Suggested Topics within your search.
Suggested Topics within your search.
-
781
Fingernail analysis management system using microscopy sensor and blockchain technology
Published 2018-03-01“…This work uses the highly anonymous blockchain technology to effectively protect data privacy and manage each user’s data through the blockchain, in which any change or manipulation can be recorded and tracked, and the data security is improved. …”
Get full text
Article -
782
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
Get full text
Article -
783
QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles
Published 2019-07-01“…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
Get full text
Article -
784
Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector
Published 2025-06-01“…Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple platforms. …”
Get full text
Article -
785
Personalization in Mobile Activity Recognition System Using -Medoids Clustering Algorithm
Published 2013-07-01Get full text
Article -
786
-
787
Binary Classification of Customer’s Online Purchasing Behavior Using Machine Learning
Published 2023-06-01“…The workflow is simple, adaptable, and suitable for UK banks, demonstrating the potential for practical implementation and data privacy. Future work will extend our approach to UK banks, reformulate the problem as a multi-class classification, and introduce pre-training automated steps for data analysis and transformation. …”
Get full text
Article -
788
A Multi-Image Cryptosystem Using Quantum Walks and Chebyshev Map
Published 2021-01-01Get full text
Article -
789
Using Machine Learning Algorithms in Intrusion Detection Systems: A Review
Published 2024-06-01Get full text
Article -
790
Optimizing encrypted search in the cloud using autoencoder-based query approximation
Published 2024-12-01“…Our work provides a rigorous evaluation of autoencoder-based query approximation for encrypted cloud search using real-world datasets. The research implement a general framework agnostic to model type, data modality, and encryption scheme. …”
Get full text
Article -
791
DKA Prediction in Children Using Artificial Intelligence: Improved Emergency Care
Published 2024-03-01Get full text
Article -
792
Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation
Published 2025-01-01“…In that experiment, conducted using the residences of volunteers and over one month, our system detected 99.1% of all DDoS attacks launched, with no false alarms.…”
Get full text
Article -
793
Detection of Malicious Clients in Federated Learning Using Graph Neural Network
Published 2025-01-01Get full text
Article -
794
Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities
Published 2025-02-01“…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
Get full text
Article -
795
SMS spam detection using BERT and multi-graph convolutional networks
Published 2025-01-01Get full text
Article -
796
Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response
Published 2024-07-01“…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
Get full text
Article -
797
A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans
Published 2025-07-01“…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
Get full text
Article -
798
AI, machine learning and deep learning in cyber risk management
Published 2025-05-01“…However, challenges persist in ensuring the accuracy of information, understanding the functionality of models, and protecting individuals’ data. Ethical use of personal information and safeguarding privacy remain critical, with researchers needing to prioritize accuracy, transparency in AI models, and fairness in decision-making. …”
Get full text
Article -
799
Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective
Published 2025-05-01“…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
Get full text
Article -
800