Suggested Topics within your search.
Suggested Topics within your search.
-
421
Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program.
Published 2025-01-01“…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
Get full text
Article -
422
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
Get full text
Article -
423
PERSONAL DATA PROTECTION IN CRIMINAL PROCEEDINGS
Published 2025-03-01“…The most vulnerable to these factors are the privacy and personal data of participants in criminal proceedings. …”
Get full text
Article -
424
Revolutionizing healthcare data analytics with federated learning: A comprehensive survey of applications, systems, and future directions
Published 2025-01-01“…In general, through systematic categorization and analysis of existing FL systems, we offer insights to design efficient, accurate, and privacy-preserving healthcare applications using cutting-edge FL techniques.…”
Get full text
Article -
425
Neurorights, Neurotechnologies and Personal Data: Review of the Challenges of Mental Autonomy
Published 2024-11-01“…Thorough searches were carried out with the search terms “neurotechnology”, “personal data”, “mental privacy”, “neuro-rights”, “neurotechnological interventions”, and “neurotechnological discrimination” on both English and Spanish sites, using search engines like Google Scholar and Redib as well as databases including Scielo, Dialnet, Redalyc, Lilacs, Scopus, Medline, and Pubmed. …”
Get full text
Article -
426
Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews
Published 2025-06-01“…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
Get full text
Article -
427
Self-sovereign management scheme of personal health record with personal data store and decentralized identifier
Published 2025-01-01“…Conventional personal health record (PHR) management systems are centralized, making them vulnerable to privacy breaches and single points of failure. Despite progress in standardizing healthcare data with the FHIR format, hospitals often lack efficient platforms for transferring PHRs, leading to redundant tests and delayed treatments. …”
Get full text
Article -
428
Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure
Published 2025-06-01“…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
Get full text
Article -
429
When Two are Better Than One: Synthesizing Heavily Unbalanced Data
Published 2021-01-01“…However, they need to fully comply with not only ethical but also regulatory obligations, where, e.g., privacy (strictly) needs to be respected when using or sharing data, thus protecting both the interests of users and organizations. …”
Get full text
Article -
430
Lessons Learned From European Health Data Projects With Cancer Use Cases: Implementation of Health Standards and Internet of Things Semantic Interoperability
Published 2025-03-01“…These initiatives aim to enhance the analysis of heterogeneous health data while aligning with EHDS implementation, specifically for the EHDS for the secondary use of data (EHDS2). …”
Get full text
Article -
431
Proposed ethical framework for software requirements engineering
Published 2023-08-01Get full text
Article -
432
-
433
Advanced Zero-Shot Learning (AZSL) Framework for Secure Model Generalization in Federated Learning
Published 2024-01-01“…The objective of the proposed model is to increase model generalizability while achieving better performance on various and heterogeneous datasets while preserving data privacy. We have used datasets named MNIST, CIFAR-10, and FEMNIST to measure the model’s accuracy, precision, and generalization capability. …”
Get full text
Article -
434
Secure and Lightweight Cipher for Resource-constrained IoT Healthcare Applications using Snake Key Generation
Published 2025-03-01“…Furthermore, this study examines the double-layer encryption architecture used to secure data in at rest and during transmission from a sensor’s gathering location to long-term storage. …”
Get full text
Article -
435
The Adoption of Virtual Fitting Rooms in Iranian Sportswear Industries: A Mixed-Methods Study Based on TAM Model
Published 2024-02-01“…Structural equation modelling was used to test the hypotheses. SMART PLS and SPSS 23 software were used for data analysis.Findings: The results supported the positive effect of the factors perceived ease of use, perceived usefulness, perceived enjoyment, and fashion leadership, as well as the negative impact of technology anxiety on adopting this technology. …”
Get full text
Article -
436
Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification
Published 2024-12-01“…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
Get full text
Article -
437
A content review of COVID-19-related apps used in Vietnam
Published 2025-02-01“…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
Get full text
Article -
438
A remote sensing encrypted data search method based on a novel double-chain
Published 2023-12-01“…However, with the rapid urbanisation and the increase in data capacity, how to store and retrieve remote sensing data which have more potential value and privacy with a more effective and safe method has become an imminent issue. …”
Get full text
Article -
439
-
440
TrapMI: A Data Protection Method to Resist Model Inversion Attacks in Split Learning
Published 2025-01-01“…However, concerns remain regarding data privacy leakage because an attacker can still attempt model inversion attacks based on the intermediate features. …”
Get full text
Article