Showing 701 - 720 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.23s Refine Results
  1. 701

    Characterizing user mobility using mobile sensing systems by Sébastien Faye, Walter Bronzi, Ibrahim Tahirou, Thomas Engel

    Published 2017-08-01
    “…Furthermore, we detail the need to use methods that respect the privacy of users and investigate the possibilities offered by network traces, including Wi-Fi and Bluetooth communication technologies. …”
    Get full text
    Article
  2. 702
  3. 703

    THE POSSIBILITY OF USING ELECTRONIC MEDICAL RECORDS FOR CLINICAL OBSERVATION by R. D. Kurbanov, R. Kh. Trigulova

    Published 2021-05-01
    “…Of course, there are problems and obstacles to expanding the use of EMC, and one of the solutions to these obstacles is to address issues of semantic compatibility, privacy, and security. …”
    Get full text
    Article
  4. 704

    FFM: Flood Forecasting Model Using Federated Learning by Muhammad Shoaib Farooq, Rabia Tehseen, Junaid Nasir Qureshi, Uzma Omer, Rimsha Yaqoob, Hafiz Abdullah Tanweer, Zabihullah Atal

    Published 2023-01-01
    “…Federated Learning is the most advanced technique of machine learning (ML) that guarantees data privacy, ensures data availability, promises data security, and handles network latency trials inherent in prediction of floods by prohibiting data to be transferred over the network for model training. …”
    Get full text
    Article
  5. 705
  6. 706

    Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communic... by Abel C. H. Chen

    Published 2025-01-01
    “…The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. …”
    Get full text
    Article
  7. 707

    A systematic review of digital twins’ potential for citizen participation and influence in land use agenda-setting by David Adade, Walter Timo de Vries

    Published 2025-04-01
    “…The findings also reveal two ways of citizen participation: (1) providing data for developing digital twins and (2) utilising digital twins to analyse and identify key land use challenges and to push forward land use claims and proposals within a policy system.…”
    Get full text
    Article
  8. 708

    What multimodal components, tools, dataset and focus of emotion are used in the current research of multimodal emotion: a systematic literature review by Reny Rahmalina, Wawan Gunawan

    Published 2024-12-01
    “…Hence, this research aims to identify research trends on multimodality and emotions studied from 2018 to 2022. The method used in this research was systematic literature review (SLR) to review, identify, evaluate and interpret all existing research on this topic. …”
    Get full text
    Article
  9. 709

    Trust-aware privacy-preserving QoS prediction with graph neural collaborative filtering for internet of things services by Weiwei Wang, Wenping Ma, Kun Yan

    Published 2025-02-01
    “…However, issues related to information credibility, user data privacy, and prediction accuracy in QoS prediction for IoT services have become significant challenges in current research. …”
    Get full text
    Article
  10. 710

    Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV by Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu

    Published 2022-11-01
    “…Aiming at solving the challenges of the Internet of Vehicles (IoV), such as privacy sensitive data exposing, data being vulnerable to unauthorized access and tampered with and the single point of failure of the cloud server, this paper introduces a blockchain-enabled data access method based on attribute-based encryption. …”
    Get full text
    Article
  11. 711

    A flexible privacy-preservation approach for IoT-driven smart Hospital employing diverse distribution methods by Irin Loretta G., Settu Ashwini, Prameela M., Naga Malleswara Rao D.S., Kalaiyarasi M., Saravanan S.

    Published 2025-01-01
    “…DP Smart Hospital uses Laplace or exponential distributions in differential privacy strategies to protect sensitive data generated by IoT devices. …”
    Get full text
    Article
  12. 712

    Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing by Nithin Melala Eshwarappa, Hojjat Baghban, Ching-Hsien Hsu, Po-Yen Hsu, Ren-Hung Hwang, Mu-Yen Chen

    Published 2025-08-01
    “…However, the centralized learning (CL) method is problematic in terms of data privacy because of the constraint of transferring substantial volumes of data to a central server. …”
    Get full text
    Article
  13. 713

    A decade of research on genetic privacy: the findings of the GetPreCiSe Center at Vanderbilt University by Christopher Slobogin, Karli Tellis, Ellen Wright Clayton, Ellen Wright Clayton, Ellen Wright Clayton, Ellen Wright Clayton, Jay Clayton, Ayden Eilmus, Bradley A. Malin, Bradley A. Malin, Bradley A. Malin

    Published 2025-08-01
    “…While this research shows that the risk of unauthorized re-identification is often over-stated, it also identifies possible ways privacy can be compromised. Several technical and legal methods for reducing privacy risks are described, most of which focus not on collection of the data, but rather on regulating data security, access, and use once it is collected. …”
    Get full text
    Article
  14. 714

    Theme-Rheme Analysis in Probing Google’s Coercion Trespassing User’s Privacy; A Forensic Linguistics Research by Sabtra Lesmana, Sawirman, Fajri Usman

    Published 2022-09-01
    “…It represents the clause analysis through the use of theme-rheme in probing the user's privacy violations in Google's user privacy policy agreement: a forensic linguistics research. …”
    Get full text
    Article
  15. 715

    Losing control: The effects of social media fatigue, privacy concerns and psychological reactance on social media advertising by Nathalie Nicola

    Published 2022-12-01
    “…This caused users to feel negatively after using SMP. Ad avoidance is caused by significant privacy concerns when encountering personalized ads, such as suspicion as to how data is used, the feeling of being watched and listened to, as well as annoyance at the irrelevance and repetitiveness of SMA. …”
    Get full text
    Article
  16. 716

    Mediating role of trust and privacy concerns between web assurance mechanism and purchase intention of online products by Charu Saxena, Pratibha Thakur

    Published 2024-12-01
    “…A conceptual model has been framed to investigate the direct and indirect relationship between web assurance mechanism and purchase intention of online products via trust and privacy concern. This study uses data collected from 342 respondents. …”
    Get full text
    Article
  17. 717

    Ethical-legal implications of AI-powered healthcare in critical perspective by Mohammad Nasir, Kaif Siddiqui, Samreen Ahmed

    Published 2025-07-01
    “…This requires an appraisal of AI use from a legal and ethical perspective. A review of the existing literature on AI in healthcare available on PubMed, Oxford Academic and Scopus revealed several common concerns regarding the relationship between AI, ethics, and healthcare—(i) the question of data: the choices inherent in collection, analysis, interpretation, and deployment of data inputted to and outputted by AI systems; (ii) the challenges to traditional patient-doctor relationships and long-held assumptions about privacy, identity and autonomy, as well as to the functioning of healthcare institutions. …”
    Get full text
    Article
  18. 718

    It’s Time to Relax: The Critical Importance of Digital Mental Health Products in the Context of Surveillance Capitalism by Sena Partal, Sasha Smirnova

    Published 2021-07-01
    “…We want to move beyond the personal data privacy debate and tackle other potential issues – what does this data sharing mean in terms of a shift in collective psychology and ideologies? …”
    Get full text
    Article
  19. 719
  20. 720

    Federated XAI IDS: An Explainable and Safeguarding Privacy Approach to Detect Intrusion Combining Federated Learning and SHAP by Kazi Fatema, Samrat Kumar Dey, Mehrin Anannya, Risala Tasin Khan, Mohammad Mamunur Rashid, Chunhua Su, Rashed Mazumder

    Published 2025-05-01
    “…This act of sharing the original network data with another server can worsen the current arrangement of protecting privacy within the network. …”
    Get full text
    Article