Suggested Topics within your search.
Suggested Topics within your search.
-
401
On the edge of glory (…or catastrophe): regulation, transparency and party democracy in data-driven campaigning in Québec
Published 2019-12-01“…They have all massively integrated data-driven campaigning practices. This article identifies factors that could explain the increasing pressure to regulate Québec’s political parties’ uses of large sets of digital voter information. …”
Get full text
Article -
402
PERSONAL DATA PROTECTION ISSUE REFLECTED IN THE CASE-LAW OF THE CONSTITUTIONAL COURT OF ROMANIA
Published 2019-05-01“…Over the past few years, data privacy became more and more an issue that stirred on European level lots of debates and determined the adoption of a new set of rules, imposed with the compulsory force of a European regulation. …”
Get full text
Article -
403
A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum
Published 2024-12-01“…The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. …”
Get full text
Article -
404
SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications
Published 2025-04-01“…Based on requirements, the control center decrypts the aggregated data using its private key. Employing the Paillier cryptosystem for encryption and RSA for authentication, SAFED is fault-tolerant, maintaining functionality even if some IoT nodes fail. …”
Get full text
Article -
405
Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem
Published 2025-06-01“…The protocol uses the additive homomorphism property of the Paillier cryptosystem to perform K-means clustering on the encrypted data, which ensures the confidentiality of the data during the whole calculation process. …”
Get full text
Article -
406
-
407
BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management
Published 2025-01-01“…Managing posthumous data is becoming an increasingly complex challenge, with many existing technical solutions proving impractical in real-world applications. …”
Get full text
Article -
408
Wasserstein GAN for moving differential privacy protection
Published 2025-06-01“…Abstract Training machine learning models often requires large datasets, but using sensitive data for training poses risks of privacy leakage. …”
Get full text
Article -
409
Protecting contacts against privacy leaks in smartphones.
Published 2018-01-01Get full text
Article -
410
Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring
Published 2024-12-01“…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
Get full text
Article -
411
Privacy-Preserving Federated Class-Incremental Learning
Published 2024-01-01“…For privacy protection, we use Bayesian differential privacy to provide more balanced privacy protection for different datasets. …”
Get full text
Article -
412
Marketing Implications of Information Society Privacy Concerns
Published 2012-12-01“…The Internet has facilitated access to intimate user knowledge for both official and private agents and most of modern marketing strategies are based on a wealth of personal user data used to target its specific needs and expectations, a process that has its obvious pros and cons, which have been heavily debated intensively in both academic and social venues. …”
Get full text
Article -
413
An Enhanced Communication Protocol for Location Privacy in WSN
Published 2015-04-01“…WSN is used in many applications, such as object tracking and security monitoring. …”
Get full text
Article -
414
-
415
Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System
Published 2025-06-01“…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
Get full text
Article -
416
Privacy protection scheme for mobile social network
Published 2022-07-01“…One way to protect one’s privacy is using encryption. Therefore, in the present paper, an improved secure design was presented for mobile social network using ciphertext-policy attribute-based encryption (CP-ABE) and advanced encryption standard (AES) that will encrypt users data in an end-to-end manner. …”
Get full text
Article -
417
Privacy-preserving task matching scheme for crowdsourcing
Published 2025-05-01“…Due to the potential untrustworthiness of crowdsourcing platforms, which may lead to the leakage of users’ private information, users are required to encrypt their data prior to uploading. To fulfill task matching while preserving privacy, the crowdsourcing platform employs encrypted spatial keyword queries to perform task matching of workers’ interests and locations. …”
Get full text
Article -
418
FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer
Published 2024-01-01“…After aggregating the model parameters sent by clients, the server performs a second iterative training on the aggregated model using its own metadata, thereby reducing data heterogeneity and improving model performance. …”
Get full text
Article -
419
Privacy-preserving maximum value determination scheme
Published 2025-07-01“…This paper introduces a quantum-secure scheme for conducting privacy-preserving maximum value determination, allowing the parties to ascertain the highest value from their confidential inputs while keeping non-maximum data private. …”
Get full text
Article -
420
Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data
Published 2025-07-01“…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
Get full text
Article