Suggested Topics within your search.
Suggested Topics within your search.
-
2001
Enabling Secure and Scalable GDPR-Compliant Blockchain-Based e-KYC With Efficient Redaction
Published 2025-01-01“…To address these gaps, we propose a novel blockchain-based e-KYC framework that is GDPR-compliant, privacy-preserving, and highly scalable. Our solution introduces three key innovations: 1) ZK-Rollup-based authentication integrated with sharded blockchain architecture, enabling off-chain proof batching and distributed verification across shards for high-throughput, low-latency validation; 2) adaptive proxy re-encryption to support secure and dynamic customer data portability between host and requesting FIs; and 3) an optimized redactable blockchain protocol using off-chain Chameleon Hash collision generation and threshold cryptography-based key rotation to enable efficient, secure, and verifiable data updates in compliance with GDPR. …”
Get full text
Article -
2002
The potential of machine learning in diagnosing neurological and psychiatric diseases: a review
Published 2025-06-01“…However, certain challenges persist, including concerns about data quality, patient privacy and the ethical implications of algorithmic decisions. …”
Get full text
Article -
2003
Generalization challenges in video deepfake detection: methods, obstacles, and technological advances
Published 2025-01-01“…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
Get full text
Article -
2004
Personalized Mobile Health for Elderly Home Care: A Systematic Review of Benefits and Challenges
Published 2023-01-01“…The results indicated that 25% of the challenges were related to privacy, cybersecurity, and data ownership (10%), technology (7.5%), and implementation (7.5%). …”
Get full text
Article -
2005
Reinventing Cybersecurity Internships During the COVID-19 Pandemic
Published 2023-01-01“…The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. …”
Get full text
Article -
2006
Generalization challenges in video deepfake detection: methods, obstacles, and technological advances
Published 2025-01-01“…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
Get full text
Article -
2007
Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks
Published 2025-01-01“…Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. …”
Get full text
Article -
2008
Making temporary homes
Published 2024-06-01“…The interviews were analysed with Interpretative Phenomenological Analysis, and the visual data (photos made by the interviewees and sometimes the researcher, and drawings made by the researcher) was used to place the content of the interviews in a physical context. …”
Get full text
Article -
2009
Contrastive Learning Algorithm for Low-Resource Cryptographic Attack Event Detection
Published 2025-01-01“…The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity theft, and potential legal liabilities. …”
Get full text
Article -
2010
Optimising TinyML with quantization and distillation of transformer and mamba models for indoor localisation on edge devices
Published 2025-03-01“…The application of these TinyML models in healthcare has the potential to revolutionize patient monitoring by providing accurate, real-time location data while minimising power consumption, increasing data privacy, improving latency and reducing infrastructure costs.…”
Get full text
Article -
2011
Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection
Published 2024-11-01“…Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. …”
Get full text
Article -
2012
Applications of UAV Technologies in Assessment of Transportation Infrastructure Systems
Published 2025-06-01“…Respondents emphasize the need for longer flight times, better automation, and advanced data tools, underscoring growing adoption and highlighting the need to overcome technical, regulatory, and data privacy challenges for optimal UAV integration within transportation infrastructure systems management.…”
Get full text
Article -
2013
Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review
Published 2025-03-01“…These gaps include design requirements, software and firmware updates, physical security, the use of big data to detect vulnerabilities, user data privacy, and inconsistencies in machine learning algorithms. …”
Get full text
Article -
2014
Mitochondrial disease registries worldwide: A scoping review.
Published 2022-01-01“…These include establishing registry objectives, respecting patients and their roles in the registry, adopting international data standards, data evaluations, and considerations to privacy legislation, among others. …”
Get full text
Article -
2015
Bibliometric analysis of digital transformation on organization design
Published 2025-01-01“…Using the Bibliometrix software package in the R programming language, bibliographic data analysis was performed in order to identify the most influential authors, key topics and future research directions. …”
Get full text
Article -
2016
The Potential for Large Language Models to Transform Cardiovascular Medicine (Russian Translation)
Published 2025-02-01“…Potential risks, such as loss of data privacy or potential diagnostic errors, should be addressed before use in clinical practice. …”
Get full text
Article -
2017
Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty
Published 2025-03-01“…One approach to improve trustworthiness and fairness in AI systems is to use bias mitigation algorithms. However, most bias mitigation algorithms require data sets that contain sensitive attribute values to assess the fairness of the algorithm. …”
Get full text
Article -
2018
Pooled Rideshare in the U.S.: An Exploratory Study of User Preferences
Published 2025-05-01“…The study incorporated 77 actionable items developed from the results of the 2021 survey to assess whether addressing specific user-generated topics such as safety, reliability, convenience, and privacy can improve pooled rideshare use. A side-by-side comparison of the 2021 and 2025 data revealed shifts in transportation behavior, with personal rideshare usage increasing from 22% to 28%, public transportation from 21% to 27%, and pooled rideshare from 6% to 8%, while personal vehicle (79%) use remained dominant. …”
Get full text
Article -
2019
Digital insurance acceptance among older adults in the context of AI
Published 2025-06-01“…This exploratory study employed the insights of the Technology Acceptance Model (TAM), the Information System Continuance Model (ISCM), and the Customer Satisfaction (C-SAT) method. Data were collected by conducting interviews in September 2024 with 20 older adults using AI-powered insurance services. …”
Get full text
Article -
2020
Multimodal and Temporal Graph Fusion Framework for Advanced Phishing Website Detection
Published 2025-01-01“…FGCL-Net ensures privacy-preserving learning across decentralized datasets through federated contrastive learning, achieving 93-95% accuracy while safeguarding data privacy. …”
Get full text
Article