Showing 801 - 820 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.17s Refine Results
  1. 801

    NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols by Rafiullah Khan, Mohib Ullah, Atif Khan, Muhammad Irfan Uddin, Maha Al-Yahya

    Published 2021-01-01
    “…Numerous techniques are available to address privacy infringement, including Private Information Retrieval (PIR) protocols that use peer nodes to preserve privacy. …”
    Get full text
    Article
  2. 802

    A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment by Ponugoti Kalpana, Sunitha Tappari, L. Smitha, Dasari Madhavi, K. Naresh, Maddala Vijayalakshmi

    Published 2025-06-01
    “…Though sensor-driven devices have largely eased everyday lives, these healthcare systems have been suffering from various security breaches and data privacy problems. This evokes a need for designing intelligent systems to eradicate data breaches and privacy problems. …”
    Get full text
    Article
  3. 803

    Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration by Pedamallu Sai Mrudula, Rayappa David Amar Raj, Archana Pallakonda, Yanamala Rama Muni Reddy, K. Krishna Prakasha, V. Anandkumar

    Published 2025-01-01
    “…Furthermore, the proposed framework includes a federated learning-based scheme that utilizes differential privacy and homomorphic encryption to ensure the privacy and integrity of the data to enhance model interpretability and efficiency with feature ranking to provide insights into attack patterns and anomaly characteristics. …”
    Get full text
    Article
  4. 804
  5. 805

    Effect of Workshop Training on Nursing Students’ Knowledge and Attitude Regarding Children’s Privacy Protection: A Quasi-experimental Study by Fatemeh Azimi, Fariba Asgari, Yasaman Yaghobi, Saman Maroufizadeh, Morteza Rahbar Taramsari

    Published 2024-09-01
    “…Data analysis was performed by using descriptive (Mean±SD, frequency, percentage) and inferential statistics (Pearson correlation test and analysis of covariance). …”
    Get full text
    Article
  6. 806
  7. 807

    Privacy-Preserving Glycemic Management in Type 1 Diabetes: Development and Validation of a Multiobjective Federated Reinforcement Learning Framework by Fatemeh Sarani Rad, Juan Li

    Published 2025-07-01
    “…Furthermore, these approaches typically rely on centralized data processing, which raises privacy concerns due to the sensitive nature of health care data. …”
    Get full text
    Article
  8. 808
  9. 809

    A Decision Cloud Ranking Approach Based on Privacy and Security in Blockchain E-Health Industry 4.0 Systems by Sarah Qahtan, Khaironi Yatim, Mohd Hafeez Osman, Hazura Zulzalil, Muhammad Luqman Mahamad Zakaria

    Published 2023-12-01
    “…Second, the weights of each privacy and security property are calculated using the SFS-FWZIC method. …”
    Get full text
    Article
  10. 810

    How Social Scene Characteristics Affect Customers’ Purchase Intention: The Role of Trust and Privacy Concerns in Live Streaming Commerce by Wenjian Li, Steiner Cujilema, Lisong Hu, Gang Xie

    Published 2025-04-01
    “…The research employs Structural Equation Modeling (SEM) to test the hypothesis using data from 504 valid responses. (3) The results demonstrate that the characteristics of social scenes proposed in this study enhance consumer trust and positively impact purchase intention. …”
    Get full text
    Article
  11. 811

    Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning by Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore, Imran Baig

    Published 2024-12-01
    “…However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). …”
    Get full text
    Article
  12. 812

    The Impact of Artificial Intelligence on the Future Business World by Hebah Y. AlQato

    Published 2024-02-01
    “…In order to assist businesses better understand their consumers' requirements and preferences, AI is being used to examine customer data and generate insights. …”
    Get full text
    Article
  13. 813
  14. 814

    The impact of artificial intelligence on behavioral intentions to use mobile banking in the post-COVID-19 era by Johannes Schrank, Johannes Schrank

    Published 2025-08-01
    “…Data has been collected from 412 respondents in Thailand, and structural equation modeling has been employed for the data analysis.ResultsThe findings reveal significant positive effects of performance expectancy, effort expectancy, social influence, facilitating conditions, trust, perceived privacy, perceived intelligence and anthropomorphism of AI on users’ behavioral intentions to use mobile banking. …”
    Get full text
    Article
  15. 815

    PRE-SERVICE TEACHERS' PERCEPTIONS OF THE USE OF GENAI AND TRADITIONAL GRAMMAR-CHECKING TOOLS FOR ENGLISH WRITING by Tiara Putri, Rahmah Fithriani

    Published 2025-07-01
    “…Ethical concerns, particularly regarding data privacy and originality, are also identified. …”
    Get full text
    Article
  16. 816

    Examining inclusivity: the use of AI and diverse populations in health and social care: a systematic review by John Gabriel O. Marko, Ciprian Daniel Neagu, P. B. Anand

    Published 2025-02-01
    “…A holistic approach must be used to address disparities, enforce effective regulations, safeguard privacy, promote inclusion and equity, and emphasize rigorous validation.…”
    Get full text
    Article
  17. 817

    Investigating High School Students’ Attitudes Toward the Use of AI in Education: Evidence from Cambodia by Sarin Sok, Kimkong Heng, Mengkorn Pum

    Published 2025-07-01
    “…Utilizing evidence from an online survey with 315 students (female = 62.50%), the study showed that Cambodian high school students expressed generally favorable attitudes toward utilizing AI-powered tools in education, particularly pertaining to the use of AI to aid in completing school work. However, the study identified key concerns about data privacy and security issues, the risk of becoming over-dependent on AI, and limited originality about students’ work. …”
    Get full text
    Article
  18. 818
  19. 819

    AdaBoost algorithm based on target perturbation by Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG

    Published 2023-02-01
    “…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
    Get full text
    Article
  20. 820