Suggested Topics within your search.
Suggested Topics within your search.
-
361
Protecting contacts against privacy leaks in smartphones.
Published 2018-01-01Get full text
Article -
362
An Enhanced Communication Protocol for Location Privacy in WSN
Published 2015-04-01“…WSN is used in many applications, such as object tracking and security monitoring. …”
Get full text
Article -
363
Privacy protection scheme for mobile social network
Published 2022-07-01“…One way to protect one’s privacy is using encryption. Therefore, in the present paper, an improved secure design was presented for mobile social network using ciphertext-policy attribute-based encryption (CP-ABE) and advanced encryption standard (AES) that will encrypt users data in an end-to-end manner. …”
Get full text
Article -
364
-
365
Privacy-preserving task matching scheme for crowdsourcing
Published 2025-05-01“…Due to the potential untrustworthiness of crowdsourcing platforms, which may lead to the leakage of users’ private information, users are required to encrypt their data prior to uploading. To fulfill task matching while preserving privacy, the crowdsourcing platform employs encrypted spatial keyword queries to perform task matching of workers’ interests and locations. …”
Get full text
Article -
366
Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks
Published 2024-10-01“…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
Get full text
Article -
367
Privacy-preserving maximum value determination scheme
Published 2025-07-01“…This paper introduces a quantum-secure scheme for conducting privacy-preserving maximum value determination, allowing the parties to ascertain the highest value from their confidential inputs while keeping non-maximum data private. …”
Get full text
Article -
368
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
Get full text
Article -
369
Revolutionizing healthcare data analytics with federated learning: A comprehensive survey of applications, systems, and future directions
Published 2025-01-01“…In general, through systematic categorization and analysis of existing FL systems, we offer insights to design efficient, accurate, and privacy-preserving healthcare applications using cutting-edge FL techniques.…”
Get full text
Article -
370
Community views on the secondary use of general practice data: Findings from a mixed‐methods study
Published 2024-02-01“…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
Get full text
Article -
371
Self-sovereign management scheme of personal health record with personal data store and decentralized identifier
Published 2025-01-01“…Conventional personal health record (PHR) management systems are centralized, making them vulnerable to privacy breaches and single points of failure. Despite progress in standardizing healthcare data with the FHIR format, hospitals often lack efficient platforms for transferring PHRs, leading to redundant tests and delayed treatments. …”
Get full text
Article -
372
PERSONAL DATA PROTECTION IN CRIMINAL PROCEEDINGS
Published 2025-03-01“…The most vulnerable to these factors are the privacy and personal data of participants in criminal proceedings. …”
Get full text
Article -
373
Federated Learning Model Using CBDPL for Medical Image Segmentation
Published 2025-01-01Get full text
Article -
374
Efficient Keyset Design for Neural Networks Using Homomorphic Encryption
Published 2025-07-01Get full text
Article -
375
When Two are Better Than One: Synthesizing Heavily Unbalanced Data
Published 2021-01-01“…However, they need to fully comply with not only ethical but also regulatory obligations, where, e.g., privacy (strictly) needs to be respected when using or sharing data, thus protecting both the interests of users and organizations. …”
Get full text
Article -
376
Neurorights, Neurotechnologies and Personal Data: Review of the Challenges of Mental Autonomy
Published 2024-11-01“…Thorough searches were carried out with the search terms “neurotechnology”, “personal data”, “mental privacy”, “neuro-rights”, “neurotechnological interventions”, and “neurotechnological discrimination” on both English and Spanish sites, using search engines like Google Scholar and Redib as well as databases including Scielo, Dialnet, Redalyc, Lilacs, Scopus, Medline, and Pubmed. …”
Get full text
Article -
377
Proposed ethical framework for software requirements engineering
Published 2023-08-01Get full text
Article -
378
Advanced Zero-Shot Learning (AZSL) Framework for Secure Model Generalization in Federated Learning
Published 2024-01-01“…The objective of the proposed model is to increase model generalizability while achieving better performance on various and heterogeneous datasets while preserving data privacy. We have used datasets named MNIST, CIFAR-10, and FEMNIST to measure the model’s accuracy, precision, and generalization capability. …”
Get full text
Article -
379
Time Series Classification Using Federated Convolutional Neural Networks and Image-Based Representations
Published 2025-01-01“…Federated Learning (FL) enables collaborative training across distributed clients while ensuring data privacy. The method’s effectiveness is evaluated using 40 datasets from the UCR Archive. …”
Get full text
Article -
380
Federated target trial emulation using distributed observational data for treatment effect estimation
Published 2025-07-01“…Abstract Target trial emulation (TTE) aims to estimate treatment effects by simulating randomized controlled trials using real-world observational data. Applying TTE across distributed datasets shows great promise in improving generalizability and power but is always infeasible due to privacy and data-sharing constraints. …”
Get full text
Article