Showing 441 - 460 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"useds OR (\"uses OR \"used)) privacy data\\"))~\""', query time: 0.21s Refine Results
  1. 441
  2. 442

    Federated Learning for Heterogeneous Multi-Site Crop Disease Diagnosis by Wesley Chorney, Abdur Rahman, Yibin Wang, Haifeng Wang, Zhaohua Peng

    Published 2025-04-01
    “…The objective of this collaboration is to create a classifier that every farm can use to detect and manage rice crop diseases by leveraging data sharing while safeguarding data privacy. …”
    Get full text
    Article
  3. 443

    A Systematic Literature Review of Machine Unlearning Techniques in Neural Networks by Ivanna Daniela Cevallos, Marco E. Benalcázar, Ángel Leonardo Valdivieso Caraguay, Jonathan A. Zea, Lorena Isabel Barona-López

    Published 2025-04-01
    “…This review examines the field of machine unlearning in neural networks, an area driven by data privacy regulations such as the General Data Protection Regulation and the California Consumer Privacy Act. …”
    Get full text
    Article
  4. 444

    Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews by Sabrina Fesl, Caroline Lang, Jochen Schmitt, Stefanie Brückner, Stephen Gilbert, Stefanie Deckert, Madlen Scheibe

    Published 2025-06-01
    “…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
    Get full text
    Article
  5. 445

    Concurrent prescriptions for opioids and benzodiazepines and risk of opioid overdose: protocol for a retrospective cohort study using linked administrative data by Kristian B Filion, Robyn Tamblyn, David L Buckeridge, Erin Y Liu

    Published 2021-02-01
    “…Our aim was to assess the risk of opioid overdose associated with concurrent use of opioids and benzodiazepines relative to opioids alone.Methods and analysis A retrospective cohort study will be conducted using medical claims data from adult residents of Montréal, Canada. …”
    Get full text
    Article
  6. 446

    Ethereum blockchain for electronic health records: securing and streamlining patient management by J. S. Simi Mole, J. S. Simi Mole, R. S. Shaji, R. S. Shaji

    Published 2024-09-01
    “…Electronic health records (EHRs) are increasingly replacing traditional paper-based medical records due to their speed, security, and ability to eliminate redundant data. However, challenges such as EHR interoperability and privacy concerns remain unresolved. …”
    Get full text
    Article
  7. 447

    Convergence Analysis for Differentially Private Federated Averaging in Heterogeneous Settings by Yiwei Li, Shuai Wang, Qilong Wu

    Published 2025-02-01
    “…Federated learning (FL) has emerged as a prominent approach for distributed machine learning, enabling collaborative model training while preserving data privacy. However, the presence of non-i.i.d. data and the need for robust privacy protection introduce significant challenges in theoretically analyzing the performance of FL algorithms. …”
    Get full text
    Article
  8. 448

    Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure by Alex Dhima, Soumya Choudhary, Keris Myrick, John Torous

    Published 2025-06-01
    “…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
    Get full text
    Article
  9. 449
  10. 450

    DEBPIR: enhancing information privacy in decentralized business modeling by Gulshan Kumar, Rahul Saha, Mauro Conti, Tai Hoon Kim

    Published 2025-05-01
    “…Abstract Business modelling often involves extensive data collection and analysis, raising concerns about privacy infringement. …”
    Get full text
    Article
  11. 451

    A proxy for privacy uncovering the surveillance ecology of mobile apps by Signe Sophus Lai, Sofie Flensburg

    Published 2020-07-01
    “…We explore the surveillance ecology of mobile apps and thereby the privacy implications of everyday smartphone use through three analytical perspectives: The first focuses on the ‘appscapes’ of individual smartphone users and investigates the consequences of which and how many mobile apps users download on their phones; the second compares different types of apps in order to study the app ecology and the relationships between app and third-party service providers; and the third focuses on a particular app category and discusses the functional as well as the commercial incentives for permissions and third-party collaborations. …”
    Get full text
    Article
  12. 452
  13. 453

    Using fuzzy decision support to create a positive mental health environment for preschoolers by Xinyue Li

    Published 2025-04-01
    “…To assess their mental health before starting school, preschoolers need early detection, intervention, and assessment. However, data shortages, heterogeneity, privacy issues, model interpretability, and generalization restrictions hamper the review process. …”
    Get full text
    Article
  14. 454

    Impact of Normalization Techniques on Synthetic Load Profile Generation Using Deep Generative Models by Luis H. T. Bandoria, Walquiria N. Silva, Madson C. De Almeida

    Published 2025-01-01
    “…However, the impact of data normalization on their performance remains insufficiently explored. …”
    Get full text
    Article
  15. 455

    Privacy computing:concept, connotation and its research trend by Feng-hua LI, Hui LI, Yan JIA, Neng-hai YU, Jian WENG

    Published 2016-04-01
    “…s: With the widespread application of mobile Internet, cloud computing and big data technologies, people enjoy the convenience of electronic business, information retrieval, social network and other services, whereas the threats of privacy leaks are ever growing due to the use of big data analytics. …”
    Get full text
    Article
  16. 456

    Providing Privacy Protection and Personalization Awareness for Android Devices by Hongliang Liang, Dongyang Wu, Shirun Liu, Hao Dai, Haifeng Liu

    Published 2016-07-01
    “…As a result, the risk of users compromising their privacy has risen exponentially. Mobile users currently cannot control how various applications handle the privacy of their sensor data. …”
    Get full text
    Article
  17. 457

    Customer adoption of smartwatches – a privacy calculus perspective by Ajay Kumar, Parvez Ahmad, Daruri Venkata Srinivas Kumar, Megha Gupta

    Published 2025-04-01
    “…The authors collected 310 responses using a structured questionnaire; after data cleaning, 270 responses were used for data analysis. …”
    Get full text
    Article
  18. 458

    Survey on vertical federated learning: algorithm, privacy and security by Jinyin CHEN, Rongchang LI, Guohan HUANG, Tao LIU, Haibin ZHENG, Yao CHENG

    Published 2023-04-01
    “…., model parameters, parameter gradients, embedding representation, etc.) applied to data distributed across various institutions.FL reduces the risk of privacy leakage, since raw data is not allowed to leave the institution.According to the difference in data distribution between institutions, FL is usually divided into horizontal federated learning (HFL), vertical federated learning (VFL), and federal transfer learning (TFL).VFL is suitable for scenarios where institutions have the same sample space but different feature spaces and is widely used in fields such as medical diagnosis, financial and security of VFL.Although VFL performs well in real-world applications, it still faces many privacy and security challenges.To the best of our knowledge, no comprehensive survey has been conducted on privacy and security methods.The existing VFL was analyzed from four perspectives: the basic framework, communication mechanism, alignment mechanism, and label processing mechanism.Then the privacy and security risks faced by VFL and the related defense methods were introduced and analyzed.Additionally, the common data sets and indicators suitable for VFL and platform framework were presented.Considering the existing challenges and problems, the future direction and development trend of VFL were outlined, to provide a reference for the theoretical research of building an efficient, robust and safe VFL.…”
    Get full text
    Article
  19. 459

    Automated redaction of names in adverse event reports using transformer-based neural networks by Eva-Lisa Meldau, Shachi Bista, Carlos Melgarejo-González, G. Niklas Norén

    Published 2024-12-01
    “…Because the Yellow Card data contained few names, we used predictive models to select narratives for training. …”
    Get full text
    Article
  20. 460

    A Survey on Privacy-Preserving Machine Learning Inference by Stanisław Barański

    Published 2025-07-01
    “…Use cases in healthcare, finance, and education show how these techniques balance privacy with practical performance. …”
    Get full text
    Article