Showing 61 - 80 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.21s Refine Results
  1. 61

    Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning by Saud Sohail, Syed Muhammad Sajjad, Adeel Zafar, Zafar Iqbal, Zia Muhammad, Muhammad Kazim

    Published 2025-03-01
    “…This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights the importance of preserving privacy and authenticity in digital media. …”
    Get full text
    Article
  2. 62

    An accuracy-privacy optimization framework considering user’s privacy requirements for data stream mining by Waruni Hewage, R. Sinha, M. Asif Naeem

    Published 2025-06-01
    “…Additionally, a data fitting module using kernel regression is integrated, a unique approach that predicts accuracy levels based on user-defined privacy thresholds. …”
    Get full text
    Article
  3. 63
  4. 64

    Predicting chronic pain using wearable devices: a scoping review of sensor capabilities, data security, and standards compliance by Johannes C. Ayena, Johannes C. Ayena, Amina Bouayed, Amina Bouayed, Myriam Ben Arous, Myriam Ben Arous, Youssef Ouakrim, Youssef Ouakrim, Karim Loulou, Karim Loulou, Darine Ameyed, Isabelle Savard, Leila El Kamel, Neila Mezghani, Neila Mezghani

    Published 2025-05-01
    “…Current studies focus mainly on correlations between data and pain levels, but rarely use this information for accurate prediction.ObjectiveThis study aims to review recent advancements in wearable technology for CP management, emphasizing the integration of multimodal data, sensor quality, compliance with data security standards, and the effectiveness of predictive models in identifying CP episodes.MethodsA systematic search across six major databases identified studies evaluating wearable devices designed to collect pain-related parameters and predict CP. …”
    Get full text
    Article
  5. 65

    Data Privacy Protection in Islamic Communication Perspective by Musfiah Saidah, Hilya Maylaffayza

    Published 2024-02-01
    “…Technology in the era of society 5.0 was rising to facilitate human work, but it is used to misuse big data from the individual level. …”
    Get full text
    Article
  6. 66

    Balancing Ethics and Privacy in the Use of Artificial Intelligence in Institutions of Higher Learning: A Framework for Responsive AI Systems by Belinda Ndlovu, Kudakwashe Maguraushe

    Published 2025-07-01
    “…Thematic analysis identified ten critical themes centred around benefits, challenges, applications, responsible use, privacy and data security, ethical considerations, institutional policies and frameworks, training, equity, and sustainable AI use. …”
    Get full text
    Article
  7. 67

    Data Anonymization and Privacy Preservation in Healthcare Systems by Datta Krishnasheesh, Gupta Himanshu

    Published 2025-01-01
    “…With the objective to identify key trends and driving factors, a bibliometric analysis was performed using VOSviewer, which focuses on prominent authors, dominant research topics, and collaborative networks in data privacy. …”
    Get full text
    Article
  8. 68

    Privacy-Preserving Data Sharing in Telehealth Services by Ammar Odeh, Eman Abdelfattah, Walid Salameh

    Published 2024-11-01
    “…The framework ensures that all patient health data are encrypted using homomorphic encryption before storage on the blockchain, guaranteeing confidentiality and protecting data from unauthorized access. …”
    Get full text
    Article
  9. 69

    Unpacking Youth Privacy Management in AI Systems: A Privacy Calculus Model Analysis by Austin Shouli, Ankur Barthwal, Molly Campbell, Ajay Kumar Shrestha

    Published 2025-01-01
    “…The increasing use of Artificial Intelligence (AI) in daily life has introduced substantial issues in protecting user privacy, particularly for young digital citizens. …”
    Get full text
    Article
  10. 70

    Abnormality detection and privacy protection strategies for power marketing inspection business of cyber–physical–social systems using big data and artificial intelligence by Li Kai, Mo Pingyan, Yang Yongjiao, Xie Hanyang, Shen Zhixiong

    Published 2025-07-01
    “…Subsequently, the fault interval detection algorithm is used to locate fault periods, and the electricity consumed within these intervals is dynamically estimated using a prediction algorithm. …”
    Get full text
    Article
  11. 71

    Blockchain-enabled data governance for privacy-preserved sharing of confidential data by Jingchi Zhang, Anwitaman Datta

    Published 2024-12-01
    “…Our novel ABE encryption system supports multi-authority use cases while hiding access policy and ensuring identity privacy, which also protects data sharing against corrupt authorities. …”
    Get full text
    Article
  12. 72

    Combining observational and experimental data for causal inference considering data privacy by Mann Charlotte Z., Sales Adam C., Gagnon-Bartsch Johann A.

    Published 2025-03-01
    “…We find that leveraging transformed observational data in treatment effect estimation can still improve estimation over only using data from an RCT.…”
    Get full text
    Article
  13. 73

    Using the LTO Network Level 1 Blockchain to Automate Inter-Organizational Business Processes by Khrypko Serhii L., Shcherbakov Serhii S.

    Published 2024-06-01
    “…The author explains the operation of a private event chain as an ad-hoc private blockchain that ensures the consistency of the process state between nodes. Methods of ensuring data privacy are discussed. The second part of the article is devoted to the global public blockchain LTO to confirm information from private event chains. …”
    Get full text
    Article
  14. 74

    Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications by Osman Sirajeldeen Ahmed, Emad Eldin Omer, Samar Zuhair Alshawwa, Malik Bader Alazzam, Reefat Arefin Khan

    Published 2022-01-01
    “…The aim of this study is that Medical Applications claims no data is transferred, thereby protecting privacy. …”
    Get full text
    Article
  15. 75

    Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO by Adla Padma, Mangayarkarasi Ramaiah

    Published 2025-03-01
    “…Data security and privacy are crucial for the Internet of Medical Things (IoMT) and the digitization of healthcare systems. …”
    Get full text
    Article
  16. 76

    A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption by David Palma, Pier Luca Montessoro, Mirko Loghi, Daniele Casagrande

    Published 2025-05-01
    “…Experimental results indicate that the proposed solution offers robust resistance to various attacks, including replay attacks and data exposure, providing a robust and privacy‐centric solution for carpooling services.…”
    Get full text
    Article
  17. 77

    Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology by Md. Mazharul Islam, Mubasshir Ahmed, Rajesh Palit, Mohammad Shahriar Rahman, Salekul Islam

    Published 2025-08-01
    “…To address these issues, this paper proposes a system that ensures patient anonymity through secure credentials and advanced fraud detection mechanisms. Privacy is preserved using cryptographic techniques such as secure hashing and anonymous credentials, which ensure that sensitive patient information remains confidential throughout the claim process. …”
    Get full text
    Article
  18. 78
  19. 79

    Privacy in the Internet: Myth or reality by Mikarić Bratislav, Marković Marija, Trajković Dušan

    Published 2016-01-01
    “…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
    Get full text
    Article
  20. 80