Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"useds » \"usedds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
-
321
The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles
Published 2025-05-01“…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
Get full text
Article -
322
Research on privacy preservation of member inference attacks in online inference process for vertical federated learning linear model
Published 2022-09-01“…With the development of big data and the introduction of data security regulations, the awareness of privacy protection has gradually increased, and the phenomenon of data isolation has become more and more serious.Federated learning technology as one of the effective methods to solve this problem has become a hot spot of concern.In the online inference process of vertical federated learning, the current mainstream methods do not consider the protection of data identity, which is easy to leak user privacy.A privacy protection method for member inference attacks was proposed in the online inference process of the vertical federated linear model.A filter with a false positive rate was constructed to avoid the accurate positioning of data identity to ensure the security of data.Homomorphic encryption was used to realize the full encrypted state of the online inference process and protect the intermediate calculation results.According to the ciphertext multiplication property of homomorphic encryption, the random number multiplication method was used to mask data, which ensured the security of the final inference result.This scheme further improved the security of user privacy in the online inference process of vertical federated learning and had lower computation overhead and communication costs.…”
Get full text
Article -
323
Integration of metaheuristic based feature selection with ensemble representation learning models for privacy aware cyberattack detection in IoT environments
Published 2025-07-01“…Abstract The Internet of Things (IoT) connects virtual and physical objects inserted with software, devices, and other technology that interchange data utilizing the Internet. It enables diverse devices and individuals to exchange data, interconnect, and personalize services to ease usage. …”
Get full text
Article -
324
Integrating advanced neural network architectures with privacy enhanced encryption for secure and intelligent healthcare analytics
Published 2025-08-01“…Detailed evaluation accepts the performance of structure in maintaining privacy through providing high-demonstration analysis for healthcare data protection. …”
Get full text
Article -
325
-
326
Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks
Published 2024-10-01“…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
Get full text
Article -
327
Protection of personal data under martial law in Ukraine
Published 2023-09-01“…Particular attention has been paid to the need to develop and implement specialised legal acts that would regulate the protection of personal data in such emergency situations. The possibilities of using modern technologies, in particular data encryption and multi-level authentication, to enhance the security and confidentiality of personal data have also been considered. …”
Get full text
Article -
328
Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions
Published 2025-01-01“…After that, these local models are aggregated towards a common, global model using secure aggregation methods, which makes sure that there is nozza of data privacy and hence, in the process making sure that more accurate models can be obtained due to diversified data sets. …”
Get full text
Article -
329
-
330
Traversable Ledger for Responsible Data Sharing and Access Control in Health Research
Published 2024-12-01“…Healthcare institutions and health registries often store patients’ health data. In order to ensure privacy, sensitive medical information is stored separately from the identifying information of the patient. …”
Get full text
Article -
331
Malaysian Public’s Perception Toward Event Data Recorder (EDR) in Vehicles
Published 2024-12-01“…Besides, 40.3% expressed concern about potential privacy breaches and misuse of EDR data. Despite that, nearly 80% of respondents were in favor of installing EDR in their vehicles and allowing the data to be used in court. …”
Get full text
Article -
332
Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property
Published 2024-12-01“…However, a comprehensive and multidimensional examination of the research landscape is still required to better understand its structure and evolution. Using CiteSpace software, this study conducts a bibliometric analysis, revealing key trends and patterns in collaboration, co-citation, and keyword co-occurrence in the field of data-based intellectual property. …”
Get full text
Article -
333
NFTs enabled federated digital identity data representation and management
Published 2025-05-01“…The idea of using NFTs to represent digital identities and their associated data is promising, but it also raises significant concerns regarding data privacy and compliance. …”
Get full text
Article -
334
Las tecnologías de la información; derecho a la privacidad, tratamiento de datos y tercera edad
Published 2011-09-01Get full text
Article -
335
TAPS Responsibility matrix: a tool for responsible data science by design
Published 2024-12-01“…We map TAPS-RM to well-known initiatives for open-data (FACT/FAIR and Datasheets for datasets). We conclude that TAPS-RM is a tool to reflect on responsibilities at a data science project level and can be used to advance responsible data science by design.…”
Get full text
Article -
336
Community views on the secondary use of general practice data: Findings from a mixed‐methods study
Published 2024-02-01“…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
Get full text
Article -
337
High-Order Vehicular Pattern Learning and Privacy-Preserving and Unsupervised GAN for Privacy Protection Toward Vehicular Parts Detection
Published 2025-01-01“…To preserve data privacy, we use the PPUP-GAN to create massive-scale vehicular data that well mimics real data. …”
Get full text
Article -
338
-
339
Challenges and Ethical Considerations in Implementing Assistive Technologies in Healthcare
Published 2025-01-01“…As AI-powered solutions become more widely used, we discovered that stronger legal frameworks and robust data security standards are required. …”
Get full text
Article -
340