Suggested Topics within your search.
Suggested Topics within your search.
-
341
-
342
Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring
Published 2024-12-01“…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
Get full text
Article -
343
-
344
How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries
Published 2019-03-01“…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
Get full text
Article -
345
Building Equi-Width Histograms on Homomorphically Encrypted Data
Published 2025-06-01“…Histograms are widely used for summarizing data distributions, detecting anomalies, and improving machine learning models’ accuracy. …”
Get full text
Article -
346
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
347
Privacy-Preserving Process Mining: A Blockchain-Based Privacy-Aware Reversible Shared Image Approach
Published 2024-12-01“…Deeper integration of cross-organizational business process sharing and process mining has advanced the Industrial Internet. Privacy breaches and data security risks limit its use. …”
Get full text
Article -
348
Personal Information Sharing Behavior Using Social Media
Published 2025-06-01“…The three-factor (keywords, countries and sources) revealed that the researchers of top countries used mostly six keywords (self-disclosure, social media, privacy, Facebook, social networking sites, and social support) and they preferably published in two major sources. …”
Get full text
Article -
349
Secured cloud-based image data processing of self-driving vehicles using full homomorphic encryption
Published 2025-10-01“…A novel method using full homomorphic encryption (FHE) image-based data is proposed, incorporating three different methods to search for the desired encrypted images stored in the cloud. …”
Get full text
Article -
350
Assessing the Fidelity and Utility of Water Systems Data Using Generative Adversarial Networks: A Technical Review
Published 2025-01-01“…This review paper addresses this limitation by utilizing Generative Adversarial Networks (GANs) to generate realistic synthetic datasets, overcoming data scarcity and privacy concerns in WDSs. We review, train, and evaluate seven state-of-the-art GAN models using three multivariate time-series datasets. …”
Get full text
Article -
351
-
352
Travel Behavior during the 2021 British Columbia Floods Using De-identified Network Mobility Data
Published 2024-05-01“…This study investigates residents’ emergent travel behavior before, during, and after the 2021 British Columbia Floods. Using de-identified network mobility data, we analyze travel patterns centered around the municipality of Hope in British Columbia, Canada. …”
Get full text
Article -
353
Predicting Alzheimer's Disease onset: A machine learning framework for early diagnosis using biomarker data
Published 2025-01-01Get full text
Article -
354
AN APPROACH PRIORITIZING THE CAUSAL FACTORS OF LARGE SCALED DATA USING SOFT COMPUTING: A CASE STUDY
Published 2021-12-01Get full text
Article -
355
Does data privacy influence digital marketing? The mediating role of AI-driven trust: An empirical study of Zain Telecom company in Jordan
Published 2025-01-01“…The PLS-SEM technique was used in this research to analyze data privacy, digital marketing effectiveness, and AI-driven trust constructs. …”
Get full text
Article -
356
Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption
Published 2025-06-01“…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
Get full text
Article -
357
Data Obfuscation Through Latent Space Projection for Privacy-Preserving AI Governance: Case Studies in Medical Diagnosis and Finance Fraud Detection
Published 2025-03-01“… Abstract BackgroundThe increasing integration of artificial intelligence (AI) systems into critical societal sectors has created an urgent demand for robust privacy-preserving methods. Traditional approaches such as differential privacy and homomorphic encryption often struggle to maintain an effective balance between protecting sensitive information and preserving data utility for AI applications. …”
Get full text
Article -
358
Analyzing the vulnerabilities in Split Federated Learning: assessing the robustness against data poisoning attacks
Published 2025-08-01“…Abstract Distributed Collaborative Machine Learning (DCML) offers a promising alternative to address privacy concerns in centralized machine learning. …”
Get full text
Article -
359
FedSVD: Asynchronous Federated Learning With Stale Weight Vector Decomposition
Published 2025-01-01“…Federated learning (FL) emerges as a collaborative learning framework that addresses the critical needs for privacy preservation and communication efficiency. …”
Get full text
Article -
360
Scalable architecture for autonomous malware detection and defense in software-defined networks using federated learning approaches
Published 2025-08-01“…Our architecture minimizes privacy risks by ensuring that raw data never leaves the device; only model updates are shared for aggregation at the global level. …”
Get full text
Article