Showing 401 - 420 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.24s Refine Results
  1. 401

    On the edge of glory (…or catastrophe): regulation, transparency and party democracy in data-driven campaigning in Québec by Eric Montigny, Philippe Dubois, Thierry Giasson

    Published 2019-12-01
    “…They have all massively integrated data-driven campaigning practices. This article identifies factors that could explain the increasing pressure to regulate Québec’s political parties’ uses of large sets of digital voter information. …”
    Get full text
    Article
  2. 402

    PERSONAL DATA PROTECTION ISSUE REFLECTED IN THE CASE-LAW OF THE CONSTITUTIONAL COURT OF ROMANIA by Valentina BĂRBĂȚEANU

    Published 2019-05-01
    “…Over the past few years, data privacy became more and more an issue that stirred on European level lots of debates and determined the adoption of a new set of rules, imposed with the compulsory force of a European regulation. …”
    Get full text
    Article
  3. 403

    A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum by Janis Judvaitis, Eduards Blumbergs, Audris Arzovs, Andris Ivars Mackus, Rihards Balass, Leo Selavo

    Published 2024-12-01
    “…The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. …”
    Get full text
    Article
  4. 404

    SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications by Zaineb Naaz, Gamini Joshi, Vidushi Sharma

    Published 2025-04-01
    “…Based on requirements, the control center decrypts the aggregated data using its private key. Employing the Paillier cryptosystem for encryption and RSA for authentication, SAFED is fault-tolerant, maintaining functionality even if some IoT nodes fail. …”
    Get full text
    Article
  5. 405

    Secure K-Means Clustering Scheme for Confidential Data Based on Paillier Cryptosystem by Zhengqi Zhang, Zixin Xiong, Jun Ye

    Published 2025-06-01
    “…The protocol uses the additive homomorphism property of the Paillier cryptosystem to perform K-means clustering on the encrypted data, which ensures the confidentiality of the data during the whole calculation process. …”
    Get full text
    Article
  6. 406
  7. 407

    BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management by Xinzhang Chen, Arash Shaghaghi, Jesse Laeuchli, Salil S. Kanhere

    Published 2025-01-01
    “…Managing posthumous data is becoming an increasingly complex challenge, with many existing technical solutions proving impractical in real-world applications. …”
    Get full text
    Article
  8. 408

    Wasserstein GAN for moving differential privacy protection by Enze Liu, Zhiguang Chu, Xing Zhang

    Published 2025-06-01
    “…Abstract Training machine learning models often requires large datasets, but using sensitive data for training poses risks of privacy leakage. …”
    Get full text
    Article
  9. 409
  10. 410

    Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring by Kalashtari Niloofar, Huhs Niklas, Kraitl Jens, Hornberger Christoph, Simanski Olaf

    Published 2024-12-01
    “…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
    Get full text
    Article
  11. 411

    Privacy-Preserving Federated Class-Incremental Learning by Jue Xiao, Xueming Tang, Songfeng Lu

    Published 2024-01-01
    “…For privacy protection, we use Bayesian differential privacy to provide more balanced privacy protection for different datasets. …”
    Get full text
    Article
  12. 412

    Marketing Implications of Information Society Privacy Concerns by Gheorghe ORZAN, Călin VEGHEŞ, Cătălin SILVESTRU, Mihai ORZAN, Ramona BERE

    Published 2012-12-01
    “…The Internet has facilitated access to intimate user knowledge for both official and private agents and most of modern marketing strategies are based on a wealth of personal user data used to target its specific needs and expectations, a process that has its obvious pros and cons, which have been heavily debated intensively in both academic and social venues. …”
    Get full text
    Article
  13. 413

    An Enhanced Communication Protocol for Location Privacy in WSN by Abdel-Shakour Abuzneid, Tarek Sobh, Miad Faezipour

    Published 2015-04-01
    “…WSN is used in many applications, such as object tracking and security monitoring. …”
    Get full text
    Article
  14. 414
  15. 415

    Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System by Pape Latyr Faye

    Published 2025-06-01
    “…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
    Get full text
    Article
  16. 416

    Privacy protection scheme for mobile social network by Seyyed Mohammad Safi, Ali Movaghar, Mohammad Ghorbani

    Published 2022-07-01
    “…One way to protect one’s privacy is using encryption. Therefore, in the present paper, an improved secure design was presented for mobile social network using ciphertext-policy attribute-based encryption (CP-ABE) and advanced encryption standard (AES) that will encrypt users data in an end-to-end manner. …”
    Get full text
    Article
  17. 417

    Privacy-preserving task matching scheme for crowdsourcing by SONG Fuyuan, DING Siyang, WANG Wei, JIANG Qin, FU Zhangjie

    Published 2025-05-01
    “…Due to the potential untrustworthiness of crowdsourcing platforms, which may lead to the leakage of users’ private information, users are required to encrypt their data prior to uploading. To fulfill task matching while preserving privacy, the crowdsourcing platform employs encrypted spatial keyword queries to perform task matching of workers’ interests and locations. …”
    Get full text
    Article
  18. 418

    FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer by Dongyan Wang, Limin Chen, Xiaotong Lu, Yidi Wang, Yue Shen, Jingjing Xu

    Published 2024-01-01
    “…After aggregating the model parameters sent by clients, the server performs a second iterative training on the aggregated model using its own metadata, thereby reducing data heterogeneity and improving model performance. …”
    Get full text
    Article
  19. 419

    Privacy-preserving maximum value determination scheme by Min Hou, Min Hou, Yue Wu

    Published 2025-07-01
    “…This paper introduces a quantum-secure scheme for conducting privacy-preserving maximum value determination, allowing the parties to ascertain the highest value from their confidential inputs while keeping non-maximum data private. …”
    Get full text
    Article
  20. 420

    Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data by Hendra Lijaya, Patricia Ho, Handri Santoso

    Published 2025-07-01
    “…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
    Get full text
    Article