Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 261 - 280 results of 2,784 for search '"\"((((\\"useds OR \"usedddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.19s Refine Results
  1. 261
  2. 262

    Cross-Company Data Sharing Using Distributed Analytics by Soo-Yon Kim, Stefanie Berninger, Max Kocher, Martin Perau, Sandra Geisler

    Published 2025-05-01
    “…Furthermore, we find that the framework supports integration of data quality assessment and privacy preservation mechanisms. …”
    Get full text
    Article
  3. 263

    Identification of hazardous road locations using ambulance data by Anne Vingaard Olesen, Tim Alex Lindskou, Rasmus Øhlenschlæger, Torben Anders Kløjgaard, Anders Brogaard Tallaksen, Jens Lauritsen, Erika Frischknecht Christensen, Harry Lahrmann

    Published 2025-03-01
    “…Results: Compared to police data in the same study period, we found 3.2 times as many unique crash sites through the use of combined hospital patient and ambulance data. …”
    Get full text
    Article
  4. 264

    Online Banking Fraud Detection Model: Decentralized Machine Learning Framework to Enhance Effectiveness and Compliance with Data Privacy Regulations by Hisham AbouGrad, Lakshmi Sankuru

    Published 2025-06-01
    “…This research study explores a decentralized anomaly detection framework using deep autoencoders, designed to meet the dual imperatives of fraud detection effectiveness and user data privacy. …”
    Get full text
    Article
  5. 265

    Social smart city research: interconnections between participatory governance, data privacy, artificial intelligence and ethical sustainable development by Samad Rasoulzadeh Aghdam, Samad Rasoulzadeh Aghdam, Behnaz Bababeimorad, Behnam Ghasemzadeh, Behnam Ghasemzadeh, Behnam Ghasemzadeh, Behnam Ghasemzadeh, Mazdak Irani, Aapo Huovila

    Published 2025-01-01
    “…Four interconnected thematic clusters cropped up: (1) participatory governance, (2) data privacy and security, (3) artificial intelligence and social media, and (4) ethics and sustainable development. …”
    Get full text
    Article
  6. 266

    Balancing Data Privacy and 5G VNFs Security Monitoring: Federated Learning with CNN + BiLSTM + LSTM Model by Abdoul-Aziz Maiga, Edwin Ataro, Stanley Githinji

    Published 2024-01-01
    “…The authorities also require data privacy enhancement in 5G deployment and there is the fact that mobile operators need to inspect data for malicious traffic detection. …”
    Get full text
    Article
  7. 267

    Federated Learning for Privacy-Preserving Severity Classification in Healthcare: A Secure Edge-Aggregated Approach by Ankita Maurya, Rahul Haripriya, Manish Pandey, Jaytrilok Choudhary, Dhirendra Pratap Singh, Surendra Solanki, Duansh Sharma

    Published 2025-01-01
    “…Federated learning (FL) has emerged as a promising paradigm for privacy-preserving machine learning across decentralized healthcare systems. …”
    Get full text
    Article
  8. 268

    Towards practical intrusion detection system over encrypted traffic* by Sébastien Canard, Chaoyun Li

    Published 2021-05-01
    “…Abstract Privacy and data confidentiality are today at the heart of many discussions. …”
    Get full text
    Article
  9. 269
  10. 270
  11. 271

    Homomorphic signcryption with public plaintext‐result checkability by Shimin Li, Bei Liang, Aikaterini Mitrokotsa, Rui Xue

    Published 2021-09-01
    “…Two notions of message privacy are also investigated: weak message privacy and message privacy depending on whether the original signcryptions used in the evaluation are disclosed or not. …”
    Get full text
    Article
  12. 272

    On signal encryption at MapReduce and collaborative attribute-based access with ECAs for a preprocessed data set with ML in a privacy-preserving health 4.0 by Arnab Mitra, Anabik Pal

    Published 2025-06-01
    “…Latest Industry 4.0 developments and data science advances have transformed traditional hospital-centric patient care into a Healthcare 4.0 system that uses advanced technology-driven decision-making involving several low resource constraints electronic devices such as Personal Digital Assistants (PDAs), Smartphones, Tablets, etc. …”
    Get full text
    Article
  13. 273

    Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG

    Published 2015-12-01
    “…While dealing with the big data in healthcare,it was difficult for a policy maker to foresee what information a doctor may need,even to make an accurate access control policy.To deal with it,a risk-based access control model that regulates doctors’ access rights adaptively was proposed to protect patient privacy.This model analyzed the history of access,applies the EM algorithm and the information entropy technique to quantify the risk of privacy violation.Using the quantified risk,the model can detect and control the over-accessing and exceptional accessing of patients’ data.Experimental results show that this model is effective and more accurate than other models.…”
    Get full text
    Article
  14. 274

    Risk-adaptive access control model for big data in healthcare by Zhen HUI, Hao LI, Min ZHANG, Deng-guo FENG

    Published 2015-12-01
    “…While dealing with the big data in healthcare,it was difficult for a policy maker to foresee what information a doctor may need,even to make an accurate access control policy.To deal with it,a risk-based access control model that regulates doctors’ access rights adaptively was proposed to protect patient privacy.This model analyzed the history of access,applies the EM algorithm and the information entropy technique to quantify the risk of privacy violation.Using the quantified risk,the model can detect and control the over-accessing and exceptional accessing of patients’ data.Experimental results show that this model is effective and more accurate than other models.…”
    Get full text
    Article
  15. 275

    Algorithm of blockchain data provenance based on ABE by Youliang TIAN, Kedi YANG, Zuan WANG, Tao FENG

    Published 2019-11-01
    “…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
    Get full text
    Article
  16. 276

    Decentralized Voltage Prediction in Multi-Area Distribution Systems: A Privacy-Preserving Collaborative Framework by Jianfeng Yan, Beibei Wang, Zhiqiang Wu, Zhengkai Ding

    Published 2025-01-01
    “…However, potential privacy concerns pose significant challenges to data sharing and interarea collaboration. …”
    Get full text
    Article
  17. 277

    Cultural Differences in the Use of Augmented Reality Smart Glasses (ARSGs) Between the U.S. and South Korea: Privacy Concerns and the Technology Acceptance Model by Se Jung Kim, Yoon Esther Lee, T. Makana Chock

    Published 2025-07-01
    “…Korea = 898) perceived usefulness, perceived ease of use, attitude toward using, and behavioral intention to use ARSGs were impacted by privacy concerns. …”
    Get full text
    Article
  18. 278

    Application of the joint clustering algorithm based on Gaussian kernels and differential privacy in lung cancer identification by Hang Yanping, Zheng Haixia, Yang Minmin, Wang Nan, Kong Miaomiao, Zhao Mingming

    Published 2025-05-01
    “…The algorithm enhances cancer detection while ensuring data privacy. Three publicly available lung cancer datasets, along with a dataset from our hospital, are used to test and demonstrate the effectiveness of DPFCM_GK. …”
    Get full text
    Article
  19. 279

    Federated Mental Wellbeing Assessment Using Smartphone Sensors Under Unreliable Participation by Gavryel Martis, Ryan McConville

    Published 2025-01-01
    “…The findings suggested that given the widespread use of such devices, FL holds great potential in mood and depression detection while protecting data privacy. …”
    Get full text
    Article
  20. 280

    A lightweight and efficient raw data collection scheme for IoT systems by Yixuan Huang, Yining Liu, Jingcheng Song, Weizhi Meng

    Published 2024-05-01
    “…However, it also exposes sensitive information, which leads to privacy risks. An approach called N-source anonymity has been used for privacy preservation in raw data collection, but most of the existing schemes do not have a balanced efficiency and robustness. …”
    Get full text
    Article