Suggested Topics within your search.
Suggested Topics within your search.
-
641
Cyber-Biosecurity Challenges in Next-Generation Sequencing: A Comprehensive Analysis of Emerging Threat Vectors
Published 2025-01-01“…Genomic data is inherently sensitive, and vulnerabilities in NGS technologies, software, data-sharing practices, and open-access databases expose it to risks concerning data confidentiality, integrity, and privacy. …”
Get full text
Article -
642
A Systematic Literature Review on Privacy Preservation in VANETs: Trends, Challenges, and Future Directions
Published 2025-01-01“…Privacy preservation is a fundamental requirement in vehicular ad hoc networks (VANETs) because it addresses sensitive vehicle and driver data. …”
Get full text
Article -
643
FL-QNNs: Memory Efficient and Privacy Preserving Framework for Peripheral Blood Cell Classification
Published 2025-01-01“…Then implement the federated learning (FL) framework with IID (Independent and identically distributed) and Non-IID datasets maintain similar results by preserving data. Further FL-QNNs approach is used with these baseline models and achieved 98-99% accuracy and while optimizing memory, preserving data and resources. …”
Get full text
Article -
644
An Evaluation on the Potential of Large Language Models for Use in Trauma Triage
Published 2024-10-01“…Overall, the literature highlights multifaceted applications of LLMs, especially in emergency trauma settings, albeit with clear limitations and ethical considerations, such as artificial hallucinations, biased outputs and data privacy issues. There remains room for more rigorous research into refining the consistency and capabilities of LLMs, ensuring their effective integration in real-world trauma triaging to improve patient outcomes and resource utilisation.…”
Get full text
Article -
645
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…Deep learning and fully homomorphic encryption (FHE) are integrated for privacy-preserving fingerprint recognition. Convolutional neural network (CNN) extract fingerprint features encrypted using the Cheon-Kim-Kim-Song (CKKS) FHE scheme. …”
Get full text
Article -
646
Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation
Published 2025-03-01“…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
Get full text
Article -
647
PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation
Published 2021-12-01“…To significantly protect the user’s privacy and prevent the user’s preference disclosure from leading to malicious entrapment, we present a combination of the recommendation algorithm and the privacy protection mechanism. …”
Get full text
Article -
648
How Differential Privacy Will Affect Estimates of Air Pollution Exposure and Disparities in the United States
Published 2023-05-01“…Using 2010 demonstration census and pollution data, I find that compared to the original census, differentially private (DP) census significantly changes ambient pollution exposure in areas with sparse populations. …”
Get full text
Article -
649
Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis
Published 2023-09-01“…By integrating our protocols with privacy matrix techniques, the cloud server can generate a comprehensive diagnostic model from multiple data sources, offering accurate diagnosis services without disclosing any users’ personal information. …”
Get full text
Article -
650
Cancelable Multi-Branch Deep Learning Framework for Privacy-Preserving ECG Biometric Authentication
Published 2025-01-01“…However, storing and processing raw ECG data raises privacy and security concerns, requiring advanced methods to safeguard user data. …”
Get full text
Article -
651
SynAdult: Multimodal Synthetic Adult Dataset Generation via Diffusion Models and Neuromorphic Event Simulation for Critical Biometric Applications
Published 2025-01-01“…We propose SynAdult, a multimodal synthetic data generation framework designed to address the scarcity of diverse and privacy-compliant senior adult face datasets for biometric applications and facial analysis. …”
Get full text
Article -
652
Failure of affine‐based reconstruction attack in regenerating vascular feature points
Published 2021-09-01Get full text
Article -
653
LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Published 2025-04-01“…Federated learning is leveraged to enable collaborative model training across multiple IoT networks while maintaining data privacy and reducing vulnerability to data poisoning. …”
Get full text
Article -
654
Legal Barriers in Developing Educational Technology
Published 2025-03-01“…Through a comparative legal analysis of domestic and international laws, the study sheds light on the legal frameworks affecting technology integration in education. Data privacy issues arise from the sensitive information collected in educational settings, while intellectual property challenges relate to protecting and fairly using digital content and software. …”
Get full text
Article -
655
The ethics of using artificial intelligence in medical research
Published 2024-12-01Get full text
Article -
656
Enhancing Privacy by Large Mask Inpainting and Fusion-Based Segmentation in Street View Imagery
Published 2025-08-01“…Despite its reliance on accurate sensor calibration and multimodal data availability, the proposed framework offers a scalable solution for privacy-sensitive applications such as urban mapping, and virtual tourism, delivering high-quality anonymized imagery with minimal artifacts.…”
Get full text
Article -
657
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning
Published 2023-12-01“…In this paper, we design a new privacy protection framework (BFG) for decentralized FL using blockchain, differential privacy and Generative Adversarial Network. …”
Get full text
Article -
658
Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing
Published 2025-01-01“…This paper introduces a Federated Learning Trust Model (FLTM) to assess trustworthiness across 2000 resources while preserving data privacy. FLTM incorporates six critical metrics: Availability, Reliability, Data Integrity, Identity, Computational Capability, and Throughput. …”
Get full text
Article -
659
-
660