Search alternatives:
\\"uses » \\"use (Expand Search)
Showing 141 - 160 results of 2,784 for search '"\"((\\"used privacy data\\") OR ((\\"useds OR \\"uses) privacy data\\"))~\""', query time: 0.23s Refine Results
  1. 141

    Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy by Renwu Yan, Yang Zheng, Ning Yu, Cen Liang

    Published 2024-03-01
    “…Under the general trend of the rapid development of smart grids, data security and privacy are facing serious challenges; protecting the privacy data of single users under the premise of obtaining user-aggregated data has attracted widespread attention. …”
    Get full text
    Article
  2. 142

    Empowering open data sharing for social good: a privacy-aware approach by Tânia Carvalho, Luís Antunes, Cristina Costa Santos, Nuno Moniz

    Published 2025-02-01
    “…Such a sharing process should adhere to state-of-the-art methods in Data Protection by Design and by Default. In this paper, we use a Covid-19 data set from Portugal’s second-largest hospital to show how it is feasible to ensure data privacy while improving the quality and maintaining the utility of the data. …”
    Get full text
    Article
  3. 143

    Federated learning for privacy-enhanced mental health prediction with multimodal data integration by Parul Dubey, Pushkar Dubey, Pitshou N. Bokoro

    Published 2025-12-01
    “…The proposed framework incorporates a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) network within a federated learning environment, ensuring that raw user data remains decentralised and privacy is preserved using differential privacy and encryption techniques. …”
    Get full text
    Article
  4. 144
  5. 145

    Legitimate Expectations of Privacy in the Era of Digitalization by E. Ostanina, E. Titova

    Published 2023-04-01
    “…This article contends that in the present era of digitalization people’s right to privacy should be protected no less than it was before the widespread use of digital technologies. …”
    Get full text
    Article
  6. 146

    Balancing Ethics and Privacy in the Use of Artificial Intelligence in Institutions of Higher Learning: A Framework for Responsive AI Systems by Belinda Ndlovu, Kudakwashe Maguraushe

    Published 2025-07-01
    “…Thematic analysis identified ten critical themes centred around benefits, challenges, applications, responsible use, privacy and data security, ethical considerations, institutional policies and frameworks, training, equity, and sustainable AI use. …”
    Get full text
    Article
  7. 147

    Sharing is CAIRing: Characterizing principles and assessing properties of universal privacy evaluation for synthetic tabular data by Tobias Hyrup, Anton Danholt Lautrup, Arthur Zimek, Peter Schneider-Kamp

    Published 2024-12-01
    “…However, the ability to share data is hindered by regulations protecting the privacy of natural persons. …”
    Get full text
    Article
  8. 148

    Privacy under threat – The intersection of IoT and mass surveillance by Siniša Domazet, Darko Marković, Tatjana Skakavac

    Published 2024-10-01
    “…It has been shown that there are issues with applying existing regulations to IoT and mass surveillance and that no universal legal framework currently exists to protect the right to privacy. The use of IoT technology, especially given the rapid development of artificial intelligence, will in the future raise numerous dilemmas regarding the entities responsible for collecting personal data, the consents required for data usage and processing, where the collected personal data will be used, and for what purposes. …”
    Get full text
    Article
  9. 149

    Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption by William J. Buchanan, Hisham Ali

    Published 2025-05-01
    “…The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. …”
    Get full text
    Article
  10. 150
  11. 151

    Enhancing Data Security in Distributed Systems Using Homomorphic Encryption and Secure Computation Techniques by Parihar Bhawana, Kiran Ajmeera, Valaboju Sabitha, Rashid Syed Zahidur, Liyakat Kazi Kutubuddin Sayyad, D R Anita Sofia Liz

    Published 2025-01-01
    “…Traditional solutions tend to use standard techniques like basic data wrapping and cryptographic 'rings'; but, due to the design properties required, they end up as lightweight mechanisms, usually not interpretation-at-all capable because of the need for protecting data during processing - leaving these applications hard to use and maintain long-term, or otherwise, limited to cloud computing and federated learning, when individual data types can be worked on within providers like AWS, Azure, etc, etc; or, even, explaining the results with near total indifference to the underlying big data tools, analytics, or neural architectures. …”
    Get full text
    Article
  12. 152
  13. 153

    A Differential Privacy Framework with Adjustable Efficiency–Utility Trade-Offs for Data Collection by Jongwook Kim, Sae-Hong Cho

    Published 2025-02-01
    “…The widespread use of mobile devices has led to the continuous collection of vast amounts of user-generated data, supporting data-driven decisions across a variety of fields. …”
    Get full text
    Article
  14. 154

    The Dual Nature of Trust in Participatory Sciences: An Investigation into Data Quality and Household Privacy Preferences by Danielle Lin Hunter, Valerie Johnson, Caren Cooper

    Published 2024-11-01
    “…In Crowd the Tap, we engaged participants through facilitator organizations including high schools, faith communities, universities, and a corporate volunteer program. We used Kruskal Wallis tests and chi-square tests with Bonferroni post hoc tests to assess how data quality and privacy preferences differed across facilitator groups and amongst those who participated in the project independently (unfacilitated). …”
    Get full text
    Article
  15. 155

    A synchronous compression and encryption method for massive electricity consumption data privacy preserving by Ruifeng Zhao, Jiangang Lu, Zhiwen Yu, Kaiwen Zeng

    Published 2025-01-01
    “…Our proposed algorithm uses a ternary Logistic-Tent chaotic system for generating a chaotic measurement matrix, allowing simultaneous data compression and encryption of user-side voltage and current data. …”
    Get full text
    Article
  16. 156

    A Blockchain-Based Secure Data Transaction and Privacy Preservation Scheme in IoT System by Jing Wu, Zeteng Bian, Hongmin Gao, Yuzhe Wang

    Published 2025-08-01
    “…With the explosive growth of Internet of Things (IoT) devices, massive amounts of heterogeneous data are continuously generated. However, IoT data transactions and sharing face multiple challenges such as limited device resources, untrustworthy network environment, highly sensitive user privacy, and serious data silos. …”
    Get full text
    Article
  17. 157

    Efficient and privacy-preserving certificateless data aggregation in Internet of things–enabled smart grid by Aijing Sun, Axin Wu, Xiaokun Zheng, Fangyuan Ren

    Published 2019-04-01
    “…If the user’s electricity consumption is transmitted in plaintext, the data may be used by some illegal users. At the same time, malicious users may send false data such that the control center makes a wrong power resource scheduling. …”
    Get full text
    Article
  18. 158

    Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO

    Published 2019-02-01
    “…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
    Get full text
    Article
  19. 159

    Shuffled differential privacy protection method for K-Modes clustering data collection and publication by Weijin JIANG, Yilin CHEN, Yuqing HAN, Yuting WU, Wei ZHOU, Haijuan WANG

    Published 2024-01-01
    “…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
    Get full text
    Article
  20. 160

    A controllable privacy data transmission mechanism for Internet of things system based on blockchain by ZiXiang Nie, YuanZhenTai Long, SenLin Zhang, YueMing Lu

    Published 2022-03-01
    “…With the in-depth integration of traditional industries and information technology in Internet of things, wireless sensor networks are used more frequently to transmit the data generated from various application scenarios. …”
    Get full text
    Article