Suggested Topics within your search.
Suggested Topics within your search.
-
61
Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning
Published 2025-03-01“…This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights the importance of preserving privacy and authenticity in digital media. …”
Get full text
Article -
62
An accuracy-privacy optimization framework considering user’s privacy requirements for data stream mining
Published 2025-06-01“…Additionally, a data fitting module using kernel regression is integrated, a unique approach that predicts accuracy levels based on user-defined privacy thresholds. …”
Get full text
Article -
63
Secondary Use of Electronic Health Record: Opportunities and Challenges
Published 2020-01-01Subjects: Get full text
Article -
64
Predicting chronic pain using wearable devices: a scoping review of sensor capabilities, data security, and standards compliance
Published 2025-05-01“…Current studies focus mainly on correlations between data and pain levels, but rarely use this information for accurate prediction.ObjectiveThis study aims to review recent advancements in wearable technology for CP management, emphasizing the integration of multimodal data, sensor quality, compliance with data security standards, and the effectiveness of predictive models in identifying CP episodes.MethodsA systematic search across six major databases identified studies evaluating wearable devices designed to collect pain-related parameters and predict CP. …”
Get full text
Article -
65
Data Privacy Protection in Islamic Communication Perspective
Published 2024-02-01“…Technology in the era of society 5.0 was rising to facilitate human work, but it is used to misuse big data from the individual level. …”
Get full text
Article -
66
Balancing Ethics and Privacy in the Use of Artificial Intelligence in Institutions of Higher Learning: A Framework for Responsive AI Systems
Published 2025-07-01“…Thematic analysis identified ten critical themes centred around benefits, challenges, applications, responsible use, privacy and data security, ethical considerations, institutional policies and frameworks, training, equity, and sustainable AI use. …”
Get full text
Article -
67
Data Anonymization and Privacy Preservation in Healthcare Systems
Published 2025-01-01“…With the objective to identify key trends and driving factors, a bibliometric analysis was performed using VOSviewer, which focuses on prominent authors, dominant research topics, and collaborative networks in data privacy. …”
Get full text
Article -
68
Privacy-Preserving Data Sharing in Telehealth Services
Published 2024-11-01“…The framework ensures that all patient health data are encrypted using homomorphic encryption before storage on the blockchain, guaranteeing confidentiality and protecting data from unauthorized access. …”
Get full text
Article -
69
Unpacking Youth Privacy Management in AI Systems: A Privacy Calculus Model Analysis
Published 2025-01-01“…The increasing use of Artificial Intelligence (AI) in daily life has introduced substantial issues in protecting user privacy, particularly for young digital citizens. …”
Get full text
Article -
70
Abnormality detection and privacy protection strategies for power marketing inspection business of cyber–physical–social systems using big data and artificial intelligence
Published 2025-07-01“…Subsequently, the fault interval detection algorithm is used to locate fault periods, and the electricity consumed within these intervals is dynamically estimated using a prediction algorithm. …”
Get full text
Article -
71
Blockchain-enabled data governance for privacy-preserved sharing of confidential data
Published 2024-12-01“…Our novel ABE encryption system supports multi-authority use cases while hiding access policy and ensuring identity privacy, which also protects data sharing against corrupt authorities. …”
Get full text
Article -
72
Combining observational and experimental data for causal inference considering data privacy
Published 2025-03-01“…We find that leveraging transformed observational data in treatment effect estimation can still improve estimation over only using data from an RCT.…”
Get full text
Article -
73
Using the LTO Network Level 1 Blockchain to Automate Inter-Organizational Business Processes
Published 2024-06-01“…The author explains the operation of a private event chain as an ad-hoc private blockchain that ensures the consistency of the process state between nodes. Methods of ensuring data privacy are discussed. The second part of the article is devoted to the global public blockchain LTO to confirm information from private event chains. …”
Get full text
Article -
74
Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications
Published 2022-01-01“…The aim of this study is that Medical Applications claims no data is transferred, thereby protecting privacy. …”
Get full text
Article -
75
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01“…Data security and privacy are crucial for the Internet of Medical Things (IoMT) and the digitization of healthcare systems. …”
Get full text
Article -
76
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
Published 2025-05-01“…Experimental results indicate that the proposed solution offers robust resistance to various attacks, including replay attacks and data exposure, providing a robust and privacy‐centric solution for carpooling services.…”
Get full text
Article -
77
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
Published 2025-08-01“…To address these issues, this paper proposes a system that ensures patient anonymity through secure credentials and advanced fraud detection mechanisms. Privacy is preserved using cryptographic techniques such as secure hashing and anonymous credentials, which ensure that sensitive patient information remains confidential throughout the claim process. …”
Get full text
Article -
78
Solving blockchain trilemma using off‐chain storage protocol
Published 2023-07-01Get full text
Article -
79
Privacy in the Internet: Myth or reality
Published 2016-01-01“…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
Get full text
Article -
80