Showing 581 - 600 results of 2,784 for search '"\"((\\"used privacy data\\") OR ((\\"uses OR \\"use) privacy data\\"))~\""', query time: 0.17s Refine Results
  1. 581

    Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods by Ahmet Emre Ergun, Ozgu Can, Murat Kantarcioglu

    Published 2025-01-01
    “…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
    Get full text
    Article
  2. 582

    CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions by Mohammad Badhruddouza Khan, Salwa Tamkin, Jinat Ara, Mobashwer Alam, Hanif Bhuiyan

    Published 2025-02-01
    “…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
    Get full text
    Article
  3. 583

    Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing by Dengzhi Liu, Zhimin Li, Dongbao Jia

    Published 2023-12-01
    “…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
    Get full text
    Article
  4. 584

    Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification by Mbarek Marwan, Abdelkarim Ait Temghart, Said Ouhmi, Mohamed Lazaar

    Published 2024-12-01
    “…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
    Get full text
    Article
  5. 585

    Ethical Considerations in Emotion Recognition Research by Darlene Barker, Mukesh Kumar Reddy Tippireddy, Ali Farhan, Bilal Ahmed

    Published 2025-05-01
    “…The development of real-time feedback loops for user awareness should be combined with clear disclosures about data use and participatory design practices. The successful oversight of these systems requires interdisciplinary work between researchers, policymakers, designers, and ethicists. …”
    Get full text
    Article
  6. 586

    Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews by Sabrina Fesl, Caroline Lang, Jochen Schmitt, Stefanie Brückner, Stephen Gilbert, Stefanie Deckert, Madlen Scheibe

    Published 2025-06-01
    “…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
    Get full text
    Article
  7. 587

    Estimating rare disease prevalence and costs in the USA: a cohort study approach using the Healthcare Cost Institute claims data by Keith A Crandall, Christine M Cutillo, Ainslie Tisdale, Mahdi Baghbanzadeh, Reva L Stidd, Manpreet S Khural, Laurie J Hartman, Jeff Greenberg, Kevin B Zhang, Ali Rahnavard

    Published 2024-04-01
    “…Building capabilities to use machine learning to accelerate the diagnosis of RDs would vastly improve with changes to healthcare data, such as standardising data input, linking databases, addressing privacy issues and assigning ICD-10 codes for all RDs, resulting in more robust data for RD analytics.…”
    Get full text
    Article
  8. 588

    Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure by Alex Dhima, Soumya Choudhary, Keris Myrick, John Torous

    Published 2025-06-01
    “…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
    Get full text
    Article
  9. 589
  10. 590
  11. 591

    Concurrent prescriptions for opioids and benzodiazepines and risk of opioid overdose: protocol for a retrospective cohort study using linked administrative data by Kristian B Filion, Robyn Tamblyn, David L Buckeridge, Erin Y Liu

    Published 2021-02-01
    “…Our aim was to assess the risk of opioid overdose associated with concurrent use of opioids and benzodiazepines relative to opioids alone.Methods and analysis A retrospective cohort study will be conducted using medical claims data from adult residents of Montréal, Canada. …”
    Get full text
    Article
  12. 592

    PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation by Zhengqiang Ge, Xinyu Liu, Qiang Li, Yu Li, Dong Guo

    Published 2021-12-01
    “…To significantly protect the user’s privacy and prevent the user’s preference disclosure from leading to malicious entrapment, we present a combination of the recommendation algorithm and the privacy protection mechanism. …”
    Get full text
    Article
  13. 593

    FL-QNNs: Memory Efficient and Privacy Preserving Framework for Peripheral Blood Cell Classification by Meenakshi Aggarwal, Vikas Khullar, Nitin Goyal, Bhavani Sankar Panda, Hardik Doshi, Nafeesh Ahmad, Vivek Bhardwaj, Gaurav Sharma

    Published 2025-01-01
    “…Then implement the federated learning (FL) framework with IID (Independent and identically distributed) and Non-IID datasets maintain similar results by preserving data. Further FL-QNNs approach is used with these baseline models and achieved 98-99% accuracy and while optimizing memory, preserving data and resources. …”
    Get full text
    Article
  14. 594

    A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation by Leming Zhou, Robert Thieret, Valerie Watzlaf, Dilhari DeAlmeida, Bambang Parmanto

    Published 2019-06-01
    “…The assessment results may be used to identify possible vulnerabilities in telehealth systems and practice or demonstrate to patients the sufficient security and privacy protection to patients’ data.…”
    Get full text
    Article
  15. 595

    A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards by Eva Heinrich

    Published 2025-08-01
    “…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
    Get full text
    Article
  16. 596

    Prompts, privacy, and personalized learning: integrating AI into nursing education—a qualitative study by Mingyan Shen, Yanping Shen, Fangchi Liu, Jiawen Jin

    Published 2025-04-01
    “…However, questions remain regarding the ethical use of AI-generated outputs, data privacy concerns, and limitations in recognizing emotional nuances. …”
    Get full text
    Article
  17. 597
  18. 598

    A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond by Ahmad Rahdari, Elham Keshavarz, Ehsan Nowroozi, Rahim Taheri, Mehrdad Hajizadeh, Mohammadreza Mohammadi, Sima Sinaei, Thomas Bauschert

    Published 2025-01-01
    “…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
    Get full text
    Article
  19. 599
  20. 600

    Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies by Lisbeth Sinan Lendik

    Published 2023-07-01
    “… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
    Get full text
    Article