Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
\\"use » \\"used (Expand Search)
\\"uses » \\"useds (Expand Search)
\"usedddds » \"useddddds (Expand Search)
-
561
-
562
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…Deep learning and fully homomorphic encryption (FHE) are integrated for privacy-preserving fingerprint recognition. Convolutional neural network (CNN) extract fingerprint features encrypted using the Cheon-Kim-Kim-Song (CKKS) FHE scheme. …”
Get full text
Article -
563
Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
Published 2024-08-01“…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
Get full text
Article -
564
Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation
Published 2025-03-01“…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
Get full text
Article -
565
Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission
Published 2025-01-01“…Furthermore, useful insights on the privacy-utility trade-off are also provided.…”
Get full text
Article -
566
Navigating ethics in HIV data and biomaterial management within Black, African, and Caribbean communities in Canada
Published 2025-01-01“…The study employed iterative inductive thematic data analysis. Findings Participants expressed significant concerns about the collection, sharing, and use of HIV data from healthcare encounters, revealing mistrust towards institutions like police, child welfare, and immigration accessing their health information. …”
Get full text
Article -
567
Real-Time Financial Fraud Detection Using Adaptive Graph Neural Networks and Federated Learning
Published 2025-03-01Get full text
Article -
568
Edge Computing Architectures for Low-Latency Data Processing in Internet of Things Applications
Published 2025-01-01Get full text
Article -
569
Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub
Published 2025-08-01“…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
Get full text
Article -
570
Time Series Classification Using Federated Convolutional Neural Networks and Image-Based Representations
Published 2025-01-01“…Federated Learning (FL) enables collaborative training across distributed clients while ensuring data privacy. The method’s effectiveness is evaluated using 40 datasets from the UCR Archive. …”
Get full text
Article -
571
Exploring the Use of AI in Qualitative Data Analysis: Comparing Manual Processing with Avidnote for Theme Generation
Published 2025-04-01“…However, fundamental concerns persist regarding the robustness, generalisability, credibility, reliability and trustworthiness of qualitative research when using AI technologies. Ethical considerations, such as data security and privacy, also need to be addressed in research settings. …”
Get full text
Article -
572
Federated target trial emulation using distributed observational data for treatment effect estimation
Published 2025-07-01“…Abstract Target trial emulation (TTE) aims to estimate treatment effects by simulating randomized controlled trials using real-world observational data. Applying TTE across distributed datasets shows great promise in improving generalizability and power but is always infeasible due to privacy and data-sharing constraints. …”
Get full text
Article -
573
A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques
Published 2025-03-01“…Quantum-secured networks enhance urban security, smart management, and infrastructure protection by providing data privacy and facilitating secure data transmission, thereby facilitating robust infrastructure and technological development.…”
Get full text
Article -
574
Generating unseen diseases patient data using ontology enhanced generative adversarial networks
Published 2025-01-01“…Abstract Generating realistic synthetic health data (e.g., electronic health records), holds promise for fundamental research, AI model development, and enhancing data privacy safeguards. …”
Get full text
Article -
575
Predicting financial default risks: A machine learning approach using smartphone data
Published 2024-11-01“…This study leverages machine learning (ML) techniques to predict financial default risks using smartphone data, providing a novel approach to financial risk assessment. …”
Get full text
Article -
576
Sample selection using multi-task autoencoders in federated learning with non-IID data
Published 2025-01-01“…Federated learning is a machine learning paradigm in which multiple devices collaboratively train a model under the supervision of a central server while ensuring data privacy. However, its performance is often hindered by redundant, malicious, or abnormal samples, leading to model degradation and inefficiency. …”
Get full text
Article -
577
How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries
Published 2019-03-01“…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
Get full text
Article -
578
Federated Learning Model Using CBDPL for Medical Image Segmentation
Published 2025-01-01Get full text
Article -
579
Efficient Keyset Design for Neural Networks Using Homomorphic Encryption
Published 2025-07-01Get full text
Article -
580
Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing
Published 2024-01-01“…To address these issues, we suggest proposing a partial signature-based data auditing system so that both privacy and accuracy can be fortified while reducing the computational cost associated with auditing processes significantly. …”
Get full text
Article