Showing 321 - 340 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\"uses OR \\"used) privacy data\\"))\""', query time: 0.23s Refine Results
  1. 321

    The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles by Emmi Eronen, Alpo Olavi Värri, Miika Järvinen

    Published 2025-05-01
    “…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
    Get full text
    Article
  2. 322

    Research on privacy preservation of member inference attacks in online inference process for vertical federated learning linear model by Hongshu YIN, Xuhua ZHOU, Wenjun ZHOU

    Published 2022-09-01
    “…With the development of big data and the introduction of data security regulations, the awareness of privacy protection has gradually increased, and the phenomenon of data isolation has become more and more serious.Federated learning technology as one of the effective methods to solve this problem has become a hot spot of concern.In the online inference process of vertical federated learning, the current mainstream methods do not consider the protection of data identity, which is easy to leak user privacy.A privacy protection method for member inference attacks was proposed in the online inference process of the vertical federated linear model.A filter with a false positive rate was constructed to avoid the accurate positioning of data identity to ensure the security of data.Homomorphic encryption was used to realize the full encrypted state of the online inference process and protect the intermediate calculation results.According to the ciphertext multiplication property of homomorphic encryption, the random number multiplication method was used to mask data, which ensured the security of the final inference result.This scheme further improved the security of user privacy in the online inference process of vertical federated learning and had lower computation overhead and communication costs.…”
    Get full text
    Article
  3. 323

    Integration of metaheuristic based feature selection with ensemble representation learning models for privacy aware cyberattack detection in IoT environments by M. Karthikeyan, R. Brindha, Maria Manuel Vianny, V. Vaitheeshwaran, Mrinal Bachute, Sanket Mishra, Bibhuti Bhusan Dash

    Published 2025-07-01
    “…Abstract The Internet of Things (IoT) connects virtual and physical objects inserted with software, devices, and other technology that interchange data utilizing the Internet. It enables diverse devices and individuals to exchange data, interconnect, and personalize services to ease usage. …”
    Get full text
    Article
  4. 324

    Integrating advanced neural network architectures with privacy enhanced encryption for secure and intelligent healthcare analytics by C. Ramesh Babu Durai, S. Dhanasekaran, M. Jamuna Rani, Sindhu Chandra Sekharan

    Published 2025-08-01
    “…Detailed evaluation accepts the performance of structure in maintaining privacy through providing high-demonstration analysis for healthcare data protection. …”
    Get full text
    Article
  5. 325
  6. 326
  7. 327

    Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks by Alejandro Martínez-Arce, Alberto Bermejo-Cantarero, Laura Muñoz de Morales-Romero, Víctor Baladrón-González, Natalia Bejarano-Ramírez, Gema Verdugo-Moreno, María Antonia Montero-Gaspar, Francisco Javier Redondo-Calvo

    Published 2024-10-01
    “…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
    Get full text
    Article
  8. 328

    Protection of personal data under martial law in Ukraine by V. A. Svitlychnyi

    Published 2023-09-01
    “…Particular attention has been paid to the need to develop and implement specialised legal acts that would regulate the protection of personal data in such emergency situations. The possibilities of using modern technologies, in particular data encryption and multi-level authentication, to enhance the security and confidentiality of personal data have also been considered. …”
    Get full text
    Article
  9. 329

    Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions by R. Vijay Anand, G. Magesh, I. Alagiri, Madala Guru Brahmam, Balamurugan Balusamy, Chithirai Pon Selvan, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2025-01-01
    “…After that, these local models are aggregated towards a common, global model using secure aggregation methods, which makes sure that there is nozza of data privacy and hence, in the process making sure that more accurate models can be obtained due to diversified data sets. …”
    Get full text
    Article
  10. 330

    Malaysian Public’s Perception Toward Event Data Recorder (EDR) in Vehicles by Fadhlan Hafizhelmi Kamaru Kamaru Zaman, Ismail Danish Rozaimi, Syahrul Afzal Che Abdullah, Lucyantie Mazalan, Husna Zainol Abidin, Amir Radzi Ab. Ghani, Yahaya Ahmad

    Published 2024-12-01
    “…Besides, 40.3% expressed concern about potential privacy breaches and misuse of EDR data. Despite that, nearly 80% of respondents were in favor of installing EDR in their vehicles and allowing the data to be used in court. …”
    Get full text
    Article
  11. 331

    Traversable Ledger for Responsible Data Sharing and Access Control in Health Research by Sunanda Bose, Dusica Marijan

    Published 2024-12-01
    “…Healthcare institutions and health registries often store patients’ health data. In order to ensure privacy, sensitive medical information is stored separately from the identifying information of the patient. …”
    Get full text
    Article
  12. 332

    Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property by Hanyue Sun, Jiajia Liu, Bingyuan Chen, Le Yang

    Published 2024-12-01
    “…However, a comprehensive and multidimensional examination of the research landscape is still required to better understand its structure and evolution. Using CiteSpace software, this study conducts a bibliometric analysis, revealing key trends and patterns in collaboration, co-citation, and keyword co-occurrence in the field of data-based intellectual property. …”
    Get full text
    Article
  13. 333

    TAPS Responsibility matrix: a tool for responsible data science by design by Visara Urovi, Remzi Celebi, Chang Sun, Parveen Kumar, Linda Rieswijk, Michael Erard, Arif Yilmaz, Kody Moodley, Michel Dumontier

    Published 2024-12-01
    “…We map TAPS-RM to well-known initiatives for open-data (FACT/FAIR and Datasheets for datasets). We conclude that TAPS-RM is a tool to reflect on responsibilities at a data science project level and can be used to advance responsible data science by design.…”
    Get full text
    Article
  14. 334

    NFTs enabled federated digital identity data representation and management by Memoona Javeria Anwar, Asif Qumer Gill

    Published 2025-05-01
    “…The idea of using NFTs to represent digital identities and their associated data is promising, but it also raises significant concerns regarding data privacy and compliance. …”
    Get full text
    Article
  15. 335
  16. 336

    Community views on the secondary use of general practice data: Findings from a mixed‐methods study by Annette J. Braunack‐Mayer, Carolyn Adams, Alberto Nettel‐Aguirre, Belinda Fabrianesi, Lucy Carolan, Justin Beilby, Felicity Flack

    Published 2024-02-01
    “…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
    Get full text
    Article
  17. 337

    High-Order Vehicular Pattern Learning and Privacy-Preserving and Unsupervised GAN for Privacy Protection Toward Vehicular Parts Detection by Yanqin Zhang, Zhanling Zhang

    Published 2025-01-01
    “…To preserve data privacy, we use the PPUP-GAN to create massive-scale vehicular data that well mimics real data. …”
    Get full text
    Article
  18. 338
  19. 339

    Challenges and Ethical Considerations in Implementing Assistive Technologies in Healthcare by Eleni Gkiolnta, Debopriyo Roy, George F. Fragulis

    Published 2025-01-01
    “…As AI-powered solutions become more widely used, we discovered that stronger legal frameworks and robust data security standards are required. …”
    Get full text
    Article
  20. 340