Showing 261 - 280 results of 2,784 for search '"\"((\\"used privacy data\\") OR (((\\"useds OR \\"uses) OR \\"use) privacy data\\"))~\""', query time: 0.23s Refine Results
  1. 261

    Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts by Xin Liu, Huize Gao, Dan Luo, Lanying Liang, Lu Peng, Yuchen Zhang, Shijie Jia, Gang Xu, Xiubo Chen, Baohua Zhang, Yu Gu

    Published 2025-07-01
    “…However, the demand for multi-party data joint analysis within these contracts faces challenges of privacy leakage and malicious deception. …”
    Get full text
    Article
  2. 262

    Enhanced Consumer Healthcare Data Protection Through AI-Driven TinyML and Privacy-Preserving Techniques by S. Aanjankumar, Monoj Kumar Muchahari, Shabana Urooj, Ishmeet Kaur, Rajesh Kumar Dhanaraj, Hanan Abdullah Mengash, S. Poonkuntran, Parag Ravikant Kaveri

    Published 2025-01-01
    “…The proposed method with TinyML looks at patient data, like ECG readings and reports of unusual heartbeats, right on local edge devices that have limited resources, enabled immediate privacy checks while using minimal computing power. …”
    Get full text
    Article
  3. 263

    Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks by Alejandro Martínez-Arce, Alberto Bermejo-Cantarero, Laura Muñoz de Morales-Romero, Víctor Baladrón-González, Natalia Bejarano-Ramírez, Gema Verdugo-Moreno, María Antonia Montero-Gaspar, Francisco Javier Redondo-Calvo

    Published 2024-10-01
    “…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
    Get full text
    Article
  4. 264

    A Symmetric Projection Space and Adversarial Training Framework for Privacy-Preserving Machine Learning with Improved Computational Efficiency by Qianqian Li, Shutian Zhou, Xiangrong Zeng, Jiaqi Shi, Qianye Lin, Chenjia Huang, Yuchen Yue, Yuyao Jiang, Chunli Lv

    Published 2025-03-01
    “…By designing a new projection loss function and combining autoencoders with adversarial training, the proposed method effectively balances privacy protection and model utility. Experimental results show that, for financial time-series data tasks, the model using the projection loss achieves a precision of 0.95, recall of 0.91, and accuracy of 0.93, significantly outperforming the traditional cross-entropy loss. …”
    Get full text
    Article
  5. 265

    Securing face images in UAV networks using chaos and DNA cryptography approach by Saba Inam, Shamsa Kanwal, Eaman Amin, Omar Cheikhrouhou, Monia Hamdi

    Published 2025-07-01
    “…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
    Get full text
    Article
  6. 266

    A clustering-based approach for classifying data streams using graph matching by Yuxin Du, Mingshu He, Xiaojuan Wang

    Published 2025-02-01
    “…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
    Get full text
    Article
  7. 267

    A privacy preserving machine learning framework for medical image analysis using quantized fully connected neural networks with TFHE based inference by Sadhana Selvakumar, B. Senthilkumar

    Published 2025-07-01
    “…However, sharing sensitive raw medical data with third parties for analysis raises significant privacy concerns. …”
    Get full text
    Article
  8. 268
  9. 269

    Risk assessment of data protection in the maritime industry using system-theoretic process analysis by Sutthipong Yungratog, Hyungju Kim, Wonsiri Punurai, Sotarat Thammaboosadee

    Published 2025-06-01
    “…Data protection assessment is a significant issue to security and privacy enhancement. …”
    Get full text
    Article
  10. 270

    Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions by R. Vijay Anand, G. Magesh, I. Alagiri, Madala Guru Brahmam, Balamurugan Balusamy, Chithirai Pon Selvan, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2025-01-01
    “…After that, these local models are aggregated towards a common, global model using secure aggregation methods, which makes sure that there is nozza of data privacy and hence, in the process making sure that more accurate models can be obtained due to diversified data sets. …”
    Get full text
    Article
  11. 271

    Secure and trusted data sharing in smart healthcare using blockchain and IoT integration by Soubhagya Ranjan Mallick, Srichandan Sobhanayak, Rakesh Kumar Lenkar

    Published 2025-08-01
    “…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
    Get full text
    Article
  12. 272

    Effective deep learning aided vehicle classification approach using Seismic Data by Sherief Hashima, Mohamed H. Saad, Ahmad B. Ahmad, Takeshi Tsuji, Hamada Rizk

    Published 2025-07-01
    “…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
    Get full text
    Article
  13. 273

    ECDSA-based tamper detection in medical data using a watermarking technique by Rupa Ch, Naga Vivek K, Gautam Srivastava, Reddy Gadekallu

    Published 2024-01-01
    “…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
    Get full text
    Article
  14. 274
  15. 275

    Community views on the secondary use of general practice data: Findings from a mixed‐methods study by Annette J. Braunack‐Mayer, Carolyn Adams, Alberto Nettel‐Aguirre, Belinda Fabrianesi, Lucy Carolan, Justin Beilby, Felicity Flack

    Published 2024-02-01
    “…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
    Get full text
    Article
  16. 276
  17. 277
  18. 278

    Balancing Privacy and Performance: A Differential Privacy Approach in Federated Learning by Huda Kadhim Tayyeh, Ahmed Sabah Ahmed AL-Jumaili

    Published 2024-10-01
    “…Federated learning (FL), a decentralized approach to machine learning, facilitates model training across multiple devices, ensuring data privacy. However, achieving a delicate privacy preservation–model convergence balance remains a major problem. …”
    Get full text
    Article
  19. 279

    Evaluating the effectiveness of data governance frameworks in ensuring security and privacy of healthcare data: A quantitative analysis of ISO standards, GDPR, and HIPAA in blockch... by Ameer Ahmed, Asjad Shahzad, Afshan Naseem, Shujaat Ali, Imran Ahmad

    Published 2025-01-01
    “…Although there are existing frameworks to govern healthcare data but they have certain limitations in effectiveness of data governance to ensure security and privacy. …”
    Get full text
    Article
  20. 280

    My Holistic Data Share: A WEB3 Data Share Application: Extending Beyond Finance to Privacy-Protected Decentralized Share of Multi-Dimensional Data to Enhance Global Healthcare by SATHYA KRISHNASAMY

    Published 2024-08-01
    “…This paper introduces a concept beyond cryptocurrencies and finance into everyday real-world use cases that need combinatorial access to a person’s holistic data, including financial and health records, genomic data, and advanced directives, among others, that need to be privacy protected and shared with specific actors identified for their roles in the WEB3 ecosystem through decentralized identifiers and non-fungible token badges identifying particular recipients. …”
    Get full text
    Article