Suggested Topics within your search.
Suggested Topics within your search.
-
601
A Communication-Efficient Distributed Matrix Multiplication Scheme with Privacy, Security, and Resiliency
Published 2024-08-01“…Inspired by the application of repairing Reed–Solomon (RS) codes in distributed storage and secret sharing, we propose SDMM schemes with reduced communication overhead through the use of trace polynomials. Specifically, these schemes are designed to address three critical concerns: (i) ensuring information-theoretic privacy against collusion among servers; (ii) providing security against Byzantine servers; and (iii) offering resiliency against stragglers to mitigate computing delays. …”
Get full text
Article -
602
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01“…The ViT (vision transformer) inference framework, which was widely used in image processing, was found to have a risk of leaking user privacy data. …”
Get full text
Article -
603
Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey
Published 2024-12-01“…Aim This study presents a cutting-edge survey on privacy issues, security attacks, countermeasures and open problems in FL.Methodology The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used to determine the research domain, establish a search query, and analyze all retrieved articles from the selected scientific databases (i.e. …”
Get full text
Article -
604
FairRAG: A Privacy-Preserving Framework for Fair Financial Decision-Making
Published 2025-07-01“…These improvements were maintained when using differentially private synthetic data, thus indicating robust privacy and accuracy trade-offs.…”
Get full text
Article -
605
Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability
Published 2024-01-01“…Specifically, we introduce an identity credential system that facilitates anonymous donations, shielding the identities of both donors and donees through the use of BBS+ signatures and zero-knowledge proofs of knowledge (ZKPoKs). …”
Get full text
Article -
606
Synergistic Disruption: Harnessing AI and Blockchain for Enhanced Privacy and Security in Federated Learning
Published 2025-04-01“…Blockchain technology makes self-executing agreements possible by enabling smart contracts, which reduce the need for middlemen and increase efficiency by precisely encoding contractual terms in code. By using AI oracles, these contracts can communicate with outside data sources and make well-informed decisions based on actual occurrences. …”
Get full text
Article -
607
Sharing images of children on social media: British motherhood influencers and the privacy paradox.
Published 2025-01-01“…This study examines the extent to which popular British motherhood influencers infringe on their children's privacy by posting images of them online. We conducted a content analysis of 5,253 Instagram posts from ten UK-based influencers, supplemented by self-reported data from these influencers. …”
Get full text
Article -
608
A lightweight and secure authentication and privacy protection scheme for internet of medical things
Published 2025-07-01“…However, transmitting sensitive patient data through IoMT devices raises significant security and privacy concerns. …”
Get full text
Article -
609
The Looming Privacy Challenges Posed by Commercial Satellite Imaging: Remedies and Research Directions
Published 2025-01-01“…While these technologies benefit applications such as natural disaster monitoring and precision agriculture, they also introduce novel privacy risks. This perspective paper provides several contributions: we start by analyzing privacy risks using the LINDDUN privacy framework, categorizing threats like linking, identification, and data disclosure. …”
Get full text
Article -
610
Self-Disclosure on Professional Social Networking Sites: A Privacy Calculus Perspective
Published 2023-01-01“…A model contextualizing privacy calculus theory combined with the trust factor was developed and evaluated using 661 quantitative data collected through a questionnaire. …”
Get full text
Article -
611
Privacy preserving strategies for electronic health records in the era of large language models
Published 2025-01-01“…Risks can be reduced by using strategies like privacy-preserving locally deployed LLMs, synthetic data generation, differential privacy, and deidentification. …”
Get full text
Article -
612
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
Published 2025-01-01“…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
Get full text
Article -
613
CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions
Published 2025-02-01“…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
Get full text
Article -
614
A content review of COVID-19-related apps used in Vietnam
Published 2025-02-01“…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
Get full text
Article -
615
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
Get full text
Article -
616
MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM
Published 2025-01-01“…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
Get full text
Article -
617
Precision Oncology Program (POP), an observational study using real-world data and imaging mass cytometry to explore decision support for the Molecular Tumor Board: study protocol
Published 2025-03-01“…In this case, a signed general consent form must be available. Data privacy is ensured by unique patient numbers for pseudo-anonymised data. …”
Get full text
Article -
618
PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation
Published 2021-12-01“…To significantly protect the user’s privacy and prevent the user’s preference disclosure from leading to malicious entrapment, we present a combination of the recommendation algorithm and the privacy protection mechanism. …”
Get full text
Article -
619
FL-QNNs: Memory Efficient and Privacy Preserving Framework for Peripheral Blood Cell Classification
Published 2025-01-01“…Then implement the federated learning (FL) framework with IID (Independent and identically distributed) and Non-IID datasets maintain similar results by preserving data. Further FL-QNNs approach is used with these baseline models and achieved 98-99% accuracy and while optimizing memory, preserving data and resources. …”
Get full text
Article -
620
A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation
Published 2019-06-01“…The assessment results may be used to identify possible vulnerabilities in telehealth systems and practice or demonstrate to patients the sufficient security and privacy protection to patients’ data.…”
Get full text
Article