Suggested Topics within your search.
Suggested Topics within your search.
-
281
Federated learning for intrusion detection in IoT environments: a privacy-preserving strategy
Published 2025-06-01“…While allowing devices to benefit from the network’s collective insights, this decentralised learning methodology safeguards data privacy. Using a real-world IoT dataset and two popular federated learning algorithms—Federated Average and Federated Average with Momentum—the study assesses the effectiveness of PEIoT-DS. …”
Get full text
Article -
282
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01“…EHR contains a large amount of private information, however, data outsourcing can create security risks, potentially compromising the integrity and privacy of EHR. …”
Get full text
Article -
283
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01“…EHR contains a large amount of private information, however, data outsourcing can create security risks, potentially compromising the integrity and privacy of EHR. …”
Get full text
Article -
284
Navigating ethics in HIV data and biomaterial management within Black, African, and Caribbean communities in Canada
Published 2025-01-01“…The study employed iterative inductive thematic data analysis. Findings Participants expressed significant concerns about the collection, sharing, and use of HIV data from healthcare encounters, revealing mistrust towards institutions like police, child welfare, and immigration accessing their health information. …”
Get full text
Article -
285
Blockchain-Based Privacy-Preserving Authentication and Access Control Model for E-Health Users
Published 2025-03-01“…The advancement of e-health systems has resulted in substantial enhancements in healthcare delivery via effective data management and accessibility. The use of digital health solutions presents dangers to sensitive health information, including unauthorised access, privacy violations, and security weaknesses. …”
Get full text
Article -
286
Privacy‐preserving speaker verification system based on binary I‐vectors
Published 2021-05-01Get full text
Article -
287
Board of Directors Role in Data Privacy Governance: Making the Transition from Compliance Driven to Good Business Stewardship
Published 2024-02-01“…Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. …”
Get full text
Article -
288
Heap Bucketization Anonymity—An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes
Published 2022-01-01“…Currently, significant focus has been established to protect privacy during data publishing. The existing privacy models for multiple sensitive attributes do not concentrate on the correlation among the attributes, which in turn leads to much utility loss. …”
Get full text
Article -
289
Sensitive data donation in practice: unforeseen challenges and lessons learned
Published 2025-05-01Get full text
Article -
290
Efficient Traceability Systems with Smart Contracts: Balancing On-Chain and Off-Chain Data Storage for Enhanced Scalability and Privacy
Published 2024-11-01“…We discuss the advantages of using blockchain technology to notarise traceability activities, ensuring immutability and transparency by exploring two main scenarios, namely one where hash keys (i.e, cryptographic digests) are stored on-chain while detailed data remain off-chain, and another where all traceability data are fully stored on-chain. …”
Get full text
Article -
291
-
292
An enhanced dynamic KC-slice model for privacy preserving data publishing with multiple sensitive attributes by inducing sensitivity
Published 2022-01-01“…Privacy Preserving Data Publishing (PPDP) is an important aspect of real world scenarios. …”
Get full text
Article -
293
Distributed cross-learning for equitable federated models - privacy-preserving prediction on data from five California hospitals
Published 2025-02-01“…We compared D-CLEF with centralized/siloed/federated learning in horizontal or vertical scenarios. Using data of more than 15,000 patients with COVID-19 from five University of California (UC) Health medical centers, surgical data from UC San Diego, and heart disease data from Edinburgh, UK, D-CLEF performed close to the centralized solution, outperforming the siloed ones, and equivalent to the federated learning counterparts, but with increased synchronization time. …”
Get full text
Article -
294
Exploring the Use of AI in Qualitative Data Analysis: Comparing Manual Processing with Avidnote for Theme Generation
Published 2025-04-01“…However, fundamental concerns persist regarding the robustness, generalisability, credibility, reliability and trustworthiness of qualitative research when using AI technologies. Ethical considerations, such as data security and privacy, also need to be addressed in research settings. …”
Get full text
Article -
295
Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations
Published 2024-12-01“…The combination of ALO, FFO, and Q‐learning techniques offers a practical solution to evolving data privacy challenges and enhances flexibility in various use case scenarios.…”
Get full text
Article -
296
Federated intelligence for smart grids: a comprehensive review of security and privacy strategies
Published 2025-07-01“…The paper highlights critical gaps and outlines future research directions for improving smart grid resilience using federated intelligence.…”
Get full text
Article -
297
Enhancing Privacy While Preserving Context in Text Transformations by Large Language Models
Published 2025-01-01“…Despite the convenience, many users are unaware of the risks posed to their sensitive and personal data. This study addresses this issue by presenting a comprehensive solution to prevent personal data leakage using online tools. …”
Get full text
Article -
298
The method for approximate continuous Skyline query based on privacy protection in road network
Published 2025-07-01“…Abstract Existing road network continuous Skyline queries often neglect user location privacy and data privacy protection. This paper proposes a method for Approximate Continuous Skyline Query with Privacy Protection in road network (ACPP) environments to address these issues. …”
Get full text
Article -
299
-
300
Time Series Classification Using Federated Convolutional Neural Networks and Image-Based Representations
Published 2025-01-01“…Federated Learning (FL) enables collaborative training across distributed clients while ensuring data privacy. The method’s effectiveness is evaluated using 40 datasets from the UCR Archive. …”
Get full text
Article