Suggested Topics within your search.
Suggested Topics within your search.
-
401
A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum
Published 2024-12-01“…The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. …”
Get full text
Article -
402
SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications
Published 2025-04-01“…Based on requirements, the control center decrypts the aggregated data using its private key. Employing the Paillier cryptosystem for encryption and RSA for authentication, SAFED is fault-tolerant, maintaining functionality even if some IoT nodes fail. …”
Get full text
Article -
403
-
404
BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management
Published 2025-01-01“…The security of PD-CP-ABE has also been formally proved using Tamarin Prover.…”
Get full text
Article -
405
Ethical Considerations in Emotion Recognition Research
Published 2025-05-01“…The development of real-time feedback loops for user awareness should be combined with clear disclosures about data use and participatory design practices. The successful oversight of these systems requires interdisciplinary work between researchers, policymakers, designers, and ethicists. …”
Get full text
Article -
406
Privacy-Preserving Federated Class-Incremental Learning
Published 2024-01-01“…For privacy protection, we use Bayesian differential privacy to provide more balanced privacy protection for different datasets. …”
Get full text
Article -
407
Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring
Published 2024-12-01“…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
Get full text
Article -
408
Wasserstein GAN for moving differential privacy protection
Published 2025-06-01“…Abstract Training machine learning models often requires large datasets, but using sensitive data for training poses risks of privacy leakage. …”
Get full text
Article -
409
Protecting contacts against privacy leaks in smartphones.
Published 2018-01-01Get full text
Article -
410
Marketing Implications of Information Society Privacy Concerns
Published 2012-12-01“…The Internet has facilitated access to intimate user knowledge for both official and private agents and most of modern marketing strategies are based on a wealth of personal user data used to target its specific needs and expectations, a process that has its obvious pros and cons, which have been heavily debated intensively in both academic and social venues. …”
Get full text
Article -
411
An Enhanced Communication Protocol for Location Privacy in WSN
Published 2015-04-01“…WSN is used in many applications, such as object tracking and security monitoring. …”
Get full text
Article -
412
Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System
Published 2025-06-01“…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
Get full text
Article -
413
Privacy protection scheme for mobile social network
Published 2022-07-01“…One way to protect one’s privacy is using encryption. Therefore, in the present paper, an improved secure design was presented for mobile social network using ciphertext-policy attribute-based encryption (CP-ABE) and advanced encryption standard (AES) that will encrypt users data in an end-to-end manner. …”
Get full text
Article -
414
-
415
Privacy-preserving task matching scheme for crowdsourcing
Published 2025-05-01“…Due to the potential untrustworthiness of crowdsourcing platforms, which may lead to the leakage of users’ private information, users are required to encrypt their data prior to uploading. To fulfill task matching while preserving privacy, the crowdsourcing platform employs encrypted spatial keyword queries to perform task matching of workers’ interests and locations. …”
Get full text
Article -
416
FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer
Published 2024-01-01“…After aggregating the model parameters sent by clients, the server performs a second iterative training on the aggregated model using its own metadata, thereby reducing data heterogeneity and improving model performance. …”
Get full text
Article -
417
Privacy-preserving maximum value determination scheme
Published 2025-07-01“…This paper introduces a quantum-secure scheme for conducting privacy-preserving maximum value determination, allowing the parties to ascertain the highest value from their confidential inputs while keeping non-maximum data private. …”
Get full text
Article -
418
Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data
Published 2025-07-01“…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
Get full text
Article -
419
Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program.
Published 2025-01-01“…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
Get full text
Article -
420
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
Get full text
Article