Showing 661 - 680 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"useds OR \"used)) privacy data\\"))~\""', query time: 0.17s Refine Results
  1. 661

    Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT) by zahra eskandari

    Published 2023-01-01
    “…Federated learning is a distributed data analysis approach used in many IoT applications, including IoMT, due to its ability to provide acceptable accuracy and privacy. …”
    Get full text
    Article
  2. 662

    Recent Advances in Federated Learning for Connected Autonomous Vehicles: Addressing Privacy, Performance, and Scalability Challenges by Asad Ali, Huang Jianjun, Ayesha Jabbar

    Published 2025-01-01
    “…FL presents a decentralized infrastructure that allows collaborative learning, while also ensuring data privacy, as CAVs increasingly rely on machine learning to process large amounts of sensor data. …”
    Get full text
    Article
  3. 663

    Improved Denclue Outlier Detection Algorithm With Differential Privacy and Attribute Fuzzy Priority Relation Ordering by Huangzhi Xia, Limin Chen, Dongyan Wang, Xiaotong Lu

    Published 2023-01-01
    “…Firstly, the differential privacy technology is used to add the Laplacian noise to the density to realize the sensitive information hiding among the data objects. …”
    Get full text
    Article
  4. 664

    How Service Quality and Perceived Privacy Can Affect the Customer Satisfaction in Generations Y and Z? by M Iqbal Nurfaizi, Endy Gunanto Marsasi

    Published 2025-01-01
    “…Data were collected by distributing questionnaires using the purposive sampling method to 190 generation Y and Z participants who used online food delivery. …”
    Get full text
    Article
  5. 665
  6. 666

    Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means by Suxia ZHU, Shulun LIU, Guanglu SUN

    Published 2021-02-01
    “…To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means was proposed.Firstly, according to the topological relationship of geographic space, relative entropy was used to calculate the sensitivity of real location to privacy budget, a real-time calculation method of location sensitive privacy level was designed, and a new privacy model was built in combination with differential privacy budget.Secondly, K-means algorithm was used to cluster the release position to obtain the release position set that was most similar to the real position direction, and Fréchet distance was introduced to measure the similarity between the release track and the real track, so as to improve the availability of the release track.Experiments on real data sets show that the proposed trajectory protection mechanism has obvious advantages in trajectory availability compared with others.…”
    Get full text
    Article
  7. 667

    PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge by Bora Bugra Sezer, Sedat Akleylek, Urfat Nuriyev

    Published 2025-01-01
    “…To the best of our knowledge, there is no comprehensive review or taxonomy that provides a complete picture of post-quantum secure structures with privacy-preserving techniques that have the potential to be used in blockchain. …”
    Get full text
    Article
  8. 668

    Enhancing Privacy in IoT-Enabled Digital Infrastructure: Evaluating Federated Learning for Intrusion and Fraud Detection by Amogh Deshmukh, Peplluis Esteva de la Rosa, Raul Villamarin Rodriguez, Sandeep Dasari

    Published 2025-05-01
    “…To address these issues, federated learning (FL) using a flower framework is utilized to protect the privacy of individual organizations while still collaborating through separate models to create a unified global model. …”
    Get full text
    Article
  9. 669

    Privacy-enhanced skin disease classification: integrating federated learning in an IoT-enabled edge computing by Nada Alasbali, Jawad Ahmad, Ali Akbar Siddique, Oumaima Saidani, Alanoud Al Mazroa, Asif Raza, Rahmat Ullah, Muhammad Shahbaz Khan

    Published 2025-04-01
    “…Most existing automated detection/classification approaches that utilize machine learning or deep learning poses privacy issues, as they involve centralized computing and require local storage for data training.MethodsKeeping the privacy of sensitive patient data as a primary objective, in addition to ensuring accuracy and efficiency, this paper presents an algorithm that integrates Federated learning techniques into an IoT-based edge-computing environment. …”
    Get full text
    Article
  10. 670

    A Collaborative Framework for Privacy Preserving Fuzzy Co-Clustering of Vertically Distributed Cooccurrence Matrices by Katsuhiro Honda, Toshiya Oda, Daiji Tanaka, Akira Notsu

    Published 2015-01-01
    “…In many real world data analysis tasks, it is expected that we can get much more useful knowledge by utilizing multiple databases stored in different organizations, such as cooperation groups, state organs, and allied countries. …”
    Get full text
    Article
  11. 671

    A Reliable Application of MPC for Securing the Tri-Training Algorithm by Hendra Kurniawan, Masahiro Mambo

    Published 2023-01-01
    “…Due to the widespread use of distributed data mining techniques in a variety of areas, the issue of protecting the privacy of sensitive data has received increasing attention in recent years. …”
    Get full text
    Article
  12. 672

    Can human rights law bend mass surveillance? by Rikke Frank Joergensen

    Published 2014-02-01
    “…This paper provides a brief introduction to PRISM, continues with an outline of the right to privacy as stipulated in the International Covenant on Civil and Political Rights (ICCPR), the European Convention on Human Rights and the EU Directive on Data Protection, and moves on to discuss whether international human rights law may be used to bend mass surveillance.…”
    Get full text
    Article
  13. 673

    Sharenting in Asunción, Paraguay: Parental Behavior, Risk Perception, and Child Privacy Awareness on Social Media by María Nieto-Sobrino, Nidia Beatriz Pérez Maciel, María Sánchez-Jiménez

    Published 2025-05-01
    “…A survey of 73 parents analysed posting habits, knowledge of risks, and possible influencing factors on parental digital behaviour. Data analysis techniques such as descriptive statistics and correlation analysis were used to examine the associations between the key variables. …”
    Get full text
    Article
  14. 674

    Time‐specific encrypted range query with minimum leakage disclosure by Ozgur Oksuz

    Published 2021-01-01
    “…Abstract A time‐specific encrypted range query scheme that has the following properties is proposed. (1) The proposed scheme has trapdoor privacy and data privacy so that a semi‐honest cloud is not able to get any useful information from given ciphertexts and given tokens that are used for searching ranges. (2) Unlike most of the other studies which report that the cloud server stores single encrypted keyword/element in the database, in our solution, the cloud server stores encrypted multi‐keywords/ranges in the database. …”
    Get full text
    Article
  15. 675

    Physically secure and fog-enabled lightweight authentication scheme for WBAN by Jegadeesan Subramani, Arun Sekar Rajasekaran, Arunkumar Balakrishnan, G. Anantha Rao

    Published 2025-08-01
    “…Abstract Wireless Body Area Networks (WBANs) are vital for healthcare, fitness monitoring, and remote patient care by means of combining sensors and wearable technologies for data collection and transmission. However, ensuring secure communication in WBANs remains a critical challenge and is generally insecure against the manipulation of data, breaches of privacy, and unauthorized access. …”
    Get full text
    Article
  16. 676

    Explainable Federated Framework for Enhanced Security and Privacy in Connected Vehicles Against Advanced Persistent Threats by Sudhina Kumar G K, Krishna Prakasha K, Balachandra Muniyal, Muttukrishnan Rajarajan

    Published 2025-01-01
    “…As the interconnected Internet of Things (IoT) become ubiquitous in vehicles, they continuously generate and exchange a large amount of data. This tendency creates vulnerabilities that attackers can exploit using sophisticated techniques, such as Advanced Persistent Threats (APT). …”
    Get full text
    Article
  17. 677

    An Easily Scalable Docker-Based Privacy-Preserving Malicious Traffic Detection Architecture for IoT Environments by Tong Niu, Yaqiu Liu, Qingfeng Li, Qichi Bao

    Published 2024-01-01
    “…The model is then trained using federated learning/edge computing to ensure data privacy. …”
    Get full text
    Article
  18. 678

    Privacy-Preserving U-Net Variants with pseudo-labeling for radiolucent lesion segmentation in dental CBCT by Amelia Ritahani Ismail, Faris Farhan Azlan, Khairul Akmal Noormaizan, Nurul Afiqa, Syed Qamrun Nisa, Ahmad Badaruddin Ghazali, Andri Pranolo, Shoffan Saifullah

    Published 2025-05-01
    “…To safeguard sensitive information, Differential Privacy Stochastic Gradient Descent (DP-SGD) is integrated using TensorFlow-Privacy, achieving a privacy budget of ε ≈ 1.5 with minimal performance degradation. …”
    Get full text
    Article
  19. 679

    Determinants of Attitude and Intention to Use Virtual Credit Cards in Indonesia by Budi Hartono, Suci Nasehati Sunaningsih, Mumpuni Wahyudiarti Sitoresmi

    Published 2025-03-01
    “…Data analysis was conducted using path analysis, revealing that all variables significantly influence trust and perceived risk, with t-statistics below 0.05 and 0.01. …”
    Get full text
    Article
  20. 680

    A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms by Amal Albilali, Maysoon Abulkhair, Manal Bayousef, Faisal Albalwy

    Published 2024-01-01
    “…This innovative model combines the strengths of centralized efficiency and decentralized privacy, and introduces a unique mechanism that significantly enhances privacy protection and ensures data integrity. …”
    Get full text
    Article