Showing 181 - 200 results of 2,784 for search '"\"((\\"use privacy data\\") OR (((\"useds OR \"uses) OR \"used) privacy data\\"))~\""', query time: 0.17s Refine Results
  1. 181

    Decoding privacy concerns: the role of perceived risk and benefits in personal health data disclosure by Havva Nur Atalay, Şebnem Yücel

    Published 2024-10-01
    “…The sample of the study consisted of individuals who were reached through a convenience sampling method. The scales for privacy concerns, perceived control, perceived risk, perceived benefits and information disclosure behaviour were used in the study. …”
    Get full text
    Article
  2. 182

    DP-FedCMRS: Privacy-Preserving Federated Learning Algorithm to Solve Heterogeneous Data by Yang Zhang, Shigong Long, Guangyuan Liu, Junming Zhang

    Published 2025-01-01
    “…In federated learning, non-independently and non-identically distributed heterogeneous data on the clients can limit both the convergence speed and model utility of federated learning, and gradients can be used to infer original data, posing a threat to user privacy. …”
    Get full text
    Article
  3. 183
  4. 184

    Privacy-preserving federated learning for collaborative medical data mining in multi-institutional settings by Rahul Haripriya, Nilay Khare, Manish Pandey

    Published 2025-04-01
    “…Abstract Ensuring data privacy in medical image classification is a critical challenge in healthcare, especially with the increasing reliance on AI-driven diagnostics. …”
    Get full text
    Article
  5. 185

    Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks by Geng Yang, Sen Li, Xiaolong Xu, Hua Dai, Zhen Yang

    Published 2013-04-01
    “…Based on the Slice-Mix-AggRegaTe (SMART) scheme, it optimizes data slicing by using small data packet, node classifying, and positive and negative data slicing techniques. …”
    Get full text
    Article
  6. 186

    Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI

    Published 2021-10-01
    “…General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user by accurately tracing the identity according to a leaked decryption key is a huge challenge.Moreover, most of existing revocable schemes incur long user revocation list and low efficiency.To solve these problems, a time-based and privacy preserving revocable and traceable data sharing scheme was proposed based on CP-ABE to support expressive monotonic and partial hidden access policy, large attribute universe by conceal the attribute values in access policy.Time-limited data access control using hierarchical identity-based encryption was achieved to set key valid period for users.Moreover, with the approaches of white-box tracing and binary tree, efficient user tracing and direct revocation with shorter revocation list was realized together with high efficiency via online/offline and verifiable outsourced decryption techniques.Furthermore, the scheme was secure under decisional q-BDHE assumption.Theoretical analysis and extensive experiments demonstrate its advantageous performance in computational and storage cost.…”
    Get full text
    Article
  7. 187
  8. 188

    Advancing Data Privacy in Cloud Storage: A Novel Multi-Layer Encoding Framework by Kamta Nath Mishra, Rajesh Kumar Lal, Paras Nath Barwal, Alok Mishra

    Published 2025-07-01
    “…Data privacy is a crucial concern for individuals using cloud storage services, and cloud service providers are increasingly focused on meeting this demand. …”
    Get full text
    Article
  9. 189

    Privacy Risk Assessment of Medical Big Data Based on Information Entropy and FCM Algorithm by Xiaoliang Zhang, Tianwei Guo

    Published 2024-01-01
    “…However, the high sensitivity and privacy of medical data also bring serious security challenges. …”
    Get full text
    Article
  10. 190

    The Law Reform Regarding the Regulation of Medical Use of Artificial Intelligence and the Protection of Patient Privacy in the Utilization of Artificial Intelligence in Health Care by Meidiawaty Fusia

    Published 2024-01-01
    “…This reform should include restrictions on the use of artificial intelligence in the health sector, as well as guarantees of confidentiality of patient data.…”
    Get full text
    Article
  11. 191

    Multi-party summation query method based on differential privacy by Xianmang HE

    Published 2020-06-01
    “…Differential privacy is considered to be a very reliable protection mechanism because it does not require the a prior knowledge for the attacker.However,differential privacy is rarely used in a multi-party environment.In view of this,the differential privacy is applied to the data summation query in multi-party environment.This method was described in detail and proved the security of the method.…”
    Get full text
    Article
  12. 192

    EXPLORING USER PERSPECTIVES ON THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN FINANCIAL TECHNOLOGY by Sadhana Tiwari, Mohammad Asif, Amar Johri, Mohammad Wasiq, Mohd Imran

    Published 2024-12-01
    “…Structural equation modeling was employed to study the relationships between the adoption of fintech AI and its predictors, namely Perceived Usefulness, Perceived Privacy and Security, Perceived Ease of Use, and Satisfaction of Fintech AI. …”
    Get full text
    Article
  13. 193

    Federated Mental Wellbeing Assessment Using Smartphone Sensors Under Unreliable Participation by Gavryel Martis, Ryan McConville

    Published 2025-01-01
    “…The findings suggested that given the widespread use of such devices, FL holds great potential in mood and depression detection while protecting data privacy. …”
    Get full text
    Article
  14. 194

    Human Behavior Analysis Using Radar Data: A Survey by Patrycja Miazek, Alicja Zmudzinska, Pawel karczmarek, Adam Kiersztyn

    Published 2024-01-01
    “…In this study, we focus not only on the analysis of human behavior using radar but also on video observations. We review methods of human activity recognition using LiDAR. …”
    Get full text
    Article
  15. 195

    Efficient and Privacy-Preserving Decision Tree Inference via Homomorphic Matrix Multiplication and Leaf Node Pruning by Satoshi Fukui, Lihua Wang, Seiichi Ozawa

    Published 2025-05-01
    “…Cloud computing is widely used by organizations and individuals to outsource computation and data storage. …”
    Get full text
    Article
  16. 196

    A differentially-private mechanism for multi-level data publishing by Wen-jing ZHANG, Hui LI

    Published 2015-12-01
    “…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
    Get full text
    Article
  17. 197

    THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS by Thi Thu Huong Hoang, Hoang Nam Vu, Thi Khanh Chi Nguyen

    Published 2023-04-01
    “…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
    Get full text
    Article
  18. 198
  19. 199

    What we do with data: a performative critique of data 'collection' by Garfield Benjamin

    Published 2021-12-01
    “…How do terms and practices relate in defining the norms of data in society? This article undertakes a critique of data collection using data feminism and a performative theory of privacy: as a resource, an objective discovery and an assumption. …”
    Get full text
    Article
  20. 200

    Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice by Zhilong Guo

    Published 2025-06-01
    “…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
    Get full text
    Article