Showing 781 - 800 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.18s Refine Results
  1. 781

    Fingernail analysis management system using microscopy sensor and blockchain technology by Shih Hsiung Lee, Chu Sing Yang

    Published 2018-03-01
    “…This work uses the highly anonymous blockchain technology to effectively protect data privacy and manage each user’s data through the blockchain, in which any change or manipulation can be recorded and tracked, and the data security is improved. …”
    Get full text
    Article
  2. 782

    Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution by Don Roosan, Rubayat Khan, Saif Nirzhor, Fahmida Hai

    Published 2025-05-01
    “…By integrating Post-Quantum Cryptography (PQC) with Quantum Key Distribution (QKD) and privacy-preserving mechanisms, data confidentiality and immutability for patient records in a post-quantum era are ensured. …”
    Get full text
    Article
  3. 783

    QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles by Ji-ming Chen, Ting-ting Li, Liang-jun Wang

    Published 2019-07-01
    “…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
    Get full text
    Article
  4. 784

    Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector by Germán Rodríguez-Galán, Eduardo Benavides-Astudillo, Daniel Nuñez-Agurto, Pablo Puente-Ponce, Sonia Cárdenas-Delgado, Mauricio Loachamín-Valencia

    Published 2025-06-01
    “…Five bots were deployed, one for each of the most commonly used university browsers, enabling comprehensive data collection across multiple platforms. …”
    Get full text
    Article
  5. 785
  6. 786
  7. 787

    Binary Classification of Customer’s Online Purchasing Behavior Using Machine Learning by Ahmad Aldelemy, Raed A. Abd-Alhameed

    Published 2023-06-01
    “…The workflow is simple, adaptable, and suitable for UK banks, demonstrating the potential for practical implementation and data privacy. Future work will extend our approach to UK banks, reformulate the problem as a multi-class classification, and introduce pre-training automated steps for data analysis and transformation. …”
    Get full text
    Article
  8. 788
  9. 789
  10. 790

    Optimizing encrypted search in the cloud using autoencoder-based query approximation by Mahmoud Mohamed, Khaled Alosman

    Published 2024-12-01
    “…Our work provides a rigorous evaluation of autoencoder-based query approximation for encrypted cloud search using real-world datasets. The research implement a general framework agnostic to model type, data modality, and encryption scheme. …”
    Get full text
    Article
  11. 791
  12. 792

    Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation by Gabriel Mendonca, Rosa M. M. Leao, Edmundo De Souza E. Silva, Don Towsley

    Published 2025-01-01
    “…In that experiment, conducted using the residences of volunteers and over one month, our system detected 99.1% of all DDoS attacks launched, with no false alarms.…”
    Get full text
    Article
  13. 793
  14. 794

    Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities by Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, Rania Aboalela, Naif Alsaadi, Louai A. Maghrabi, Khalid H. Allehaibi

    Published 2025-02-01
    “…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
    Get full text
    Article
  15. 795
  16. 796

    Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response by Yan Yan, Pengbin Yan, Adnan Mahmood, Yang Zhang, Quan Z. Sheng

    Published 2024-07-01
    “…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
    Get full text
    Article
  17. 797

    A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans by Abdullah Al-Saleh, Ghanshyam G. Tejani, Shailendra Mishra, Sunil Kumar Sharma, Seyed Jalaleddin Mousavirad

    Published 2025-07-01
    “…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
    Get full text
    Article
  18. 798

    AI, machine learning and deep learning in cyber risk management by Ishrag Hamid, M. M. Hafizur Rahman

    Published 2025-05-01
    “…However, challenges persist in ensuring the accuracy of information, understanding the functionality of models, and protecting individuals’ data. Ethical use of personal information and safeguarding privacy remain critical, with researchers needing to prioritize accuracy, transparency in AI models, and fairness in decision-making. …”
    Get full text
    Article
  19. 799

    Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective by Augustino Mwogosi

    Published 2025-05-01
    “…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
    Get full text
    Article
  20. 800