Showing 321 - 340 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.22s Refine Results
  1. 321

    Decentralized Voltage Prediction in Multi-Area Distribution Systems: A Privacy-Preserving Collaborative Framework by Jianfeng Yan, Beibei Wang, Zhiqiang Wu, Zhengkai Ding

    Published 2025-01-01
    “…However, potential privacy concerns pose significant challenges to data sharing and interarea collaboration. …”
    Get full text
    Article
  2. 322

    Application of the joint clustering algorithm based on Gaussian kernels and differential privacy in lung cancer identification by Hang Yanping, Zheng Haixia, Yang Minmin, Wang Nan, Kong Miaomiao, Zhao Mingming

    Published 2025-05-01
    “…The algorithm enhances cancer detection while ensuring data privacy. Three publicly available lung cancer datasets, along with a dataset from our hospital, are used to test and demonstrate the effectiveness of DPFCM_GK. …”
    Get full text
    Article
  3. 323

    Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing by Paromita Goswami, Neetu Faujdar, Ghanshyam Singh, Kanta Prasad Sharma, Ajoy Kumar Khan, Somen Debnath

    Published 2024-01-01
    “…To address these issues, we suggest proposing a partial signature-based data auditing system so that both privacy and accuracy can be fortified while reducing the computational cost associated with auditing processes significantly. …”
    Get full text
    Article
  4. 324

    A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain by Lakshman Kannan Venugopal, Rajappan Rajaganapathi, Abhishek Birjepatil, Sundararajan Edwin Raja, Gnanasaravanan Subramaniam

    Published 2023-12-01
    “…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
    Get full text
    Article
  5. 325

    A federated LSTM network for load forecasting using multi-source data with homomorphic encryption by Mengdi Wang, Rui Xin, Mingrui Xia, Zhifeng Zuo, Yinyin Ge, Pengfei Zhang, Hongxing Ye

    Published 2025-03-01
    “…These challenges drive the adoption of federated learning (FL) to address issues related to data silos and privacy. In this paper, a novel framework for short-term load forecasting was proposed using historical data from industries such as power, meteorology, and finance. …”
    Get full text
    Article
  6. 326
  7. 327

    Predictive Model to Analyse Real and Synthetic Data for Learners' Performance Prediction Using Regression Techniques by SHABNAM ARA S.J, Tanuja R, Manjula S.H

    Published 2025-03-01
    “…Real-world data availability is often hampered by privacy concerns, prompting a shift towards synthetic data generation. …”
    Get full text
    Article
  8. 328

    A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology by Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed

    Published 2023-12-01
    “… Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. …”
    Get full text
    Article
  9. 329

    Secure healthcare data sharing and attack detection framework using radial basis neural network by Abhishek Kumar, Priya Batta, Pramod Singh Rathore, Sachin Ahuja

    Published 2025-05-01
    “…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
    Get full text
    Article
  10. 330
  11. 331

    Respiratory Rate Estimation from Thermal Video Data Using Spatio-Temporal Deep Learning by Mohsen Mozafari, Andrew J. Law, Rafik A. Goubran, James R. Green

    Published 2024-10-01
    “…Thermal videos provide a privacy-preserving yet information-rich data source for remote health monitoring, especially for respiration rate (RR) estimation. …”
    Get full text
    Article
  12. 332

    A lightweight and efficient raw data collection scheme for IoT systems by Yixuan Huang, Yining Liu, Jingcheng Song, Weizhi Meng

    Published 2024-05-01
    “…However, it also exposes sensitive information, which leads to privacy risks. An approach called N-source anonymity has been used for privacy preservation in raw data collection, but most of the existing schemes do not have a balanced efficiency and robustness. …”
    Get full text
    Article
  13. 333

    A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques by R. Ramya, P. Kumar, D. Dhanasekaran, R. Satheesh Kumar, S. Amithesh Sharavan

    Published 2025-03-01
    “…Quantum-secured networks enhance urban security, smart management, and infrastructure protection by providing data privacy and facilitating secure data transmission, thereby facilitating robust infrastructure and technological development.…”
    Get full text
    Article
  14. 334

    Enhancing uploads of health data in the electronic health record—The role of framing and length of privacy information: A survey study in Germany by Niklas von Kalckreuth, Markus A Feufel

    Published 2025-07-01
    “…Background The German electronic health record (EHR) aims to enhance patient care and reduce costs, but users often worry about data security. In this article, we propose and test communication strategies to mitigate privacy concerns and increase EHR uploads. …”
    Get full text
    Article
  15. 335

    Enhanced Privacy and Communication Efficiency in Non-IID Federated Learning With Adaptive Quantization and Differential Privacy by Emre Ardic, Yakup Genc

    Published 2025-01-01
    “…We evaluate our approach through extensive experiments on CIFAR10, MNIST, and medical imaging datasets, using non-IID data distributions across varying client counts, bit-length schedulers, and privacy budgets. …”
    Get full text
    Article
  16. 336

    Googling Patients by Emily Beer

    Published 2022-11-01
    “…It can be difficult to determine which health data is truly private or confidential. In our collective effort to decide how to categorize and use data, it is important not to muddy the waters unnecessarily by applying concepts of privacy and confidentiality to data that definitely does not meet those criteria and simply is not private. …”
    Get full text
    Article
  17. 337

    Research and prospect of reversible data hiding method with contrast enhancement by Yang YANG, Wei-ming ZHANG, ong-dong HOUD, Hui WANG, Neng-hai YU

    Published 2016-04-01
    “…Reversible data hiding methods can recover the cover image losslessly after extracting the secret message from the marked image.Such technology can be used in the certification or the label of military,justice and medical images,which are sensitive and slight modification are not allowed.Especially for the medical images,RDH tech-nology can be used in protecting the privacy of the patient.A series of RDH methods with contrast enhancement ef-fect were introduced and classified into pixel-based histogram methods and prediction-error-based histogram meth-ods according to the type of carrier in RDH scheme.The main purpose of such algorithms was to improve the sub-jective visual quality of marked images and to embed secret data into cover image reversibly meanwhile.These se-ries of algorithms were suitable for the research of privacy protection of medical image.Finally,future development in this direction is prospected through analyzing the advantages and disadvantages of the existing work.…”
    Get full text
    Article
  18. 338

    Exploring the General Data Protection Regulation (GDPR) compliance in cloud services: insights from Swedish public organizations on privacy compliance by Awatef Issaoui, Jenny Örtensjö, M. Sirajul Islam

    Published 2023-12-01
    “…The collected data were analyzed and classified using the seven privacy threat categories outlined in the LINDDUN framework. …”
    Get full text
    Article
  19. 339

    An efficient secure predictive demand forecasting system using Ethereum virtual machine by Himani Saraswat, Mahesh Manchanda, Sanjay Jasola

    Published 2024-12-01
    “…The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. …”
    Get full text
    Article
  20. 340

    Social Aspects of Democratic Safeguards in Privacy Rights: A Qualitative Study of the European Union and China by Polonca Kovač, Grega Rudolf

    Published 2022-05-01
    “… Purpose: The primary objective of the present research is to identify the basic tools and restrictions concerning the protection of privacy and personal data in the EU and China as two fundamentally different cultural systems. …”
    Get full text
    Article