Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"useddddds » \"usedddddds (Expand Search)
Showing 221 - 240 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR (\"useds OR \"useddddds)) privacy data\\"))~\""', query time: 0.21s Refine Results
  1. 221

    Membership Inference Attacks Fueled by Few-Shot Learning to Detect Privacy Leakage and Address Data Integrity by Daniel Jiménez-López, Nuria Rodríguez-Barroso, M. Victoria Luzón, Javier Del Ser, Francisco Herrera

    Published 2025-05-01
    “…Deep learning models have an intrinsic privacy issue as they memorize parts of their training data, creating a privacy leakage. …”
    Get full text
    Article
  2. 222

    Federated Analysis With Differential Privacy in Oncology Research: Longitudinal Observational Study Across Hospital Data Warehouses by Théo Ryffel, Perrine Créquit, Maëlle Baillet, Jason Paumier, Yasmine Marfoq, Olivier Girardot, Thierry Chanet, Ronan Sy, Louise Bayssat, Julien Mazières, Vincent Vuiblet, Julien Ancel, Maxime Dewolf, François Margraff, Camille Bachot, Jacek Chmiel

    Published 2025-07-01
    “…Despite some pioneering work, federated analytics is still not widely used on real-world data, and to our knowledge, no real-world study has yet combined it with other privacy-enhancing techniques such as differential privacy (DP). …”
    Get full text
    Article
  3. 223

    FWFA: Fairness-Weighted Federated Aggregation for Privacy-Aware Decision Intelligence by Rahul Haripriya, Nilay Khare, Manish Pandey, Shrijal Patel, Jaytrilok Choudhary, Dhirendra Pratap Singh, Surendra Solanki, Duansh Sharma

    Published 2025-01-01
    “…As machine learning (ML) and artificial intelligence (AI) increasingly influence such decisions, promoting responsible AI that minimizes bias while preserving data privacy has become essential. However, existing fairness-aware models are often centralized or ill-equipped to handle non-IID data, limiting their real-world applicability. …”
    Get full text
    Article
  4. 224

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  5. 225

    Blockchain-Enhanced Privacy and Security in Electronic Health Records: A Scalable Framework for Decentralised Data Management by Nagaraj Segar, Vijayarajan Vijayan

    Published 2025-07-01
    “…The framework uniquely integrates a sidechain-enabled blockchain architecture with hybrid encryption (AES-256/RSA and ECC), optimising both scalability and data protection, and is validated using the real-world MIMIC-III dataset. …”
    Get full text
    Article
  6. 226

    A Tailored Compliance Solution for Securing Personal Data privacy under Law 18-07 in Algeria by Mohamed kamel Benkaddour, Redouane Guettal, Ph.D

    Published 2025-04-01
    “…This article proposes the design and implementation of a computer application dedicated to compliance with Law 18-07 for the protection of personal data. We first collected and analyzed the legal requirements for data protection and then modeled them using UML diagrams following the UP methodology. …”
    Get full text
    Article
  7. 227

    Privacy in consumer wearable technologies: a living systematic analysis of data policies across leading manufacturers by Cailbhe Doherty, Maximus Baldwin, Rory Lambe, Marco Altini, Brian Caulfield

    Published 2025-06-01
    “…In this study, we systematically evaluated the privacy policies of 17 leading wearable technology manufacturers using a novel rubric comprising 24 criteria across seven dimensions: transparency, data collection purposes, data minimization, user control and rights, third-party data sharing, data security, and breach notification. …”
    Get full text
    Article
  8. 228

    PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services by Yousheng Zhou, Xia Li, Ming Wang, Yuanni Liu

    Published 2023-12-01
    “…However, while cloud server provides convenience and stability, it also leads to data security and user privacy leakage. Aiming at the problems of insufficient privacy protection and inefficient query in the existing LBS data outsourcing schemes, this paper presents a novel privacy-preserving top-k query for outsourcing situations. …”
    Get full text
    Article
  9. 229

    Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things by Sultan Basudan, Abdulrahman Alamer

    Published 2024-01-01
    “…To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently searching the data. …”
    Get full text
    Article
  10. 230
  11. 231

    Spatio-Temporal Joint Planning for Integrated Energy Systems with Internet Data Center Considering Privacy Preservation by WU Chengbang, CHENG Zhijiang, LU Haifeng, YANG Handi

    Published 2025-04-01
    “…However, because both IDC and integrated energy systems (IES) possess underlying user information, data leakage may lead to various risks. Therefore, when designing collaborative optimization solutions for IDCs and IES, it is essential to consider the privacy preservation of both systems. …”
    Get full text
    Article
  12. 232

    Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts by Xin Liu, Huize Gao, Dan Luo, Lanying Liang, Lu Peng, Yuchen Zhang, Shijie Jia, Gang Xu, Xiubo Chen, Baohua Zhang, Yu Gu

    Published 2025-07-01
    “…However, the demand for multi-party data joint analysis within these contracts faces challenges of privacy leakage and malicious deception. …”
    Get full text
    Article
  13. 233

    Enhanced Consumer Healthcare Data Protection Through AI-Driven TinyML and Privacy-Preserving Techniques by S. Aanjankumar, Monoj Kumar Muchahari, Shabana Urooj, Ishmeet Kaur, Rajesh Kumar Dhanaraj, Hanan Abdullah Mengash, S. Poonkuntran, Parag Ravikant Kaveri

    Published 2025-01-01
    “…The proposed method with TinyML looks at patient data, like ECG readings and reports of unusual heartbeats, right on local edge devices that have limited resources, enabled immediate privacy checks while using minimal computing power. …”
    Get full text
    Article
  14. 234

    Aerial pathways to resilience: the acceptance of drones in logistics transformation by Sofia Gomes, João M. Lopes, Tiago Trancoso

    Published 2025-05-01
    “…This study examines the determinants of consumer acceptance of drone delivery services, focusing on the roles of perceived usefulness, ease of use, and privacy concerns. We collected data from 1,108 Portuguese consumers through an online survey to assess how these factors influence consumer attitudes and intentions toward adopting drone delivery services. …”
    Get full text
    Article
  15. 235

    A Symmetric Projection Space and Adversarial Training Framework for Privacy-Preserving Machine Learning with Improved Computational Efficiency by Qianqian Li, Shutian Zhou, Xiangrong Zeng, Jiaqi Shi, Qianye Lin, Chenjia Huang, Yuchen Yue, Yuyao Jiang, Chunli Lv

    Published 2025-03-01
    “…By designing a new projection loss function and combining autoencoders with adversarial training, the proposed method effectively balances privacy protection and model utility. Experimental results show that, for financial time-series data tasks, the model using the projection loss achieves a precision of 0.95, recall of 0.91, and accuracy of 0.93, significantly outperforming the traditional cross-entropy loss. …”
    Get full text
    Article
  16. 236

    Using Homomorphic Proxy Re-Encryption to Enhance Security and Privacy of Federated Learning-Based Intelligent Connected Vehicles by Yang Bai, Yutang Rao, Hongyan Wu, Juan Wang, Wentao Yang, Gaojie Xing, Jiawei Yang, Xiaoshu Yuan

    Published 2025-01-01
    “…To realize collaborative computation among ICVs, federated learning (FL) or federated-based large language model (FedLLM) as a promising distributed approach has been used to support various collaborative application computations in ICVs scenarios, for example, analyzing vehicle driving information to realize trajectory prediction, voice-activated controls, conversational AI assistants. …”
    Get full text
    Article
  17. 237

    A Proposed Vision for Using Artificial Intelligence in Enhancing Strategic Value of Human Resources by Nadera Hourani

    Published 2025-06-01
    “…Yet, there are significant challenges in the form of algorithmic bias, data privacy concerns, and organizational readiness. …”
    Get full text
    Article
  18. 238

    Balancing Privacy and Performance: A Differential Privacy Approach in Federated Learning by Huda Kadhim Tayyeh, Ahmed Sabah Ahmed AL-Jumaili

    Published 2024-10-01
    “…Federated learning (FL), a decentralized approach to machine learning, facilitates model training across multiple devices, ensuring data privacy. However, achieving a delicate privacy preservation–model convergence balance remains a major problem. …”
    Get full text
    Article
  19. 239

    Evaluating the effectiveness of data governance frameworks in ensuring security and privacy of healthcare data: A quantitative analysis of ISO standards, GDPR, and HIPAA in blockch... by Ameer Ahmed, Asjad Shahzad, Afshan Naseem, Shujaat Ali, Imran Ahmad

    Published 2025-01-01
    “…Although there are existing frameworks to govern healthcare data but they have certain limitations in effectiveness of data governance to ensure security and privacy. …”
    Get full text
    Article
  20. 240

    My Holistic Data Share: A WEB3 Data Share Application: Extending Beyond Finance to Privacy-Protected Decentralized Share of Multi-Dimensional Data to Enhance Global Healthcare by SATHYA KRISHNASAMY

    Published 2024-08-01
    “…This paper introduces a concept beyond cryptocurrencies and finance into everyday real-world use cases that need combinatorial access to a person’s holistic data, including financial and health records, genomic data, and advanced directives, among others, that need to be privacy protected and shared with specific actors identified for their roles in the WEB3 ecosystem through decentralized identifiers and non-fungible token badges identifying particular recipients. …”
    Get full text
    Article