Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 441 - 460 results of 2,784 for search '"\"((((\\"useds OR \"usedddds) OR \"useds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.14s Refine Results
  1. 441
  2. 442
  3. 443

    Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review by Hamed Taherdoost, Tuan-Vinh Le, Khadija Slimani

    Published 2025-03-01
    “…Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, and privacy violations. Cryptography has emerged as a crucial component in enhancing AI security by ensuring data confidentiality, authentication, and integrity. …”
    Get full text
    Article
  4. 444
  5. 445
  6. 446

    Organizations` Responsibility in Maintaining the Security of Personal Data posted Online by Romanian Consumers: an Exploratory Analysis of Facebook and Linkedin by Andreea Ionescu, Laurenţiu-Dan Anghel, Gheorghe Jinga

    Published 2014-02-01
    “…The information was gathered with the help of an online questionnaire, administered to people over 18 years old. It is a very useful and needed tool for Romanian companies, as it presents the users’ point of view, allowing them to find the best and most ethical way to do social data mining or use consumers’ private information, disclosed on such sites. …”
    Get full text
    Article
  7. 447

    Privacy Harm and Non-Compliance from a Legal Perspective by Suvineetha Herath, Haywood Gelman, Lisa McKee

    Published 2023-10-01
    “…Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. …”
    Get full text
    Article
  8. 448
  9. 449

    Fine-grained privacy operation control method for layout documents by Peijie YIN, Fenghua LI, Ben NIU, Haiyang LUO, Bin KUANG, Lingcui ZHANG

    Published 2023-05-01
    “…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
    Get full text
    Article
  10. 450

    MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS by Ajay K. Gupta, Udai Shanker

    Published 2022-06-01
    “…The features of mobile devices are being continuously upgraded to provide quality of services to the mobile user seeking location-based information by allowing the usage of context-aware data. To protect an individual’s location & his information to untrusted entity, a multi-level caching, i.e., Mobility Aware Data Replacement & Prefetching Policy Enrooted LBS using spatial k-anonymity (MAD-RAPPEL) is being proposed in this paper. …”
    Get full text
    Article
  11. 451
  12. 452

    Artificial Intelligence and Privacy: The Urgent Need for Children’s Media Literacy by Katharine Sarikakis, Angeliki Chatziefraimidou

    Published 2025-06-01
    “… Protecting children’s privacy continues to challenge policymakers and citizens alike in the media age and debates often point to the need for data protection literacy. …”
    Get full text
    Article
  13. 453

    A privacy-enhanced framework with deep learning for botnet detection by Guangli Wu, Xingyue Wang

    Published 2025-01-01
    “…Among the existing botnet detection methods, whether they extract deterministic traffic interaction features, use DNS traffic, or methods based on raw traffic bytes, these methods focus on the detection performance of the detection model and ignore possible privacy leaks. …”
    Get full text
    Article
  14. 454

    An efficient secure predictive demand forecasting system using Ethereum virtual machine by Himani Saraswat, Mahesh Manchanda, Sanjay Jasola

    Published 2024-12-01
    “…The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. …”
    Get full text
    Article
  15. 455

    Policy-Based Smart Contracts Management for IoT Privacy Preservation by Mohsen Rouached, Aymen Akremi, Mouna Macherki, Naoufel Kraiem

    Published 2024-12-01
    “…This paper addresses the challenge of preserving user privacy within the Internet of Things (IoT) ecosystem using blockchain technology. …”
    Get full text
    Article
  16. 456

    BPS-FL: Blockchain-Based Privacy-Preserving and Secure Federated Learning by Jianping Yu, Hang Yao, Kai Ouyang, Xiaojun Cao, Lianming Zhang

    Published 2025-02-01
    “…To resist malicious gradient attacks, we design a Byzantine-robust aggregation protocol for BPS-FL to realize the cipher-text level secure model aggregation. Moreover, we use a blockchain as the underlying distributed architecture to record all learning processes, which ensures the immutability and traceability of the data. …”
    Get full text
    Article
  17. 457

    Exposing privacy risks in indoor air pollution monitoring systems by Singh Krishna, Gujar Shreyash, Chaudhari Sachin, Kumaraguru Ponnurangam

    Published 2025-01-01
    “…Less detailed data like hourly averages, can be used to make meaningful conclusions that might intrude on an individual’s privacy. …”
    Get full text
    Article
  18. 458

    Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems by Francesca Musiani

    Published 2011-06-01
    “…Yet, it also suggests that the richness of today’s landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy, and may give room to a more articulate definition of the concept as related to P2P technology; one that includes not only the need of protection from external attacks, and the temporary outcomes of the competition between surveillance and counter-surveillance measures, but also issues such as user empowerment through better control over personal information, reconfiguration of data management practices, and removal of intermediaries in sharing and communication activities. …”
    Get full text
    Article
  19. 459

    Privacy and security challenges of the digital twin: systematic literature review by Marija Kuštelega, Renata Mekovec, Ahmed Shareef

    Published 2024-12-01
    “…The results indicate that the privacy and security challenges for digital twin implementation are complicated and may be divided into six primary groups: (1) data privacy, (2) data security, (3) data management, (4) data infrastructure and standardization, (5) ethical and moral issues, (6) legal and social issues. …”
    Get full text
    Article
  20. 460

    Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy by Saurabh Aggarwal, Ashish Khanna, Abhilash Maroju

    Published 2025-07-01
    “…Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffiliated cloud providers. …”
    Get full text
    Article