Showing 421 - 440 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.20s Refine Results
  1. 421

    Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program. by Khumbo Shumba, Jacob Bor, Cornelius Nattey, Dickman Gareta, Evelyn Lauren, William Macleod, Matthew P Fox, Adrian Puren, Koleka Mlisana, Dorina Onoya

    Published 2025-01-01
    “…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
    Get full text
    Article
  2. 422

    Study on privacy preserving encrypted traffic detection by Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN

    Published 2021-08-01
    “…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
    Get full text
    Article
  3. 423

    PERSONAL DATA PROTECTION IN CRIMINAL PROCEEDINGS by SMOLKOVA Iraida Vyacheslavovna

    Published 2025-03-01
    “…The most vulnerable to these factors are the privacy and personal data of participants in criminal proceedings. …”
    Get full text
    Article
  4. 424

    Revolutionizing healthcare data analytics with federated learning: A comprehensive survey of applications, systems, and future directions by Nisha Thorakkattu Madathil, Fida K. Dankar, Marton Gergely, Abdelkader Nasreddine Belkacem, Saed Alrabaee

    Published 2025-01-01
    “…In general, through systematic categorization and analysis of existing FL systems, we offer insights to design efficient, accurate, and privacy-preserving healthcare applications using cutting-edge FL techniques.…”
    Get full text
    Article
  5. 425

    Neurorights, Neurotechnologies and Personal Data: Review of the Challenges of Mental Autonomy by Y. Cornejo

    Published 2024-11-01
    “…Thorough searches were carried out with the search terms “neurotechnology”, “personal data”, “mental privacy”, “neuro-rights”, “neurotechnological interventions”, and “neurotechnological discrimination” on both English and Spanish sites, using search engines like Google Scholar and Redib as well as databases including Scielo, Dialnet, Redalyc, Lilacs, Scopus, Medline, and Pubmed. …”
    Get full text
    Article
  6. 426

    Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews by Sabrina Fesl, Caroline Lang, Jochen Schmitt, Stefanie Brückner, Stephen Gilbert, Stefanie Deckert, Madlen Scheibe

    Published 2025-06-01
    “…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
    Get full text
    Article
  7. 427

    Self-sovereign management scheme of personal health record with personal data store and decentralized identifier by Tong Min Kim, Taehoon Ko, Byoung Woo Hwang, Hyung Goo Paek, Wan Yeon Lee

    Published 2025-01-01
    “…Conventional personal health record (PHR) management systems are centralized, making them vulnerable to privacy breaches and single points of failure. Despite progress in standardizing healthcare data with the FHIR format, hospitals often lack efficient platforms for transferring PHRs, leading to redundant tests and delayed treatments. …”
    Get full text
    Article
  8. 428

    Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure by Alex Dhima, Soumya Choudhary, Keris Myrick, John Torous

    Published 2025-06-01
    “…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
    Get full text
    Article
  9. 429

    When Two are Better Than One: Synthesizing Heavily Unbalanced Data by Francisco Ferreira, Nuno Lourenco, Bruno Cabral, Joao Paulo Fernandes

    Published 2021-01-01
    “…However, they need to fully comply with not only ethical but also regulatory obligations, where, e.g., privacy (strictly) needs to be respected when using or sharing data, thus protecting both the interests of users and organizations. …”
    Get full text
    Article
  10. 430
  11. 431
  12. 432
  13. 433

    Advanced Zero-Shot Learning (AZSL) Framework for Secure Model Generalization in Federated Learning by Muhammad Asif, Surayya Naz, Faheem Ali, Amerah Alabrah, Abdu Salam, Farhan Amin, Faizan Ullah

    Published 2024-01-01
    “…The objective of the proposed model is to increase model generalizability while achieving better performance on various and heterogeneous datasets while preserving data privacy. We have used datasets named MNIST, CIFAR-10, and FEMNIST to measure the model’s accuracy, precision, and generalization capability. …”
    Get full text
    Article
  14. 434

    Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation by Saja Kareem Ismael, Mohamed Ibrahim Shujaa, Ahmed Bahaaulddin A. Alwahhab

    Published 2025-03-01
    “…Furthermore, this study examines the double-layer encryption architecture used to secure data in at rest and during transmission from a sensor’s gathering location to long-term storage. …”
    Get full text
    Article
  15. 435

    The Adoption of Virtual Fitting Rooms in Iranian Sportswear Industries: A Mixed-Methods Study Based on TAM Model by Seyyed Iman Ghaffarisadr, Farzad Nobakht Sareban

    Published 2024-02-01
    “…Structural equation modelling was used to test the hypotheses. SMART PLS and SPSS 23 software were used for data analysis.Findings: The results supported the positive effect of the factors perceived ease of use, perceived usefulness, perceived enjoyment, and fashion leadership, as well as the negative impact of technology anxiety on adopting this technology. …”
    Get full text
    Article
  16. 436

    Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification by Mbarek Marwan, Abdelkarim Ait Temghart, Said Ouhmi, Mohamed Lazaar

    Published 2024-12-01
    “…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
    Get full text
    Article
  17. 437

    A content review of COVID-19-related apps used in Vietnam by Linh Tran, Federica Cucé, Nguyen Thanh An, Kadek Agus Surya Dila, Nguyen Hai Nam, Doan Le Nguyet Cat, Lee Wei Jun, Farrukh Ansar, Fatima Abdallh, Au Vo, Nguyen Tien Huy

    Published 2025-02-01
    “…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
    Get full text
    Article
  18. 438

    A remote sensing encrypted data search method based on a novel double-chain by Xixi Yan, Pei Yin, Yongli Tang, Suwei Feng

    Published 2023-12-01
    “…However, with the rapid urbanisation and the increase in data capacity, how to store and retrieve remote sensing data which have more potential value and privacy with a more effective and safe method has become an imminent issue. …”
    Get full text
    Article
  19. 439
  20. 440

    TrapMI: A Data Protection Method to Resist Model Inversion Attacks in Split Learning by Hyunsik Na, Daeseon Choi

    Published 2025-01-01
    “…However, concerns remain regarding data privacy leakage because an attacker can still attempt model inversion attacks based on the intermediate features. …”
    Get full text
    Article