Suggested Topics within your search.
Suggested Topics within your search.
-
41
Data driven healthcare insurance system using machine learning and blockchain technologies
Published 2025-07-01Get full text
Article -
42
Blockchain Approach for Healthcare Using Fog Topology and Lightweight Consensus
Published 2025-01-01Get full text
Article -
43
A survey of individuals’ willingness to share real-world data postmortem with researchers
Published 2024-01-01Subjects: “…Data use…”
Get full text
Article -
44
Decentralized big data mining: federated learning for clustering youth tobacco use in India
Published 2024-12-01“…By leveraging federated learning and differential privacy, this study demonstrates a privacy-preserving approach to analyzing large-scale public health data, providing a blueprint for future health interventions and tobacco control strategies in India and beyond.…”
Get full text
Article -
45
Privacy Centric Offline Chatbot using Large Language Models
Published 2025-07-01“…They also might collect and store the data leading to privacy breaches. This research paper focuses on these problems. …”
Get full text
Article -
46
-
47
-
48
A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network
Published 2024-01-01“…So, in our model after completing the node authentication and trust detection, privacy preservation of data is performed using Optimal Key-aided Data Sanitization (OPDS). …”
Get full text
Article -
49
Survey of split learning data privacy
Published 2024-06-01“…In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. …”
Get full text
Article -
50
Can Synthetic Data Protect Privacy?
Published 2025-01-01“…To systematically evaluate the privacy protection performance of synthetic data generation algorithms (Synthpop, CTGAN, RTVAE, TVAE, DataSynthesizer), this study applied various safety metrics. …”
Get full text
Article -
51
Privacy-Preserving Clinical Decision Support for Emergency Triage Using LLMs: System Architecture and Real-World Evaluation
Published 2025-07-01“…We evaluate the system through two studies: (1) a benchmark of 750+ USMLE-style questions validating the medical reasoning of fine-tuned LLMs; and (2) a real-world case study (<i>n</i> = 132, 75.8% first-pass agreement) using de-identified MIMIC-III data to assess triage accuracy and responsiveness. …”
Get full text
Article -
52
Secondary Use of Electronic Health Record: Opportunities and Challenges
Published 2020-01-01Subjects: Get full text
Article -
53
-
54
Adaptive personalized privacy-preserving data collection scheme with local differential privacy
Published 2024-04-01“…Local differential privacy (LDP) is a state-of-the-art privacy notion that enables terminal participants to share their private data safely while controlling the privacy disclosure at the source. …”
Get full text
Article -
55
A Privacy-Preserving RL-Based Secure Charging Coordinator Using Efficient FL for Smart Grid Home Batteries
Published 2025-02-01Get full text
Article -
56
Privacy Auditing of Lithium-Ion Battery Ageing Model by Recovering Time-Series Data Using Gradient Inversion Attack in Federated Learning
Published 2025-05-01“…The exchange of gradients is a widely used method in modelling systems for machine learning (e.g., distributed training, federated learning) in privacy-sensitive domains. …”
Get full text
Article -
57
-
58
A Hybrid Framework for Enhancing Privacy in Blockchain-Based Personal Data Sharing using Off-Chain Storage and Zero-Knowledge Proofs
Published 2025-06-01“…However, its widespread adoption is constrained by challenges such as limited scalability, privacy concerns, and conflicts with regulatory frameworks like the General Data Protection Regulation (GDPR). …”
Get full text
Article -
59
Revisiting the use and effectiveness of patient-held records in rural Malawi
Published 2025-06-01“…Aim This paper assessed their use and effectiveness within the health data ecosystem, and their potential impact on patient care. …”
Get full text
Article -
60
Privacy-utility tradeoff method using multi-variable source coding
Published 2015-12-01“…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
Get full text
Article