Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"useds » \"usedds (Expand Search)
-
301
-
302
-
303
Does data privacy influence digital marketing? The mediating role of AI-driven trust: An empirical study of Zain Telecom company in Jordan
Published 2025-01-01“…The PLS-SEM technique was used in this research to analyze data privacy, digital marketing effectiveness, and AI-driven trust constructs. …”
Get full text
Article -
304
Data Obfuscation Through Latent Space Projection for Privacy-Preserving AI Governance: Case Studies in Medical Diagnosis and Finance Fraud Detection
Published 2025-03-01“… Abstract BackgroundThe increasing integration of artificial intelligence (AI) systems into critical societal sectors has created an urgent demand for robust privacy-preserving methods. Traditional approaches such as differential privacy and homomorphic encryption often struggle to maintain an effective balance between protecting sensitive information and preserving data utility for AI applications. …”
Get full text
Article -
305
Analyzing the vulnerabilities in Split Federated Learning: assessing the robustness against data poisoning attacks
Published 2025-08-01“…Abstract Distributed Collaborative Machine Learning (DCML) offers a promising alternative to address privacy concerns in centralized machine learning. …”
Get full text
Article -
306
FedSVD: Asynchronous Federated Learning With Stale Weight Vector Decomposition
Published 2025-01-01“…Federated learning (FL) emerges as a collaborative learning framework that addresses the critical needs for privacy preservation and communication efficiency. …”
Get full text
Article -
307
-
308
A privacy preserving machine learning framework for medical image analysis using quantized fully connected neural networks with TFHE based inference
Published 2025-07-01“…However, sharing sensitive raw medical data with third parties for analysis raises significant privacy concerns. …”
Get full text
Article -
309
Blockchain oracles for decentralized agricultural insurance using trusted IoT data
Published 2025-01-01“…Initially, a method for computing the direct reputation score of IoT devices based on behavioral and data reputation is illustrated. Next, a privacy preserved decentralized oracle mechanism is designed and implemented using a masked secret sharing and secure aggregation scheme. …”
Get full text
Article -
310
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
Get full text
Article -
311
Data Security Model Using (AES-LEA) Algorithms for WoT Environment
Published 2025-06-01“…Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. …”
Get full text
Article -
312
Social Engineering Threat Analysis Using Large-Scale Synthetic Data
Published 2025-02-01“…Our model achieved an accuracy of 0.8984 and an F1 score of 0.9253, demonstrating its effectiveness in detecting social engineering attacks. The use of synthetic data overcomes the problem of lack of availability of real-world data due to privacy issues, and is demonstrated in this work to be safe, scalable, ethics friendly and effective.…”
Get full text
Article -
313
Approach to keyword search over encrypted data in cloud
Published 2014-11-01“…With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.…”
Get full text
Article -
314
Collection of location data in criminal proceedings – European (the EU and Strasbourg) standards
Published 2021-03-01“…This article deals with the problem of collecting, retaining and processing location data for use in criminal proceedings. The collection of location data is an interference with the right to privacy (the Article 8 of the ECHR, the Article 7 of the Charter). …”
Get full text
Article -
315
How good is your synthetic data? SynthRO, a dashboard to evaluate and benchmark synthetic tabular data
Published 2025-02-01“…Conclusions Synthetic data mitigate concerns about privacy and data accessibility, yet lacks standardized evaluation metrics. …”
Get full text
Article -
316
Secure and trusted sharing mechanism of private data for Internet of Things
Published 2025-06-01“…This practice creates the risk of privacy breaches on IoT data sharing platforms, including issues such as data tampering and data breaches. …”
Get full text
Article -
317
Tabular Data Augmentation Using Artificial Intelligence: A Systematic Review and Taxonomic Framework
Published 2025-01-01Get full text
Article -
318
The tension of usable safety, security and privacy
Published 2025-03-01“…In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people’s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).…”
Get full text
Article -
319
Survey on privacy protection indoor positioning
Published 2023-09-01“…Smartphones are usually provided with indoor positioning services by third-party positioning service providers, in which the unique privacy leakage risk has become a major factor limiting its development.How to protect the privacy of users and data in the positioning process has become an important issue to be solved.The research progress of indoor positioning privacy protection in recent years was reviewed.The commonly used indoor positioning technologies were introduced, different implementation architectures of indoor positioning systems and their threat models, privacy protection requirements were discussed, security technologies applied to indoor positioning privacy protection were summarized, indoor positioning privacy protection schemes for different architectures were classified and introduced, and the performance of different schemes and their advantages and disadvantages were comprehensively compared and analyzed, and finally future research trends were summarized and looked forward to.…”
Get full text
Article -
320
The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles
Published 2025-05-01“…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
Get full text
Article