Search alternatives:
\\"useds » \\"usedds (Expand Search)
\"useddds » \"usedddds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
\\"use » \\"used (Expand Search)
Showing 381 - 400 results of 2,784 for search '"\"((((\\"useds OR \"useddds) OR \"useddddds) privacy data\\") OR (\\"use privacy data\\"))\""', query time: 0.17s Refine Results
  1. 381

    New Images of the Globalized World Crossed by Artificial Intelligence by Vanina Rodríguez

    Published 2023-12-01
    “…Data privacy and security are also major challenges in the use of AI to generate and select content. …”
    Get full text
    Article
  2. 382

    Blockchain-Enabled Federated Learning in Healthcare: Survey and State-of-the-Art by Nasim Nezhadsistani, Naghmeh S. Moayedian, Burkhard Stiller

    Published 2025-01-01
    “…Centralization of health data to train ML models does pose privacy, ownership, and regulatory problems. …”
    Get full text
    Article
  3. 383
  4. 384
  5. 385

    Federated Learning for Human Activity Recognition: Overview, Advances, and Challenges by Ons Aouedi, Alessio Sacco, Latif U. Khan, Dinh C. Nguyen, Mohsen Guizani

    Published 2024-01-01
    “…Federated Learning (FL) is a promising paradigm for HAR that enables the collaborative training of machine learning models on decentralized devices while preserving data privacy. It improves not only data privacy but also training efficiency as it utilizes the computing power and data of potentially millions of smart devices for parallel training. …”
    Get full text
    Article
  6. 386

    PCRFed: personalized federated learning with contrastive representation for non-independently and identically distributed medical image segmentation by Shengyuan Liu, Ruofan Zhang, Mengjie Fang, Hailin Li, Tianwang Xun, Zipei Wang, Wenting Shang, Jie Tian, Di Dong

    Published 2025-03-01
    “…Abstract Federated learning (FL) has shown great potential in addressing data privacy issues in medical image analysis. However, varying data distributions across different sites can create challenges in aggregating client models and achieving good global model performance. …”
    Get full text
    Article
  7. 387

    Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things by A. Sasikumar, Logesh Ravi, Malathi Devarajan, A. Selvalakshmi, Abdulaziz Turki Almaktoom, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed

    Published 2024-01-01
    “…In addition, we developed a blockchain-integrated data-sharing scheme that makes it possible for users to share data via the use of edge and cloud storage. …”
    Get full text
    Article
  8. 388

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain by Lin JIN, Youliang TIAN

    Published 2022-08-01
    “…Currently, there is no data exchanging and sharing between different hospitals, and it is easy to form data islands.At the same time, regional medical data contains a large amount of sensitive information of patients.The public acquisition, sharing and circulation of these data will lead to malicious tampering, theft, abuse and loss of ownership, thereby revealing patient privacy.In addition, the size of medical data is enormous and the data is unstructured, then it is more difficult to prevent and hold accountable some highly targeted malicious attacks, such as malicious attacks on medical data theft, tampering, and extortion.In view of the above problems, a blockchain-based on multi-authority attribute hidden electronic medical record sharing scheme was proposed to achieve fine-grained access to shared electronic medical records while ensuring patient privacy.The Multi-Authorization Attribute Encryption (MA-ABE) algorithm was introduced, which used multi-authority organizations to manage decentralized attributes.It also used hash functions to identify different users, in order to effectively resist collusion attacks between users with different authorizations.Besides, the linear secrets sharing scheme (LSSS) was used to realize partial hiding of attributes, and the attributes were divided into two parts:attribute name and attribute value.In addition, combined with the characteristics of blockchain openness, transparency and tamper-proof, the design of access policy can update the algorithm.Based on the access policy update algorithm, the policy block was added.The new access policy was uploaded to the blockchain to form a policy update traceability chain, which can realize distributed and reliable access control management under the condition of hidden policy.It can also support data privacy protection at the same time, and traceability of user behavior.The theoretical proof and experimental analysis have proved that this scheme protect attribute privacy effectively, while reduces computational overhead.…”
    Get full text
    Article
  9. 389
  10. 390
  11. 391

    Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review by Hamed Taherdoost, Tuan-Vinh Le, Khadija Slimani

    Published 2025-03-01
    “…Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, and privacy violations. Cryptography has emerged as a crucial component in enhancing AI security by ensuring data confidentiality, authentication, and integrity. …”
    Get full text
    Article
  12. 392
  13. 393
  14. 394

    Organizations` Responsibility in Maintaining the Security of Personal Data posted Online by Romanian Consumers: an Exploratory Analysis of Facebook and Linkedin by Andreea Ionescu, Laurenţiu-Dan Anghel, Gheorghe Jinga

    Published 2014-02-01
    “…The information was gathered with the help of an online questionnaire, administered to people over 18 years old. It is a very useful and needed tool for Romanian companies, as it presents the users’ point of view, allowing them to find the best and most ethical way to do social data mining or use consumers’ private information, disclosed on such sites. …”
    Get full text
    Article
  15. 395

    Privacy Harm and Non-Compliance from a Legal Perspective by Suvineetha Herath, Haywood Gelman, Lisa McKee

    Published 2023-10-01
    “…Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. …”
    Get full text
    Article
  16. 396

    A privacy preserving machine learning framework for medical image analysis using quantized fully connected neural networks with TFHE based inference by Sadhana Selvakumar, B. Senthilkumar

    Published 2025-07-01
    “…However, sharing sensitive raw medical data with third parties for analysis raises significant privacy concerns. …”
    Get full text
    Article
  17. 397

    Fine-grained privacy operation control method for layout documents by Peijie YIN, Fenghua LI, Ben NIU, Haiyang LUO, Bin KUANG, Lingcui ZHANG

    Published 2023-05-01
    “…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
    Get full text
    Article
  18. 398

    MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS by Ajay K. Gupta, Udai Shanker

    Published 2022-06-01
    “…The features of mobile devices are being continuously upgraded to provide quality of services to the mobile user seeking location-based information by allowing the usage of context-aware data. To protect an individual’s location & his information to untrusted entity, a multi-level caching, i.e., Mobility Aware Data Replacement & Prefetching Policy Enrooted LBS using spatial k-anonymity (MAD-RAPPEL) is being proposed in this paper. …”
    Get full text
    Article
  19. 399

    Artificial Intelligence and Privacy: The Urgent Need for Children’s Media Literacy by Katharine Sarikakis, Angeliki Chatziefraimidou

    Published 2025-06-01
    “… Protecting children’s privacy continues to challenge policymakers and citizens alike in the media age and debates often point to the need for data protection literacy. …”
    Get full text
    Article
  20. 400

    A privacy-enhanced framework with deep learning for botnet detection by Guangli Wu, Xingyue Wang

    Published 2025-01-01
    “…Among the existing botnet detection methods, whether they extract deterministic traffic interaction features, use DNS traffic, or methods based on raw traffic bytes, these methods focus on the detection performance of the detection model and ignore possible privacy leaks. …”
    Get full text
    Article