Showing 721 - 740 results of 2,784 for search '"\"((\\"use privacy data\\") OR ((\\"uses OR \"used) privacy data\\"))~\""', query time: 0.17s Refine Results
  1. 721

    Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration by Pedamallu Sai Mrudula, Rayappa David Amar Raj, Archana Pallakonda, Yanamala Rama Muni Reddy, K. Krishna Prakasha, V. Anandkumar

    Published 2025-01-01
    “…Furthermore, the proposed framework includes a federated learning-based scheme that utilizes differential privacy and homomorphic encryption to ensure the privacy and integrity of the data to enhance model interpretability and efficiency with feature ranking to provide insights into attack patterns and anomaly characteristics. …”
    Get full text
    Article
  2. 722

    Privacy-Preserving Glycemic Management in Type 1 Diabetes: Development and Validation of a Multiobjective Federated Reinforcement Learning Framework by Fatemeh Sarani Rad, Juan Li

    Published 2025-07-01
    “…Furthermore, these approaches typically rely on centralized data processing, which raises privacy concerns due to the sensitive nature of health care data. …”
    Get full text
    Article
  3. 723

    Effect of Workshop Training on Nursing Students’ Knowledge and Attitude Regarding Children’s Privacy Protection: A Quasi-experimental Study by Fatemeh Azimi, Fariba Asgari, Yasaman Yaghobi, Saman Maroufizadeh, Morteza Rahbar Taramsari

    Published 2024-09-01
    “…Data analysis was performed by using descriptive (Mean±SD, frequency, percentage) and inferential statistics (Pearson correlation test and analysis of covariance). …”
    Get full text
    Article
  4. 724

    A Decision Cloud Ranking Approach Based on Privacy and Security in Blockchain E-Health Industry 4.0 Systems by Sarah Qahtan, Khaironi Yatim, Mohd Hafeez Osman, Hazura Zulzalil, Muhammad Luqman Mahamad Zakaria

    Published 2023-12-01
    “…Second, the weights of each privacy and security property are calculated using the SFS-FWZIC method. …”
    Get full text
    Article
  5. 725
  6. 726

    Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning by Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore, Imran Baig

    Published 2024-12-01
    “…However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). …”
    Get full text
    Article
  7. 727
  8. 728
  9. 729

    The Impact of Artificial Intelligence on the Future Business World by Hebah Y. AlQato

    Published 2024-02-01
    “…In order to assist businesses better understand their consumers' requirements and preferences, AI is being used to examine customer data and generate insights. …”
    Get full text
    Article
  10. 730

    AdaBoost algorithm based on target perturbation by Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG

    Published 2023-02-01
    “…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
    Get full text
    Article
  11. 731

    MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM by Virendra P. Vishwakarma, Abhay Kumar Yadav

    Published 2025-01-01
    “…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
    Get full text
    Article
  12. 732

    Using electronic health record data to establish a chronic kidney disease surveillance system in China: protocol for the China Kidney Disease Network (CK-NET)-Yinzhou Study by Yu Yang, Peng Shen, Hongbo Lin, Luxia Zhang, Minghui Zhao, Jinwei Wang, Beiyan Bao, Guilan Kong, Xiaoyu Sun, Guohui Ding, Bixia Gao, Chao Yang

    Published 2019-08-01
    “…The China Kidney Disease Network (CK-NET) was established as a comprehensive surveillance system for CKD using various data sources. As part of this, the proposed CK-NET-Yinzhou study aims to build a regional surveillance system in a developed coastal area in China to obtain detailed dynamic information about kidney disease and to improve the ability to manage the disease effectively.Methods and analysis Yinzhou is a district of Ningbo city, Zhejiang province. …”
    Get full text
    Article
  13. 733
  14. 734

    Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method by Shumin Han, Yue Li, Derong Shen, Chuang Wang

    Published 2024-11-01
    “…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
    Get full text
    Article
  15. 735

    Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning by Yu-Hsiu Lin, Yung-Yao Chen, Shih-Hao Wei

    Published 2025-01-01
    “…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
    Get full text
    Article
  16. 736

    Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia by Betül Önay Doğan, Nihal Kocabay Şener, Selçuk Kıran, Hasrina Mustafa

    Published 2022-12-01
    “…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
    Get full text
    Article
  17. 737
  18. 738

    Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study by Yi Xie, Yi Xie, Xinmeng Wang, Huiwen Yang, Huiwen Yang, Jiayao Zhang, Honglin Wang, Zineng Yan, Jiaming Yang, Zhiyuan Yan, Zhiwei Hao, Pengran Liu, Yijie Kuang, Zhewei Ye, Zhewei Ye

    Published 2025-07-01
    “…Based on the architecture, a privacy-preserving SL system was established, and we further validated the performance of the model in external verification sets and clinical use. …”
    Get full text
    Article
  19. 739

    Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR by Oliver M. Tuazon, Bart Custers, Gerrit-Jan Zwenne

    Published 2025-12-01
    “…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
    Get full text
    Article
  20. 740