Showing 201 - 220 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.24s Refine Results
  1. 201
  2. 202

    What we do with data: a performative critique of data 'collection' by Garfield Benjamin

    Published 2021-12-01
    “…How do terms and practices relate in defining the norms of data in society? This article undertakes a critique of data collection using data feminism and a performative theory of privacy: as a resource, an objective discovery and an assumption. …”
    Get full text
    Article
  3. 203

    A comprehensive survey on big data privacy and Hadoop security: Insights into encryption mechanisms and emerging trends by Youness Filaly, Nisrine Berros, Fatna El mendili, Younes El Bouzekri EL idrissi

    Published 2025-09-01
    “…We find weaknesses in existing techniques via a comparative study and provide a hybrid encryption system aimed at secure and efficient data processing in Hadoop settings. Researchers and practitioners searching for scalable, privacy-preserving big data platform solutions should use this paper as a reference.…”
    Get full text
    Article
  4. 204

    A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption by Linh Nguyen, Quoc Bao Phan, Lan Zhang, Tuy Tan Nguyen

    Published 2025-01-01
    “…Audio data often contains sensitive information, raising privacy concerns when using artificial intelligence on cloud platforms. …”
    Get full text
    Article
  5. 205

    Anomaly detection in encrypted network traffic using self-supervised learning by Sadaf Sattar, Shumaila Khan, Muhammad Ismail Khan, Ainur Akhmediyarova, Orken Mamyrbayev, Dinara Kassymova, Dina Oralbekova, Janna Alimkulova

    Published 2025-07-01
    “…In this paper, we describe ET-SSL, a new approach for encrypted data anomaly detection which uses self-supervised contrastive learning to identify informative representations in flow level, statistical features like packet length; inter arrival time; flow duration and protocol metadata to Detect anomalies in encrypted network traffic without the need for labelled datasets or payload analysis. …”
    Get full text
    Article
  6. 206

    When Poor-Quality Data Meet Anonymization Models: Threats and Countermeasures by Abdul Majeed, Seong Oun Hwang

    Published 2025-01-01
    “…For example, skewed data may lead to imbalanced learning when used in machine learning (ML) classifiers. …”
    Get full text
    Article
  7. 207

    IoT medical device risks: Data security, privacy, confidentiality and compliance with HIPAA and COBIT 2019 by Na-ella Khan, Riaan J. Rudman

    Published 2025-02-01
    “…Purpose: This study aimed to develop a comprehensive framework to enable the identification of risks pertaining to data security, privacy and confidentiality when using medical Internet of Things (IoT) devices. …”
    Get full text
    Article
  8. 208

    ChatAnalysis revisited: can ChatGPT undermine privacy in smart homes with data analysis? by Jüttner Victor, Fleig Arthur, Buchmann Erik

    Published 2025-03-01
    “…While empowering users, this raises critical privacy concerns when used to analyze data from personal spaces, such as smart-home environments. …”
    Get full text
    Article
  9. 209

    Metric and classification model for privacy data based on Shannon information entropy and BP neural network by Yihan YU, Yu FU, Xiaoping WU

    Published 2018-12-01
    “…The trained BP neural network was used to output the classification result of privacy data without pre-determining the metric weight. …”
    Get full text
    Article
  10. 210

    Metric and classification model for privacy data based on Shannon information entropy and BP neural network by Yihan YU, Yu FU, Xiaoping WU

    Published 2018-12-01
    “…The trained BP neural network was used to output the classification result of privacy data without pre-determining the metric weight. …”
    Get full text
    Article
  11. 211

    The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles by Emmi Eronen, Alpo Olavi Värri, Miika Järvinen

    Published 2025-05-01
    “…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
    Get full text
    Article
  12. 212

    CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK by U. F. Holikau, V. L. Pivovarov

    Published 2016-07-01
    “…The article outlines the possibility of increasing the privacy of cryptographic key generated in the conditions of data leakage of some of its values. …”
    Get full text
    Article
  13. 213

    Medical data privacy protection based on blockchain asymmetric encryption algorithm and generative adversarial network by Yuanyuan Gao, Jin-whan Kim

    Published 2025-02-01
    “…In the blockchain environment, asymmetric encryption algorithms are used to generate private keys and public keys to encrypt user privacy data. …”
    Get full text
    Article
  14. 214

    Going global: Comparing Chinese mobile applications’ data and user privacy governance at home and abroad by Lianrui Jia, Lotus Ruan

    Published 2020-09-01
    “…Lastly, we conducted content analysis of the terms of service and privacy policies to establish the app’s data collection, storage, transfer, use, and disclosure measures. …”
    Get full text
    Article
  15. 215

    Privacy Protection Based Secure Data Transaction Protocol for Smart Sensor Meter in Smart Grid by Woong Go, SeulKi Choi, Jin Kwak

    Published 2013-11-01
    “…They could then burgle the house. We propose a privacy-enhanced secure data transaction protocol that can protect private data by encrypting them. …”
    Get full text
    Article
  16. 216

    A hybrid encryption algorithm based approach for secure privacy protection of big data in hospitals by Wei Li, Qian Huang

    Published 2024-12-01
    “…First, collect hospital big data including hospital medical business system, mobile wearable devices and big health data; Secondly, use byte changes to compress hospital big data to achieve safe transmission of hospital big data; Then, the hospital sender uses the AES session key to encrypt the hospital big data and the ECC public key to encrypt the AES session key, uses SHA-1 to calculate the hash value of the medical big data, and uses the ECC public key to sign the hash value; The hospital receiver uses the ECC private key to verify the signature, and decrypts the AES session key using the ECC private key. …”
    Get full text
    Article
  17. 217
  18. 218

    Airbnb in New York City: whose privacy rights are threatened by a Government Data grab? by T. Hofmann

    Published 2019-12-01
    “…Using Local Law 146 as a lens, this Note examines the privacy issues implicated by data- collection laws and discusses which parties can assert these privacy rights, particularly given recent changes in third-party doctrine jurisprudence. …”
    Get full text
    Article
  19. 219

    Mamba-fusion for privacy-preserving disease prediction by Muhammad Kashif Jabbar, Huang Jianjun, Ayesha Jabbar, Anas Bilal

    Published 2025-07-01
    “…Experimental results on multi-modal clinical measurements, ECG, EEG, clinical notes, and demographic data support the applied framework. We have then used Mamba-Fusion to achieve 92:4% accuracy, 0:91 F-Score, and 0:96 AUC-ROC by keeping the privacy leakage at 0:02 and communication costs to 12:5 MB, which make it superior to conventional FL techniques. …”
    Get full text
    Article
  20. 220

    Multi-function supported privacy protection data aggregation scheme for V2G network by Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI

    Published 2023-04-01
    “…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
    Get full text
    Article