Showing 1,001 - 1,020 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.25s Refine Results
  1. 1001

    Bootstrapping BI-RADS classification using large language models and transformers in breast magnetic resonance imaging reports by Yuxin Liu, Xiang Zhang, Weiwei Cao, Wenju Cui, Tao Tan, Yuqin Peng, Jiayi Huang, Zhen Lei, Jun Shen, Jian Zheng

    Published 2025-04-01
    “…Specifically, missing category information (MCI) that is absent in the free-text reports is supplemented by assigning default values to the missing categories in the structured reports. To ensure data privacy, a locally deployed Qwen-Chat model is employed. …”
    Get full text
    Article
  2. 1002

    Management of the Chain of Custody of Digital Evidence Using Blockchain and Self-Sovereign Identities: A Systematic Literature Review by Leandro Loffi, Gerson Luiz Camillo, Cristiano Antonio De Souza, Carla Merkle Westphall, Carlos Becker Westphall

    Published 2025-01-01
    “…While state-of-the-art reviews identify various aspects, it is necessary to include the use of Self-Sovereign Identity (SSI) systems within the scope of research. …”
    Get full text
    Article
  3. 1003

    A longitudinal study examining how self-injection social norms are associated with contraceptive self-injectable interest and use in rural Uganda by Erica Sedlander, Nitya Turaga, Catherine Birabwa, Ronald Wasswa, Beth Phillips, Dinah Amongin, Sneha Challa, Sylvie Nano, Betty Kyobe, Agnes Kayego, Peter Waiswa, Kelsey Holt

    Published 2025-06-01
    “…Methods We analyzed two waves of data from rural Uganda collected as part of the Innovations for Choice and Autonomy (ICAN) cohort study (n = 2,170 women of reproductive age who were not using self-injectable contraception at baseline). …”
    Get full text
    Article
  4. 1004

    HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers by Opeyemi Lateef Usman, Ravie Chandren Muniyandi, Khairuddin Omar, Mazlyfarina Mohamad, Ayoade Akeem Owoade, Morufat Adebola Kareem

    Published 2025-04-01
    “…Although, fully homomorphic encryption (FHE)-based methods have been proposed to maintain data confidentiality and privacy, however, existing FHE deep convolutional neural network (CNN) models still face some issues such as low accuracy, high encryption/decryption latency, energy inefficiency, long feature extraction times, and significant cipher-image expansion. …”
    Get full text
    Article
  5. 1005

    Neuroethical issues in adopting brain imaging for personalized chronic pain management: Attitudes of people with lived experience of chronic pain by Karen Deborah Davis, Monica de Oliveira, Ariana Besik, Daniel Z. Buchman

    Published 2024-05-01
    “…However, they worried that brain scans could be used to dismiss their pain self-report. Most respondents felt there were policies to protect their brain data, but 40% were concerned about privacy and brain scan use against them by their employers/insurers. …”
    Get full text
    Article
  6. 1006

    Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic by Vilić Vida

    Published 2022-01-01
    “…The positive aspects of this kind of communication are undoubtedly obvious and necessary, but they also created new forms of victimization due to insecure protocols for sending e-mails, inadequate level of privacy protection, insufficient information security, the existence of so-called security holes and the use of the same devices and digital services for professional and private purposes. …”
    Get full text
    Article
  7. 1007

    A technological and legal investigation into how smart states deploy collective intelligence for security and surveillance purposes by Diana M. POPA

    Published 2025-03-01
    “…The article debates the relation between data protection and public and national security in democratic states and shows how the evolving threat landscape influences both the practice and the legislative process around personal data protection and deployment of emerging technologies and use of collective intelligence for security purposes. …”
    Get full text
    Article
  8. 1008

    Integrating Visual Cryptography for Efficient and Secure Image Sharing on Social Networks by Lijing Ren, Denghui Zhang

    Published 2025-04-01
    “…This prevalence poses challenges for secure image forwarding, as it is susceptible to privacy leaks when sharing data. While standard encryption algorithms can safeguard the privacy of textual data, image data entail larger volumes and significant redundancy. …”
    Get full text
    Article
  9. 1009

    Efficient secure federated learning aggregation framework based on homomorphic encryption by Shengxing YU, Zhong CHEN

    Published 2023-01-01
    “…In order to solve the problems of data security and communication overhead in federated learning, an efficient and secure federated aggregation framework based on homomorphic encryption was proposed.In the process of federated learning, the privacy and security issues of user data need to be solved urgently.However, the computational cost and communication overhead caused by the encryption scheme would affect the training efficiency.Firstly, in the case of protecting data security and ensuring training efficiency, the Top-K gradient selection method was used to screen model gradients, reducing the number of gradients that need to be uploaded.A candidate quantization protocol suitable for multi-edge terminals and a secure candidate index merging algorithm were proposed to further reduce communication overhead and accelerate homomorphic encryption calculations.Secondly, since model parameters of each layer of neural networks had characteristics of the Gaussian distribution, the selected model gradients were clipped and quantized, and the gradient unsigned quantization protocol was adopted to speed up the homomorphic encryption calculation.Finally, the experimental results show that in the federated learning scenario, the proposed framework can protect data privacy, and has high accuracy and efficient performance.…”
    Get full text
    Article
  10. 1010

    Normative framework for the protection against genetic discrimination in Serbia by Petrušić Nevena

    Published 2015-01-01
    “…The analysis has shown that the rules on protection of the genetic data and the use of genetic samples, which are crucially important for prevention of genetic discrimination, have not been harmonized with contemporary ethical and legal standards. …”
    Get full text
    Article
  11. 1011

    Assessment of the Quality of Smartphone-Based Applications and Games for Teaching Medical Terminology Using the Mobile Application Rating Scale (MARS) by Seyyedeh Fatemeh Mousavi Baigi, Reyhaneh Norouzi Aval, Masoumeh Sarbaz, Khalil Kimiafar

    Published 2024-10-01
    “…The same checklist was used for data extraction. The quality of apps was measured using the Mobile App Rating Scale (MARS). …”
    Get full text
    Article
  12. 1012

    KAB: A new k-anonymity approach based on black hole algorithm by Lynda Kacha, Abdelhafid Zitouni, Mahieddine Djoudi

    Published 2022-07-01
    “…K-anonymity is the most widely used approach to privacy preserving microdata which is mainly based on generalization. …”
    Get full text
    Article
  13. 1013
  14. 1014

    Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme by DUAN Jie, GU Wei, ZHANG Shujuan, GONG Xin

    Published 2025-05-01
    “…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. …”
    Get full text
    Article
  15. 1015

    Ethical Challenges in Blood Donation from Viewpoint of Blood Transfusion Policymakers, Experts and Stakeholders: A Qualitative Study by forouzan akrami, Abolfazl Asghari, tooran mohammadi, abbas sedaghat

    Published 2025-01-01
    “…Purposeful sampling and focus group discussion were used to collect data. Data analysis was performed by Graneheim and Lundman inductive content analysis. …”
    Get full text
    Article
  16. 1016

    Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing by Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, Madiha Haider Syed, Axel Jantsch, Semeen Rehman

    Published 2024-01-01
    “…However, in the Industrial Internet of Things (IIoT), the sharing of data has bandwidth, computational, and privacy issues. …”
    Get full text
    Article
  17. 1017

    Decades in the Making: The Evolution of Digital Health Research Infrastructure Through Synthetic Data, Common Data Models, and Federated Learning by Jodie A Austin, Elton H Lobo, Mahnaz Samadbeik, Teyl Engstrom, Reji Philip, Jason D Pole, Clair M Sullivan

    Published 2024-12-01
    “…The same way that drug trials require infrastructure to support their conduct, digital health also necessitates new and disruptive research data infrastructure. Novel methods such as common data models, federated learning, and synthetic data generation are emerging to enhance the utility of research using RWD, which are often siloed across health systems. …”
    Get full text
    Article
  18. 1018
  19. 1019

    Analyzing the concept of solitude with the spatial syntax technique in the spatial organization of rural homes; case Study: Bushehr province by Farshid Mesbah, Behzad Vasigh, Mostafa Masoudinezhad

    Published 2023-03-01
    “…In the next stage, graph analysis technique was used to extract data from the drawn maps using tools such as connectivity, relationship, step depth, metric depth, and angle of view with the help of Depth Map software for sample analysis. …”
    Get full text
    Article
  20. 1020

    A secure and efficient user selection scheme in vehicular crowdsensing by Min Zhang, Qing Ye, Zhimin Yuan, Kaihuan Deng

    Published 2025-05-01
    “…In addition, a prediction model based on principal component analysis-enhanced long short-term memory (PCA-Enhanced LSTM) model is constructed by combining the advantages of principal component analysis (PCA) and long short-term memory (LSTM) network. The model uses PCA for data dimensionality reduction to eliminate redundant information and then employs LSTM to process time series data, capture long-term dependencies for more accurate user credit prediction, screen high-quality users, and improve perceived data quality. …”
    Get full text
    Article