Suggested Topics within your search.
Suggested Topics within your search.
-
701
PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare
Published 2025-04-01“…PLASMA’s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. …”
Get full text
Article -
702
Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging
Published 2025-01-01“…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
Get full text
Article -
703
Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things.
Published 2024-01-01“…The digital watermark privacy protection method and the public service advertising work push privacy protection method are used to provide an innovative solution for public service advertising privacy protection. …”
Get full text
Article -
704
Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies
Published 2025-01-01“…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
Get full text
Article -
705
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks
Published 2025-02-01“…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
Get full text
Article -
706
Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities
Published 2025-06-01“…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
Get full text
Article -
707
Optimizing malicious website prediction: An advanced XGBoost-based machine learning model
Published 2025-05-01Get full text
Article -
708
Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis
Published 2024-12-01“…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
Get full text
Article -
709
Federated Learning for Surface Roughness
Published 2025-06-01“…A custom data acquisition system collected discharge current and spindle current signals, which were solely used as input features to train the deep learning model. …”
Get full text
Article -
710
The Adoption of Virtual Fitting Rooms in Iranian Sportswear Industries: A Mixed-Methods Study Based on TAM Model
Published 2024-02-01“…Structural equation modelling was used to test the hypotheses. SMART PLS and SPSS 23 software were used for data analysis.Findings: The results supported the positive effect of the factors perceived ease of use, perceived usefulness, perceived enjoyment, and fashion leadership, as well as the negative impact of technology anxiety on adopting this technology. …”
Get full text
Article -
711
-
712
QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles
Published 2019-07-01“…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
Get full text
Article -
713
NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols
Published 2021-01-01“…Numerous techniques are available to address privacy infringement, including Private Information Retrieval (PIR) protocols that use peer nodes to preserve privacy. …”
Get full text
Article -
714
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities
Published 2025-02-01“…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
Get full text
Article -
715
How Social Scene Characteristics Affect Customers’ Purchase Intention: The Role of Trust and Privacy Concerns in Live Streaming Commerce
Published 2025-04-01“…The research employs Structural Equation Modeling (SEM) to test the hypothesis using data from 504 valid responses. (3) The results demonstrate that the characteristics of social scenes proposed in this study enhance consumer trust and positively impact purchase intention. …”
Get full text
Article -
716
A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans
Published 2025-07-01“…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
Get full text
Article -
717
Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response
Published 2024-07-01“…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
Get full text
Article -
718
Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective
Published 2025-05-01“…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
Get full text
Article -
719
A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment
Published 2025-06-01“…Though sensor-driven devices have largely eased everyday lives, these healthcare systems have been suffering from various security breaches and data privacy problems. This evokes a need for designing intelligent systems to eradicate data breaches and privacy problems. …”
Get full text
Article -
720