Search alternatives:
\\"uses » \\"use (Expand Search)
Showing 41 - 60 results of 2,784 for search '"\"((\\"used privacy data\\") OR ((\\"useds OR \\"uses) privacy data\\"))~\""', query time: 0.22s Refine Results
  1. 41
  2. 42

    Using UMAP for Partially Synthetic Healthcare Tabular Data Generation and Validation by Carla Lázaro, Cecilio Angulo

    Published 2024-12-01
    “…The proposed method is validated on prostate and breast cancer data sets, showing its effectiveness in completing and augmenting incomplete data sets using fully available references. …”
    Get full text
    Article
  3. 43
  4. 44

    Unpacking Youth Privacy Management in AI Systems: A Privacy Calculus Model Analysis by Austin Shouli, Ankur Barthwal, Molly Campbell, Ajay Kumar Shrestha

    Published 2025-01-01
    “…The increasing use of Artificial Intelligence (AI) in daily life has introduced substantial issues in protecting user privacy, particularly for young digital citizens. …”
    Get full text
    Article
  5. 45

    Blockchain-enabled data governance for privacy-preserved sharing of confidential data by Jingchi Zhang, Anwitaman Datta

    Published 2024-12-01
    “…Our novel ABE encryption system supports multi-authority use cases while hiding access policy and ensuring identity privacy, which also protects data sharing against corrupt authorities. …”
    Get full text
    Article
  6. 46

    Combining observational and experimental data for causal inference considering data privacy by Mann Charlotte Z., Sales Adam C., Gagnon-Bartsch Johann A.

    Published 2025-03-01
    “…We find that leveraging transformed observational data in treatment effect estimation can still improve estimation over only using data from an RCT.…”
    Get full text
    Article
  7. 47

    Dynamic Cohort Formation with Hierarchical Blockchain Using GDP for Enhanced FL by Sunila Fatima Ahmad, Zahra Abbas, Madiha Haider Syed, Adeel Anjum, Semeen Rehman

    Published 2024-11-01
    “…In addition, Gaussian Differential Privacy (GDP) is used as a privacy-preserving mechanism that adds controlled noise to the data or model updates to protect individual data points from being inferred by adversaries. …”
    Get full text
    Article
  8. 48

    Privacy in the Internet: Myth or reality by Mikarić Bratislav, Marković Marija, Trajković Dušan

    Published 2016-01-01
    “…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
    Get full text
    Article
  9. 49

    Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU by Pascal Riedel, Kaouther Belkilani, Manfred Reichert, Gerd Heilscher, Reinhold von Schwerin

    Published 2024-12-01
    “…We propose a bottom-up, privacy-preserving prediction method using differential privacy (DP) to enhance data privacy for energy analytics on the customer side. …”
    Get full text
    Article
  10. 50

    Evaluating the Impact of Artificial Intelligence Tools on Enhancing Student Academic Performance: Efficacy Amidst Security and Privacy Concerns by Jwern Tick Kiet Phua, Han-Foon Neo, Chuan-Chin Teo

    Published 2025-05-01
    “…This research investigates the perceptions and attitudes of students towards the use of AI tools in their academic activities, focusing on constructs such as perceived usefulness, the perceived ease of use, security and privacy concerns, and both positive and negative attitudes towards AI. …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53
  14. 54

    A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network by Jia Jia, Sathiya Sekar Kumarasamy, Kiran Sree Pokkuluri, K. Suresh Kumar, Thella Preethi Priyanka, Feng Wang

    Published 2024-01-01
    “…So, in our model after completing the node authentication and trust detection, privacy preservation of data is performed using Optimal Key-aided Data Sanitization (OPDS). …”
    Get full text
    Article
  15. 55
  16. 56

    Proactive Data Categorization for Privacy in DevPrivOps by Catarina Silva, João P. Barraca, Paulo Salvador

    Published 2025-02-01
    “…PsDC is a data-categorization model designed for integration with the DevPrivOps methodology and for use in privacy-quantification models. …”
    Get full text
    Article
  17. 57

    Enhancing healthcare data privacy and interoperability with federated learning by Adil Akhmetov, Zohaib Latif, Benjamin Tyler, Adnan Yazici

    Published 2025-05-01
    “…Unlike traditional centralized learning (CL) solutions that require data centralization, our platform uses local model learning, which naturally improves data privacy. …”
    Get full text
    Article
  18. 58

    Secure data sharing technology of medical privacy data in the Web 3.0 by Shusheng Guo, Cheng Chen, Qing Tong

    Published 2024-12-01
    “…Finally, data users apply to multiple parties for joint secure computing to obtain the use of private data. …”
    Get full text
    Article
  19. 59

    Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics by U. A. Vishniakou, YiWei Xia, Chuyue Yu

    Published 2024-09-01
    “…The article discusses the use of Ethereum blockchain technology in the Internet of Things (IoT) network for IT diagnostics of patients, which increases data security and user privacy. …”
    Get full text
    Article
  20. 60

    Synthetic data for privacy-preserving clinical risk prediction by Zhaozhi Qian, Thomas Callender, Bogdan Cebere, Sam M. Janes, Neal Navani, Mihaela van der Schaar

    Published 2024-10-01
    “…Compared with other privacy-enhancing approaches—such as federated learning—analyses performed on synthetic data can be applied downstream without modification, such that synthetic data can act in place of real data for a wide range of use cases. …”
    Get full text
    Article