Suggested Topics within your search.
Suggested Topics within your search.
-
461
Adaptive Transformation for Robust Privacy Protection in Video Surveillance
Published 2012-01-01“…However, the current detectors are not fully reliable, leading to breaches in privacy protection. In this paper, we propose a privacy protection method that adopts adaptive data transformation involving the use of selective obfuscation and global operations to provide robust privacy even with unreliable detectors. …”
Get full text
Article -
462
Using fuzzy decision support to create a positive mental health environment for preschoolers
Published 2025-04-01“…To assess their mental health before starting school, preschoolers need early detection, intervention, and assessment. However, data shortages, heterogeneity, privacy issues, model interpretability, and generalization restrictions hamper the review process. …”
Get full text
Article -
463
Impact of Normalization Techniques on Synthetic Load Profile Generation Using Deep Generative Models
Published 2025-01-01“…However, the impact of data normalization on their performance remains insufficiently explored. …”
Get full text
Article -
464
Information Security and Privacy Management in Intelligent Transportation Systems
Published 2024-04-01“…First, the framework is used to extract data during the literature review defining state-of-the-art aspects and measures. …”
Get full text
Article -
465
Expedite Privacy-Preserving Emergency Communication Scheme for VANETs
Published 2013-05-01“…But requirements of information collection and data transmission in emergency scenario are very imperative. …”
Get full text
Article -
466
Automated redaction of names in adverse event reports using transformer-based neural networks
Published 2024-12-01“…Because the Yellow Card data contained few names, we used predictive models to select narratives for training. …”
Get full text
Article -
467
Sensitivity-Aware Differential Privacy for Federated Medical Imaging
Published 2025-04-01“…Our idea is that the sensitivity of each data sample can be objectively measured using real-world attacks. …”
Get full text
Article -
468
Federated Learning for Privacy-Preserving Employee Performance Analytics
Published 2025-01-01“…This paper introduces HFAN-Priv, a hierarchical federated attention network designed to predict employee resignation risk and evaluate performance trends without sharing raw data across organizations. The framework integrates feature-level and instance-level attention to model complex workforce patterns, applies differential privacy through gradient masking to ensure compliance with data protection regulations, and enhances interpretability using local SHAP and LIME explanations. …”
Get full text
Article -
469
DEBPIR: enhancing information privacy in decentralized business modeling
Published 2025-05-01“…Abstract Business modelling often involves extensive data collection and analysis, raising concerns about privacy infringement. …”
Get full text
Article -
470
Privacy for Process Mining: A Systematic Literature Review
Published 2025-01-01“…However, privacy preservation issues arise when handling such data. …”
Get full text
Article -
471
-
472
Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward
Published 2020-01-01“…The decentralized database in BT emphasizes data security and privacy. Also, the consensus mechanism in it makes sure that data is secured and legitimate. …”
Get full text
Article -
473
A Comprehensive Review of Cryptographic Techniques in Federated Learning for Secure Data Sharing and Applications
Published 2025-01-01“…This study therefore reviews those aspects that might provide useful insights to researchers and practitioners in the development of secure, scalable, and computationally efficient FL systems, and hence facilitate their practical implementation in privacy-sensitive domains.…”
Get full text
Article -
474
The Nature of the Right to Personal Data: A Civil Law Perspective
Published 2024-11-01“…This paper aims to examine the nature of the right to personal data. Based on an analysis of Russian legislation, the Author concludes that there exists an unnamed, independent subjective right, which serves to enable the data subject to control and define the conditions for data processing, as well as to protect personal data from unauthorized use. …”
Get full text
Article -
475
Trajectory differential privacy protection mechanism based on prediction and sliding window
Published 2020-04-01“…To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security,and service similarity map was introduced to detect the availability of the location.If the prediction was successful,the prediction location was directly used to replace the location of differential disturbance,to reduce the privacy cost of continuous query and improve the quality of service.Based on this,the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition,a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location,the privacy budget could be customized to improve its utilization.Finally,the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.…”
Get full text
Article -
476
Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance
Published 2025-05-01“…The performance depends on factors such as Recall, Ranking Privacy, Precision, Searching Speed. The proposed algorithm efficiently retrieves the required data maintaining the privacy and identifies the relevant data at high accuracy and optimal speed. …”
Get full text
Article -
477
New blockchain consensus algorithm applied on healthcare industry: Proof of Visit- (POV)
Published 2025-04-01“…In this study, it is proposed to share EHR using blockchain infrastructure and to prepare a consensus algorithm specifically for health data on the blockchain. …”
Get full text
Article -
478
Advancing Early Detection of Major Depressive Disorder Using Multisite Functional Magnetic Resonance Imaging Data: Comparative Analysis of AI Models
Published 2025-07-01“…MethodsWe used functional magnetic resonance imaging data from 1200 participants (600 with early-stage MDD and 600 healthy controls) across 3 public datasets. …”
Get full text
Article -
479
-
480
ChildDiffusion: Unlocking the Potential of Generative AI and Controllable Augmentations for Child Facial Data Using Stable Diffusion and Large Language Models
Published 2025-01-01“…In this research, we propose the ChildDiffusion framework, designed to generate photorealistic child facial data using diffusion models. The framework integrates intelligent augmentations via short text prompts, employs various image samplers, and leverages ControlNet for enhanced model conditioning. …”
Get full text
Article