Showing 41 - 60 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.12s Refine Results
  1. 41
  2. 42

    Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU by Pascal Riedel, Kaouther Belkilani, Manfred Reichert, Gerd Heilscher, Reinhold von Schwerin

    Published 2024-12-01
    “…We propose a bottom-up, privacy-preserving prediction method using differential privacy (DP) to enhance data privacy for energy analytics on the customer side. …”
    Get full text
    Article
  3. 43
  4. 44
  5. 45

    Privacy Centric Offline Chatbot using Large Language Models by K. Anjali, K. Vipunsai, K. Ruchitha, M. Bhavani, Ch. China Subba Reddy

    Published 2025-07-01
    “…They also might collect and store the data leading to privacy breaches. This research paper focuses on these problems. …”
    Get full text
    Article
  6. 46
  7. 47
  8. 48

    A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network by Jia Jia, Sathiya Sekar Kumarasamy, Kiran Sree Pokkuluri, K. Suresh Kumar, Thella Preethi Priyanka, Feng Wang

    Published 2024-01-01
    “…So, in our model after completing the node authentication and trust detection, privacy preservation of data is performed using Optimal Key-aided Data Sanitization (OPDS). …”
    Get full text
    Article
  9. 49

    Survey of split learning data privacy by QIN Yiqun, MA Xiaojing, FU Jiayun, HU Pingyi, XU Peng, JIN Hai

    Published 2024-06-01
    “…In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. …”
    Get full text
    Article
  10. 50

    Can Synthetic Data Protect Privacy? by Gidan Min, Junhyoung Oh

    Published 2025-01-01
    “…To systematically evaluate the privacy protection performance of synthetic data generation algorithms (Synthpop, CTGAN, RTVAE, TVAE, DataSynthesizer), this study applied various safety metrics. …”
    Get full text
    Article
  11. 51

    Privacy-Preserving Clinical Decision Support for Emergency Triage Using LLMs: System Architecture and Real-World Evaluation by Alper Karamanlıoğlu, Berkan Demirel, Onur Tural, Osman Tufan Doğan, Ferda Nur Alpaslan

    Published 2025-07-01
    “…We evaluate the system through two studies: (1) a benchmark of 750+ USMLE-style questions validating the medical reasoning of fine-tuned LLMs; and (2) a real-world case study (<i>n</i> = 132, 75.8% first-pass agreement) using de-identified MIMIC-III data to assess triage accuracy and responsiveness. …”
    Get full text
    Article
  12. 52
  13. 53

    Revisiting the use and effectiveness of patient-held records in rural Malawi by Amelia Taylor, Paul Kazembe

    Published 2025-06-01
    “…Aim This paper assessed their use and effectiveness within the health data ecosystem, and their potential impact on patient care. …”
    Get full text
    Article
  14. 54

    Adaptive personalized privacy-preserving data collection scheme with local differential privacy by Haina Song, Hua Shen, Nan Zhao, Zhangqing He, Wei Xiong, Minghu Wu, Mingwu Zhang

    Published 2024-04-01
    “…Local differential privacy (LDP) is a state-of-the-art privacy notion that enables terminal participants to share their private data safely while controlling the privacy disclosure at the source. …”
    Get full text
    Article
  15. 55

    Developing a Model for Protecting the Privacy of Internet Customers in the Field of Health by Zahra Sharifi, Mohammad Ali Keramati, Mehrzad Minooei

    Published 2024-10-01
    “…In this area, there is sensitive and personal information, and privacy can increase customers’ trust in companies and create a stronger relationship between them.Methods: The target sample was chosen using a criterion-oriented purposeful sampling method. …”
    Get full text
    Article
  16. 56
  17. 57

    Privacy Auditing of Lithium-Ion Battery Ageing Model by Recovering Time-Series Data Using Gradient Inversion Attack in Federated Learning by Kaspars Sudars, Ivars Namatevs, Arturs Nikulins, Kaspars Ozols

    Published 2025-05-01
    “…The exchange of gradients is a widely used method in modelling systems for machine learning (e.g., distributed training, federated learning) in privacy-sensitive domains. …”
    Get full text
    Article
  18. 58
  19. 59

    A Hybrid Framework for Enhancing Privacy in Blockchain-Based Personal Data Sharing using Off-Chain Storage and Zero-Knowledge Proofs by Godwin Mandinyenya, Vusumuzi Malele

    Published 2025-06-01
    “…However, its widespread adoption is constrained by challenges such as limited scalability, privacy concerns, and conflicts with regulatory frameworks like the General Data Protection Regulation (GDPR). …”
    Get full text
    Article
  20. 60

    Privacy-utility tradeoff method using multi-variable source coding by Yong-hao GU, Jiu-chuan LIN

    Published 2015-12-01
    “…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
    Get full text
    Article