Showing 521 - 540 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.25s Refine Results
  1. 521

    Privacy-preserving method for face recognition based on homomorphic encryption. by Zhigang Song, Gong Wang, Wenqin Yang, Yunliang Li, Yinsheng Yu, Zeli Wang, Xianghan Zheng, Yang Yang

    Published 2025-01-01
    “…Performance analysis indicates that the HE_FaceNet framework successfully protects facial data privacy while maintaining high recognition accuracy, and the optimization scheme demonstrates high accuracy and significant computational efficiency across facial datasets of varying sizes.…”
    Get full text
    Article
  2. 522

    Privacy-Preserving Image Captioning with Partial Encryption and Deep Learning by Antoinette Deborah Martin, Inkyu Moon

    Published 2025-02-01
    “…In this study, a privacy-preserving image captioning framework that leverages partial encryption using Double Random Phase Encoding (DRPE) and deep learning is proposed to address privacy concerns. …”
    Get full text
    Article
  3. 523

    Efficient verifiable searchable encryption with search and access pattern privacy by Wu Axin, Feng Dengguo, Zhang Min, Chi Jialin, Zhang Yinghui

    Published 2025-01-01
    “…To address these concerns, we first design an efficient conjunctive SE scheme with search and access pattern privacy using private set intersection. In the proposed scheme, we utilize random numbers to obfuscate the values of polynomials and randomly divide the results into two parts, which simplifies the search process, improves search efficiency, and eliminates the need for time-consuming ciphertext multiplication operations. …”
    Get full text
    Article
  4. 524

    A Novel Approach for Differential Privacy-Preserving Federated Learning by Anis Elgabli, Wessam Mesbah

    Published 2025-01-01
    “…Furthermore, we propose a novel DP mechanism, which is shown to ensure privacy without compromising performance. In particular, we propose the sharing of a random seed (or a specified sequence of random seeds) among collaborative clients, where each client uses this seed to introduces perturbations to its updates prior to transmission to the PS. …”
    Get full text
    Article
  5. 525

    Patients’ perspective about synchronous teleconsultation with a general practitioner: a mixed-method systematic literature review by Gabin F. Morillon, Marlène Guillon, Maude Laberge, Alphonse Sowanou, Thomas G. Poder

    Published 2025-08-01
    “…Patient characteristics, including age, socioeconomic status, and technology familiarity, impact acceptance. Privacy concerns, data security, and diagnostic accuracy remain significant barriers. …”
    Get full text
    Article
  6. 526

    Exploring assessment methods used by Grade Four English First Additional Language Teachers by Kofi Nkonkonya Mpuangnan, Gladys Phumzile Mngomezulu, Samantha Govender

    Published 2024-06-01
    “…The researchers opted for a thematic analysis approach, allowing for a thorough examination of the data while respecting the privacy and confidentiality of the participants. …”
    Get full text
    Article
  7. 527

    Artificial intelligence methods used in various aquaculture applications: A systematic literature review by Thurein Aung, Rafiza Abdul Razak, Adibi Rahiman Bin Md Nor

    Published 2025-02-01
    “…However, the review also uncovered substantial challenges that will continue limiting widespread adoption, including restricted access to representative data, prohibitive expenses, technical complexities, lack of social acceptance, and data privacy and security concerns. …”
    Get full text
    Article
  8. 528

    Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems by Firdous Kausar, Sambrdhi Deo, Sajid Hussain, Zia Ul Haque

    Published 2024-10-01
    “…This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. …”
    Get full text
    Article
  9. 529

    Design of an improved graph-based model for real-time anomaly detection in healthcare using hybrid CNN-LSTM and federated learning by G Muni Nagamani, Chanumolu Kiran Kumar

    Published 2024-12-01
    “…This system processes over 100,000 messages per second with less than 50 ms of inference latency to enable the prompting of clinical responses. We use Federated Learning combined with Differential Privacy to solve our data security and privacy tasks. …”
    Get full text
    Article
  10. 530

    Analysis of the Obstacles to Ethical Use of Artificial Intelligence by Abbas Shoul, Mohammad Amini, Fatemeh Arabpour

    Published 2025-05-01
    “…Results: The results show that among the 6 identified barriers (lack of accountability, lack of transparency, lack of legal regulations, possibility of bias and discrimination, violation of data privacy, and violation of social justice and livelihood of individuals), the barrier of lack of transparency, followed by the lack of legal regulations, are considered to be the most important and influential barriers to the ethical use of AI. …”
    Get full text
    Article
  11. 531

    COVID-19 Tracing Apps as a Legal Problem: An Investigation of the Norwegian ‘Smittestopp’ App by Mona Naomi Lintvedt

    Published 2021-12-01
    “…This raises ethical and legal questions, as these apps have the potential to be used for surveillance of the population. There is pressure to set privacy and data protection aside to allow extensive collection and processing of personal data, while the benefits of the apps remain uncertain. …”
    Get full text
    Article
  12. 532

    Legal grounds for police officers' body-worn cameras by Milidragović Dragan, Milić Nenad, Petrović Zlatko

    Published 2025-01-01
    “…The use of these cameras is based on legal provisions which authorize police officers to record their actions, collect and process personal data. …”
    Get full text
    Article
  13. 533

    The Use of Blockchain Technology in the Food Traceability System by Cecilia Rasetto

    Published 2025-07-01
    “…To enhance clarity, the paper examines a use case related to agricultural inputs, commodities, and products in the cereals sector to illustrate the application of data collection devices and the role of blockchain technology in data validation, storage, security, and transmission. …”
    Get full text
    Article
  14. 534

    Digital evidence and its use for criminal proceedings by Jakub Matis

    Published 2025-07-01
    “…By examining these aspects, the paper contributes to a deeper understanding of how digital evidence is utilized in criminal investigations and legal proceedings, advocating for legislative updates to address the growing importance of digital data in modern criminal cases. Furthermore, it underscores the need for careful consideration of privacy rights and proportionality when dealing with personal information obtained from digital devices and online platforms. …”
    Get full text
    Article
  15. 535
  16. 536

    Assessing the Uses, Benefits, and Limitations of Digital Technologies Used by Health Professionals in Supporting Obesity and Mental Health Communication: Scoping Review by Amanda Kearns, Anne Moorhead, Maurice Mulvenna, Raymond Bond

    Published 2025-02-01
    “…MethodsA comprehensive scoping review, which followed a validated methodology, analyzed studies published between 2013 and 2023 across 8 databases. The data extraction focused on HPs’ use of communication technologies, intervention types, biopsychosocial considerations, and perceptions of technology use. …”
    Get full text
    Article
  17. 537

    Public Perceptions of Ethical Challenges and Opportunities for Enterprises in the Digital Age by Ahmad Mansour, Khaled Alshaketheep, Hind Al-Ahmed, Ahmad Shajrawi, Arafat Deeb

    Published 2025-06-01
    “…Statistical analysis demonstrated positive and significant associations: Data privacy and ethical prioritisation (t-value = 45, p < 0.001), Algorithmic ethics and ethical prioritisation (B = 0.35, p = 0.004), Factor analysis identified three critical variables: data privacy and security, ethical algorithms and workforce displacement accounted for 75% of the variance on average. …”
    Get full text
    Article
  18. 538
  19. 539

    Redefining customer connections in the UAE’s digital era: A study on emerging technological synergies by Hussam Ali, Ehab Haikal

    Published 2025-06-01
    “…This study investigates the socio-technical implications of IoT integration, particularly its effects on operational efficiency, customer engagement, digital inclusivity, ethical data practices, and sustainability. The research used a quantitative cross-sectional survey conducted from February to April 2024 across the UAE. …”
    Get full text
    Article
  20. 540

    Older people and the smart city – Developing inclusive practices to protect and serve a vulnerable population by Aaro Tupasela, Juanita Devis Clavijo, Marjut Salokannel, Christoph Fink

    Published 2023-03-01
    “…Using examples from three European locations – Helsinki, Flanders and Santander – we describe and discuss how we can gather personal data related to the daily lives of older people in terms of the existing privacy and data protection laws in the EU. …”
    Get full text
    Article