by R. Ramya, P. Kumar, D. Dhanasekaran, R. Satheesh Kumar, S. Amithesh Sharavan

    Published 2025-03-01
    “…Quantum-secured networks enhance urban security, smart management, and infrastructure protection by providing data privacy and facilitating secure data transmission, thereby facilitating robust infrastructure and technological development.…”
    Get full text
    Article
  14. 574

    Generating unseen diseases patient data using ontology enhanced generative adversarial networks by Chang Sun, Michel Dumontier

    Published 2025-01-01
    “…Abstract Generating realistic synthetic health data (e.g., electronic health records), holds promise for fundamental research, AI model development, and enhancing data privacy safeguards. …”
    Get full text
    Article
  15. 575

    Predicting financial default risks: A machine learning approach using smartphone data by Shinta Palupi, Gunawan, Ririn Kusdyawati, Richki Hardi, Rana Zabrina

    Published 2024-11-01
    “…This study leverages machine learning (ML) techniques to predict financial default risks using smartphone data, providing a novel approach to financial risk assessment. …”
    Get full text
    Article
  16. 576

    Sample selection using multi-task autoencoders in federated learning with non-IID data by Emre Ardıç, Yakup Genç

    Published 2025-01-01
    “…Federated learning is a machine learning paradigm in which multiple devices collaboratively train a model under the supervision of a central server while ensuring data privacy. However, its performance is often hindered by redundant, malicious, or abnormal samples, leading to model degradation and inefficiency. …”
    Get full text
    Article
  17. 577

    How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries by Nicki Tiffin, Asha George, Amnesty Elizabeth LeFevre

    Published 2019-03-01
    “…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
    Get full text
    Article
  18. 578
  19. 579
  20. 580

    Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing by Paromita Goswami, Neetu Faujdar, Ghanshyam Singh, Kanta Prasad Sharma, Ajoy Kumar Khan, Somen Debnath

    Published 2024-01-01
    “…To address these issues, we suggest proposing a partial signature-based data auditing system so that both privacy and accuracy can be fortified while reducing the computational cost associated with auditing processes significantly. …”
    Get full text
    Article