Showing 341 - 360 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.20s Refine Results
  1. 341
  2. 342

    Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring by Eugenia Tîrziu, Ana-Mihaela Vasilevschi, Adriana Alexandru, Eleonora Tudora

    Published 2024-12-01
    “…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
    Get full text
    Article
  3. 343
  4. 344

    How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries by Nicki Tiffin, Asha George, Amnesty Elizabeth LeFevre

    Published 2019-03-01
    “…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
    Get full text
    Article
  5. 345

    Building Equi-Width Histograms on Homomorphically Encrypted Data by Dragoș Lazea, Anca Hangan, Tudor Cioara

    Published 2025-06-01
    “…Histograms are widely used for summarizing data distributions, detecting anomalies, and improving machine learning models’ accuracy. …”
    Get full text
    Article
  6. 346

    Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations by ANGPan Y, UIXiao-lin G, AOJing Y, INJian-cai L, IANFeng T, HANGXue-jun Z

    Published 2015-01-01
    “…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
    Get full text
    Article
  7. 347

    Privacy-Preserving Process Mining: A Blockchain-Based Privacy-Aware Reversible Shared Image Approach by Xianwen Fang, Mengyao Li

    Published 2024-12-01
    “…Deeper integration of cross-organizational business process sharing and process mining has advanced the Industrial Internet. Privacy breaches and data security risks limit its use. …”
    Get full text
    Article
  8. 348

    Personal Information Sharing Behavior Using Social Media by Ashraf Sharif, Shafiq Ur Rehman, Khalid Mahmood

    Published 2025-06-01
    “…The three-factor (keywords, countries and sources) revealed that the researchers of top countries used mostly six keywords (self-disclosure, social media, privacy, Facebook, social networking sites, and social support) and they preferably published in two major sources. …”
    Get full text
    Article
  9. 349

    Secured cloud-based image data processing of self-driving vehicles using full homomorphic encryption by Kamran Saeed, M.Fatih Adak

    Published 2025-10-01
    “…A novel method using full homomorphic encryption (FHE) image-based data is proposed, incorporating three different methods to search for the desired encrypted images stored in the cloud. …”
    Get full text
    Article
  10. 350

    Assessing the Fidelity and Utility of Water Systems Data Using Generative Adversarial Networks: A Technical Review by Md Nazmul Kabir Sikder, Yingjie Wang, Feras A. Batarseh

    Published 2025-01-01
    “…This review paper addresses this limitation by utilizing Generative Adversarial Networks (GANs) to generate realistic synthetic datasets, overcoming data scarcity and privacy concerns in WDSs. We review, train, and evaluate seven state-of-the-art GAN models using three multivariate time-series datasets. …”
    Get full text
    Article
  11. 351
  12. 352

    Travel Behavior during the 2021 British Columbia Floods Using De-identified Network Mobility Data by Enqi Liao, Syeda N. Zehra, Stephen D. Wong

    Published 2024-05-01
    “…This study investigates residents’ emergent travel behavior before, during, and after the 2021 British Columbia Floods. Using de-identified network mobility data, we analyze travel patterns centered around the municipality of Hope in British Columbia, Canada. …”
    Get full text
    Article
  13. 353
  14. 354
  15. 355

    Does data privacy influence digital marketing? The mediating role of AI-driven trust: An empirical study of Zain Telecom company in Jordan by Nidal Al Said

    Published 2025-01-01
    “…The PLS-SEM technique was used in this research to analyze data privacy, digital marketing effectiveness, and AI-driven trust constructs. …”
    Get full text
    Article
  16. 356

    Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption by Filip Jerkovic, Nurul I. Sarkar, Jahan Ali

    Published 2025-06-01
    “…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
    Get full text
    Article
  17. 357

    Data Obfuscation Through Latent Space Projection for Privacy-Preserving AI Governance: Case Studies in Medical Diagnosis and Finance Fraud Detection by Mahesh Vaijainthymala Krishnamoorthy

    Published 2025-03-01
    “… Abstract BackgroundThe increasing integration of artificial intelligence (AI) systems into critical societal sectors has created an urgent demand for robust privacy-preserving methods. Traditional approaches such as differential privacy and homomorphic encryption often struggle to maintain an effective balance between protecting sensitive information and preserving data utility for AI applications. …”
    Get full text
    Article
  18. 358

    Analyzing the vulnerabilities in Split Federated Learning: assessing the robustness against data poisoning attacks by Aysha-Thahsin Zahir-Ismail, Raj Shukla

    Published 2025-08-01
    “…Abstract Distributed Collaborative Machine Learning (DCML) offers a promising alternative to address privacy concerns in centralized machine learning. …”
    Get full text
    Article
  19. 359

    FedSVD: Asynchronous Federated Learning With Stale Weight Vector Decomposition by Giwon Sur, Hyejin Kim, Seunghyun Yoon, Hyuk Lim

    Published 2025-01-01
    “…Federated learning (FL) emerges as a collaborative learning framework that addresses the critical needs for privacy preservation and communication efficiency. …”
    Get full text
    Article
  20. 360

    Scalable architecture for autonomous malware detection and defense in software-defined networks using federated learning approaches by Ripal Ranpara, Shobhit K. Patel, Om Prakash Kumar, Fahad Ahmed Al-Zahrani

    Published 2025-08-01
    “…Our architecture minimizes privacy risks by ensuring that raw data never leaves the device; only model updates are shared for aggregation at the global level. …”
    Get full text
    Article