Showing 221 - 240 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR (\"uses OR \"used)) privacy data\\"))~\""', query time: 0.18s Refine Results
  1. 221

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article
  2. 222

    A Combined Approach of Heat Map Confusion and Local Differential Privacy for the Anonymization of Mobility Data by Christian Dürr, Gabriele S. Gühring

    Published 2025-07-01
    “…Mobility data plays a crucial role in modern location-based services (LBSs), yet it poses significant privacy risks, as it can reveal highly sensitive information such as home locations and behavioral patterns. …”
    Get full text
    Article
  3. 223

    Practical and privacy-preserving geo-social-based POI recommendation by Qi Xu, Hui Zhu, Yandong Zheng, Fengwei Wang, Le Gao

    Published 2024-03-01
    “…Specifically, we first utilize the quad tree to organize geographic data and the MinHash method to index social data. …”
    Get full text
    Article
  4. 224

    Privacy-preserving federated learning framework with dynamic weight aggregation by Zuobin YING, Yichen FANG, Yiwen ZHANG

    Published 2022-10-01
    “…There are two problems with the privacy-preserving federal learning framework under an unreliable central server.① A fixed weight, typically the size of each participant’s dataset, is used when aggregating distributed learning models on the central server.However, different participants have non-independent and homogeneously distributed data, then setting fixed aggregation weights would prevent the global model from achieving optimal utility.② Existing frameworks are built on the assumption that the central server is honest, and do not consider the problem of data privacy leakage of participants due to the untrustworthiness of the central server.To address the above issues, based on the popular DP-FedAvg algorithm, a privacy-preserving federated learning DP-DFL algorithm for dynamic weight aggregation under a non-trusted central server was proposed which set a dynamic model aggregation weight.The proposed algorithm learned the model aggregation weight in federated learning directly from the data of different participants, and thus it is applicable to non-independent homogeneously distributed data environment.In addition, the privacy of model parameters was protected using noise in the local model privacy protection phase, which satisfied the untrustworthy central server setting and thus reduced the risk of privacy leakage in the upload of model parameters from local participants.Experiments on dataset CIFAR-10 demonstrate that the DP-DFL algorithm not only provides local privacy guarantees, but also achieves higher accuracy rates with an average accuracy improvement of 2.09% compared to the DP-FedAvg algorithm models.…”
    Get full text
    Article
  5. 225
  6. 226

    Blockchain oracles for decentralized agricultural insurance using trusted IoT data by Manoj T, Krishnamoorthi Makkithaya, Narendra V. G., Vijaya Murari T

    Published 2025-01-01
    “…Initially, a method for computing the direct reputation score of IoT devices based on behavioral and data reputation is illustrated. Next, a privacy preserved decentralized oracle mechanism is designed and implemented using a masked secret sharing and secure aggregation scheme. …”
    Get full text
    Article
  7. 227
  8. 228

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. …”
    Get full text
    Article
  9. 229

    Social Engineering Threat Analysis Using Large-Scale Synthetic Data by Sellappan Palaniappan, Rajasvaran Logeswaran, Shapla Khanam, Pulasthi Gunawardhana

    Published 2025-02-01
    “…Our model achieved an accuracy of 0.8984 and an F1 score of 0.9253, demonstrating its effectiveness in detecting social engineering attacks. The use of synthetic data overcomes the problem of lack of availability of real-world data due to privacy issues, and is demonstrated in this work to be safe, scalable, ethics friendly and effective.…”
    Get full text
    Article
  10. 230
  11. 231

    Human Daily Indoor Action (HDIA) Dataset: Privacy-Preserving Human Action Recognition Using Infrared Camera and Wearable Armband Sensors by Jongbum Park, Kyoung Ok Yang, Sunme Park, Jun Won Choi

    Published 2025-01-01
    “…The use of IR sensors enhances privacy, making the dataset ethically suitable for long-term monitoring. …”
    Get full text
    Article
  12. 232

    Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network by Lusheng Shi, Huibo Zhu, Lin Chen

    Published 2013-11-01
    “…The algorithm uses homomorphism encryption techniques based on elliptic curve to address data privacy protection, and uses an efficient aggregate signature scheme to ensure data integrity and authenticity. …”
    Get full text
    Article
  13. 233

    (<italic>r, k, &#x03B5;</italic>)-Anonymization: Privacy-Preserving Data Publishing Algorithm Based on Multi-Dimensional Outlier Detection, <italic>k</italic>-Anonymity, and <itali... by Burak Cem Kara, Can Eyupoglu, Oktay Karakus

    Published 2025-01-01
    “…The general data protection regulation (GDPR) implementation, on the other hand, has introduced extensive control over the use of individuals&#x2019; personal information and placed many limits. …”
    Get full text
    Article
  14. 234

    The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles by Emmi Eronen, Alpo Olavi Värri, Miika Järvinen

    Published 2025-05-01
    “…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
    Get full text
    Article
  15. 235

    Navigating the EU data governance labyrinth: A business perspective on data sharing in the financial sector by Eugénie Coche, Ans Kolk, Martijn Dekker

    Published 2024-02-01
    “…With policy-making (“on the books”) centred on guaranteeing data privacy and data security whilst promoting innovation, firms face complexities when implementing this framework “on the ground”. …”
    Get full text
    Article
  16. 236
  17. 237
  18. 238

    Optimizing Customer Data Security in Water Meter Data Management Based on RESTful API and Data Encryption Using AES-256 Algorithm by Syahrul Adrianto, Bambang Agus Herlambang, Ramadhan Renaldy

    Published 2025-06-01
    “…To increase the security of customer data, a cryptographic algorithm is used, namely the Advanced Encryption Standard (AES) algorithm with a 256-bit key length to secure data that is considered sensitive and contains high privacy. …”
    Get full text
    Article
  19. 239

    Continuous location privacy protection mechanism based on differential privacy by Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA

    Published 2021-08-01
    “…Aiming at the problem of users’ location privacy leakage caused by continuously using LBS, a road privacy level (RPL) algorithm was proposed based on road topological network, which divided the privacy level of the road sections around the sensitive locations.Then, a differential privacy location protection mechanism (DPLPM) was proposed.Privacy budget was allocated for sensitive road sections and Laplace noise was added to realize the privacy protection of location data.The experimental results show that the mechanism has high data availability while protecting the privacy of location information.…”
    Get full text
    Article
  20. 240

    Federated learning with differential privacy for breast cancer diagnosis enabling secure data sharing and model integrity by Shubhi Shukla, Suraksha Rajkumar, Aditi Sinha, Mohamed Esha, Konguvel Elango, Vidhya Sampath

    Published 2025-04-01
    “…This mitigates adversarial attacks and prevents data leakage. The proposed work uses the Breast Cancer Wisconsin Diagnostic dataset to address critical challenges such as data heterogeneity, privacy-accuracy trade-offs, and computational overhead. …”
    Get full text
    Article