Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"useds » \"usedds (Expand Search)
\\"use » \\"used (Expand Search)
\\"useds » \\"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\"useds » \"usedds (Expand Search)
-
441
Federated edge learning model based on multi-level proxy permissioned blockchain
Published 2024-04-01Get full text
Article -
442
Federated edge learning model based on multi-level proxy permissioned blockchain
Published 2024-04-01Get full text
Article -
443
Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review
Published 2025-03-01“…Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, and privacy violations. Cryptography has emerged as a crucial component in enhancing AI security by ensuring data confidentiality, authentication, and integrity. …”
Get full text
Article -
444
SafeTrack: Secure Tracking Protocol for Mobile Sensor Nodes in Unstable Wireless Sensor Networks
Published 2025-01-01Get full text
Article -
445
-
446
Organizations` Responsibility in Maintaining the Security of Personal Data posted Online by Romanian Consumers: an Exploratory Analysis of Facebook and Linkedin
Published 2014-02-01“…The information was gathered with the help of an online questionnaire, administered to people over 18 years old. It is a very useful and needed tool for Romanian companies, as it presents the users’ point of view, allowing them to find the best and most ethical way to do social data mining or use consumers’ private information, disclosed on such sites. …”
Get full text
Article -
447
Privacy Harm and Non-Compliance from a Legal Perspective
Published 2023-10-01“…Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. …”
Get full text
Article -
448
-
449
Fine-grained privacy operation control method for layout documents
Published 2023-05-01“…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
Get full text
Article -
450
MAD-RAPPEL: Mobility Aware Data Replacement And Prefetching Policy Enrooted LBS
Published 2022-06-01“…The features of mobile devices are being continuously upgraded to provide quality of services to the mobile user seeking location-based information by allowing the usage of context-aware data. To protect an individual’s location & his information to untrusted entity, a multi-level caching, i.e., Mobility Aware Data Replacement & Prefetching Policy Enrooted LBS using spatial k-anonymity (MAD-RAPPEL) is being proposed in this paper. …”
Get full text
Article -
451
Social media in health care- - Ethically challenging - -Dangerous but attractive- -use with caution
Published 2023-09-01Get full text
Article -
452
Artificial Intelligence and Privacy: The Urgent Need for Children’s Media Literacy
Published 2025-06-01“… Protecting children’s privacy continues to challenge policymakers and citizens alike in the media age and debates often point to the need for data protection literacy. …”
Get full text
Article -
453
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…Among the existing botnet detection methods, whether they extract deterministic traffic interaction features, use DNS traffic, or methods based on raw traffic bytes, these methods focus on the detection performance of the detection model and ignore possible privacy leaks. …”
Get full text
Article -
454
An efficient secure predictive demand forecasting system using Ethereum virtual machine
Published 2024-12-01“…The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. …”
Get full text
Article -
455
Policy-Based Smart Contracts Management for IoT Privacy Preservation
Published 2024-12-01“…This paper addresses the challenge of preserving user privacy within the Internet of Things (IoT) ecosystem using blockchain technology. …”
Get full text
Article -
456
BPS-FL: Blockchain-Based Privacy-Preserving and Secure Federated Learning
Published 2025-02-01“…To resist malicious gradient attacks, we design a Byzantine-robust aggregation protocol for BPS-FL to realize the cipher-text level secure model aggregation. Moreover, we use a blockchain as the underlying distributed architecture to record all learning processes, which ensures the immutability and traceability of the data. …”
Get full text
Article -
457
Exposing privacy risks in indoor air pollution monitoring systems
Published 2025-01-01“…Less detailed data like hourly averages, can be used to make meaningful conclusions that might intrude on an individual’s privacy. …”
Get full text
Article -
458
Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems
Published 2011-06-01“…Yet, it also suggests that the richness of today’s landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy, and may give room to a more articulate definition of the concept as related to P2P technology; one that includes not only the need of protection from external attacks, and the temporary outcomes of the competition between surveillance and counter-surveillance measures, but also issues such as user empowerment through better control over personal information, reconfiguration of data management practices, and removal of intermediaries in sharing and communication activities. …”
Get full text
Article -
459
Privacy and security challenges of the digital twin: systematic literature review
Published 2024-12-01“…The results indicate that the privacy and security challenges for digital twin implementation are complicated and may be divided into six primary groups: (1) data privacy, (2) data security, (3) data management, (4) data infrastructure and standardization, (5) ethical and moral issues, (6) legal and social issues. …”
Get full text
Article -
460
Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
Published 2025-07-01“…Cloud adoption is hampered by the serious security and privacy issues that arise when data and apps are outsourced to unaffiliated cloud providers. …”
Get full text
Article