Suggested Topics within your search.
Suggested Topics within your search.
-
41
A survey of individuals’ willingness to share real-world data postmortem with researchers
Published 2024-01-01Subjects: “…Data use…”
Get full text
Article -
42
Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU
Published 2024-12-01“…We propose a bottom-up, privacy-preserving prediction method using differential privacy (DP) to enhance data privacy for energy analytics on the customer side. …”
Get full text
Article -
43
Data driven healthcare insurance system using machine learning and blockchain technologies
Published 2025-07-01Get full text
Article -
44
Blockchain Approach for Healthcare Using Fog Topology and Lightweight Consensus
Published 2025-01-01Get full text
Article -
45
Privacy Centric Offline Chatbot using Large Language Models
Published 2025-07-01“…They also might collect and store the data leading to privacy breaches. This research paper focuses on these problems. …”
Get full text
Article -
46
-
47
-
48
A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network
Published 2024-01-01“…So, in our model after completing the node authentication and trust detection, privacy preservation of data is performed using Optimal Key-aided Data Sanitization (OPDS). …”
Get full text
Article -
49
Survey of split learning data privacy
Published 2024-06-01“…In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. …”
Get full text
Article -
50
Can Synthetic Data Protect Privacy?
Published 2025-01-01“…To systematically evaluate the privacy protection performance of synthetic data generation algorithms (Synthpop, CTGAN, RTVAE, TVAE, DataSynthesizer), this study applied various safety metrics. …”
Get full text
Article -
51
Privacy-Preserving Clinical Decision Support for Emergency Triage Using LLMs: System Architecture and Real-World Evaluation
Published 2025-07-01“…We evaluate the system through two studies: (1) a benchmark of 750+ USMLE-style questions validating the medical reasoning of fine-tuned LLMs; and (2) a real-world case study (<i>n</i> = 132, 75.8% first-pass agreement) using de-identified MIMIC-III data to assess triage accuracy and responsiveness. …”
Get full text
Article -
52
-
53
Revisiting the use and effectiveness of patient-held records in rural Malawi
Published 2025-06-01“…Aim This paper assessed their use and effectiveness within the health data ecosystem, and their potential impact on patient care. …”
Get full text
Article -
54
Adaptive personalized privacy-preserving data collection scheme with local differential privacy
Published 2024-04-01“…Local differential privacy (LDP) is a state-of-the-art privacy notion that enables terminal participants to share their private data safely while controlling the privacy disclosure at the source. …”
Get full text
Article -
55
Developing a Model for Protecting the Privacy of Internet Customers in the Field of Health
Published 2024-10-01“…In this area, there is sensitive and personal information, and privacy can increase customers’ trust in companies and create a stronger relationship between them.Methods: The target sample was chosen using a criterion-oriented purposeful sampling method. …”
Get full text
Article -
56
A Privacy-Preserving RL-Based Secure Charging Coordinator Using Efficient FL for Smart Grid Home Batteries
Published 2025-02-01Get full text
Article -
57
Privacy Auditing of Lithium-Ion Battery Ageing Model by Recovering Time-Series Data Using Gradient Inversion Attack in Federated Learning
Published 2025-05-01“…The exchange of gradients is a widely used method in modelling systems for machine learning (e.g., distributed training, federated learning) in privacy-sensitive domains. …”
Get full text
Article -
58
-
59
A Hybrid Framework for Enhancing Privacy in Blockchain-Based Personal Data Sharing using Off-Chain Storage and Zero-Knowledge Proofs
Published 2025-06-01“…However, its widespread adoption is constrained by challenges such as limited scalability, privacy concerns, and conflicts with regulatory frameworks like the General Data Protection Regulation (GDPR). …”
Get full text
Article -
60
Privacy-utility tradeoff method using multi-variable source coding
Published 2015-12-01“…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
Get full text
Article