Suggested Topics within your search.
Suggested Topics within your search.
-
901
-
902
MANAJEMEN PRIVASI KOMUNIKASI MEDIA SOSIAL TWITTER OLEH MAHASISWA UNY COMMUNICATION PRIVACY MANAGEMENT OF SOCIAL MEDIA TWITTER BY UNY COLLEGE STUDENT
Published 2023-03-01“…The process of collecting data using the interview method. Test the validity of the data using source triangulation techniques, as well as four stages of data analysis: collection, reduction, presentation, and drawing conclusions. …”
Get full text
Article -
903
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems
Published 2024-09-01“…Access policies are uploaded to the cloud, stored, and downloaded in plain text, making them vulnerable to privacy breaches. When the access policy is completely hidden, users need to use their own attributes to try matching one by one, which is an inefficient process. …”
Get full text
Article -
904
Template recovery attack on encrypted face recognition systems with unprotected decision using synthetic faces
Published 2025-05-01“…Even without system access or training data, attackers can exploit leaked comparison scores to compromise facial privacy. …”
Get full text
Article -
905
Synthesis of electric vehicle charging data: A real-world data-driven approach
Published 2024-12-01“…In response, this study introduces an innovative methodology for generating large-scale and diverse EV charging data, mirroring real-world patterns for cost-efficient and privacy-compliant use. …”
Get full text
Article -
906
Mental Health Classification Using Machine Learning with PCA and Logistics Regression Approaches for Decision Making
Published 2025-02-01“…Mental health statistics come with numerous challenges, beginning with data integrity. Ensuring data accuracy and reliability is essential, especially if these datasets are to be used for advanced analysis or research. …”
Get full text
Article -
907
Enhancing Internet of Things security in healthcare using a blockchain-driven lightweight hashing system
Published 2025-05-01Get full text
Article -
908
Product Engagement Detection Using Multi-Camera 3D Skeleton Reconstruction and Gaze Estimation
Published 2025-05-01Get full text
Article -
909
The Risk of Linked Census Data to Transgender Youth
Published 2025-03-01“…Our simulation found that the TopDown configuration attains the maximum achievable level of privacy protection against such an attack. Our results demonstrate the importance of disclosure avoidance for census data and suggest that the TopDown approach used by the Census Bureau is a substantial improvement compared to the previous approach, achieving the maximum level of privacy protection possible against such a linkage attack. …”
Get full text
Article -
910
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
Published 2023-12-01“…However, the deep prediction model requires users to provide a large amount of private electricity consumption data, which has potential privacy risks. Edge nodes can federally train a global model through aggregation using federated learning (FL). …”
Get full text
Article -
911
Relative Applicability of Diverse Automatic Speech Recognition Platforms for Transcription of Psychiatric Treatment Sessions
Published 2025-01-01“…Although such models are good enough for most use cases, storing audio recordings in psychiatry complicates the data handling and adoption of ASR platforms in mental healthcare. …”
Get full text
Article -
912
Standardized patient profile review using large language models for case adjudication in observational research
Published 2025-01-01“…Abstract Using administrative claims and electronic health records for observational studies is common but challenging due to data limitations. …”
Get full text
Article -
913
Postgraduate Students Perception of Using Chatgpt in Clinical Management and Research: A Qualitative Exploratory Study
Published 2025-01-01“…RESULTS While ChatGPT saved research time, study participants reported that it also generated issues with data privacy and information accuracy. Power users felt the instrument was easier to use, although there was a range of comfort levels. …”
Get full text
Article -
914
Sexting in young adults’ social networks in Brazil: an exploratory study on the circulation of nudes
Published 2025-06-01“…Results A negative statistical correlation between Problematic Internet Use and body satisfaction was found, with 4 thematic categories emerging in qualitative data: (1) feeling of being pressured, (2) nudes as a condition for further social contact, (3) conformity to body standards and (4) fear of undue exposure and loss of control. …”
Get full text
Article -
915
Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing
Published 2025-01-01“…This framework improves several critical performance metrics by 30%, reduces makespan, reduces fault tolerance by 25%, and improves system scalability and reliability by 20%. Data processing localization through our approach reduces bandwidth and latency usage by up to 40% and improves data privacy and efficiency in data management. …”
Get full text
Article -
916
Client aware adaptive federated learning using UCB-based reinforcement for people re-identification
Published 2025-05-01“…Abstract People re-identification enables locating and identifying individuals across different camera views in surveillance environments. The surveillance data contains personally identifiable information such as facial images, behavioral patterns, and location data, which can be used for malicious purposes such as identity theft, stalking, or discrimination. …”
Get full text
Article -
917
Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method
Published 2019-05-01“…Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. …”
Get full text
Article -
918
A Pipeline for Automating Emergency Medicine Documentation Using LLMs with Retrieval-Augmented Text Generation
Published 2025-12-01“…Large Language Models (LLMs) offer a promising solution to enhance medical communication systems; however, their clinical deployment, particularly in non-English languages such as German, presents challenges related to content accuracy, clinical relevance, and data privacy. This study addresses these challenges by developing and evaluating an automated pipeline for emergency medical documentation in German. …”
Get full text
Article -
919
Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain
Published 2025-07-01“…The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. …”
Get full text
Article -
920
GAN-Based Driver’s Head Motion Using Millimeter-Wave Radar Sensor
Published 2025-01-01“…This model is particularly effective in scenarios with limited labeled data, as it can generate high-quality synthetic data to augment training. …”
Get full text
Article