Showing 421 - 440 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"useds OR \"used)) privacy data\\"))~\""', query time: 0.19s Refine Results
  1. 421
  2. 422

    Revolutionizing healthcare data analytics with federated learning: A comprehensive survey of applications, systems, and future directions by Nisha Thorakkattu Madathil, Fida K. Dankar, Marton Gergely, Abdelkader Nasreddine Belkacem, Saed Alrabaee

    Published 2025-01-01
    “…In general, through systematic categorization and analysis of existing FL systems, we offer insights to design efficient, accurate, and privacy-preserving healthcare applications using cutting-edge FL techniques.…”
    Get full text
    Article
  3. 423

    PERSONAL DATA PROTECTION IN CRIMINAL PROCEEDINGS by SMOLKOVA Iraida Vyacheslavovna

    Published 2025-03-01
    “…The most vulnerable to these factors are the privacy and personal data of participants in criminal proceedings. …”
    Get full text
    Article
  4. 424

    Self-sovereign management scheme of personal health record with personal data store and decentralized identifier by Tong Min Kim, Taehoon Ko, Byoung Woo Hwang, Hyung Goo Paek, Wan Yeon Lee

    Published 2025-01-01
    “…Conventional personal health record (PHR) management systems are centralized, making them vulnerable to privacy breaches and single points of failure. Despite progress in standardizing healthcare data with the FHIR format, hospitals often lack efficient platforms for transferring PHRs, leading to redundant tests and delayed treatments. …”
    Get full text
    Article
  5. 425

    Neurorights, Neurotechnologies and Personal Data: Review of the Challenges of Mental Autonomy by Y. Cornejo

    Published 2024-11-01
    “…Thorough searches were carried out with the search terms “neurotechnology”, “personal data”, “mental privacy”, “neuro-rights”, “neurotechnological interventions”, and “neurotechnological discrimination” on both English and Spanish sites, using search engines like Google Scholar and Redib as well as databases including Scielo, Dialnet, Redalyc, Lilacs, Scopus, Medline, and Pubmed. …”
    Get full text
    Article
  6. 426

    When Two are Better Than One: Synthesizing Heavily Unbalanced Data by Francisco Ferreira, Nuno Lourenco, Bruno Cabral, Joao Paulo Fernandes

    Published 2021-01-01
    “…However, they need to fully comply with not only ethical but also regulatory obligations, where, e.g., privacy (strictly) needs to be respected when using or sharing data, thus protecting both the interests of users and organizations. …”
    Get full text
    Article
  7. 427
  8. 428

    Advanced Zero-Shot Learning (AZSL) Framework for Secure Model Generalization in Federated Learning by Muhammad Asif, Surayya Naz, Faheem Ali, Amerah Alabrah, Abdu Salam, Farhan Amin, Faizan Ullah

    Published 2024-01-01
    “…The objective of the proposed model is to increase model generalizability while achieving better performance on various and heterogeneous datasets while preserving data privacy. We have used datasets named MNIST, CIFAR-10, and FEMNIST to measure the model’s accuracy, precision, and generalization capability. …”
    Get full text
    Article
  9. 429

    Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation by Saja Kareem Ismael, Mohamed Ibrahim Shujaa, Ahmed Bahaaulddin A. Alwahhab

    Published 2025-03-01
    “…Furthermore, this study examines the double-layer encryption architecture used to secure data in at rest and during transmission from a sensor’s gathering location to long-term storage. …”
    Get full text
    Article
  10. 430

    The Adoption of Virtual Fitting Rooms in Iranian Sportswear Industries: A Mixed-Methods Study Based on TAM Model by Seyyed Iman Ghaffarisadr, Farzad Nobakht Sareban

    Published 2024-02-01
    “…Structural equation modelling was used to test the hypotheses. SMART PLS and SPSS 23 software were used for data analysis.Findings: The results supported the positive effect of the factors perceived ease of use, perceived usefulness, perceived enjoyment, and fashion leadership, as well as the negative impact of technology anxiety on adopting this technology. …”
    Get full text
    Article
  11. 431

    Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification by Mbarek Marwan, Abdelkarim Ait Temghart, Said Ouhmi, Mohamed Lazaar

    Published 2024-12-01
    “…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
    Get full text
    Article
  12. 432

    A remote sensing encrypted data search method based on a novel double-chain by Xixi Yan, Pei Yin, Yongli Tang, Suwei Feng

    Published 2023-12-01
    “…However, with the rapid urbanisation and the increase in data capacity, how to store and retrieve remote sensing data which have more potential value and privacy with a more effective and safe method has become an imminent issue. …”
    Get full text
    Article
  13. 433

    TrapMI: A Data Protection Method to Resist Model Inversion Attacks in Split Learning by Hyunsik Na, Daeseon Choi

    Published 2025-01-01
    “…However, concerns remain regarding data privacy leakage because an attacker can still attempt model inversion attacks based on the intermediate features. …”
    Get full text
    Article
  14. 434

    Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework by Jin Lei, Weiyun Li, Meng Yue, Zhijun Wu

    Published 2025-01-01
    “…FedMeta-CTGAN exploits the natural privacy-preserving properties of a two-stage update in meta-learning, using real data to train the CTGAN model and synthetic fake data as query data during meta-training. …”
    Get full text
    Article
  15. 435
  16. 436
  17. 437

    THE ETHICAL STARTUP? by Alexis Walker

    Published 2025-08-01
    “…Instead, the view proposed here would ask companies to do more to prevent or decrease the risk of a breach of privacy, unexpected later use of data, and reidentification. …”
    Get full text
    Article
  18. 438

    ZSS Signature-Based Audit Message Verification Process for Cloud Data Integrity by Paromita Goswami, Neetu Faujdar, Somen Debnath, Ajoy Kumar Khan, Ghanshyam Singh

    Published 2023-01-01
    “…Instead of establishing a secure communication route between all parties, a progressive technique is therefore required to thwart enemies’ attempts to collaborate with data owners who have outsourced their data. In this paper, we propose a model for an effective data integrity and audit message verification system based on the ZSS (Zhang, Safavi, and Susilo) signature, which protects data privacy in cloud storage and uses faked data recovery to pay back original data using a modular approach. …”
    Get full text
    Article
  19. 439

    Estimating rare disease prevalence and costs in the USA: a cohort study approach using the Healthcare Cost Institute claims data by Keith A Crandall, Christine M Cutillo, Ainslie Tisdale, Mahdi Baghbanzadeh, Reva L Stidd, Manpreet S Khural, Laurie J Hartman, Jeff Greenberg, Kevin B Zhang, Ali Rahnavard

    Published 2024-04-01
    “…Building capabilities to use machine learning to accelerate the diagnosis of RDs would vastly improve with changes to healthcare data, such as standardising data input, linking databases, addressing privacy issues and assigning ICD-10 codes for all RDs, resulting in more robust data for RD analytics.…”
    Get full text
    Article
  20. 440