Showing 101 - 120 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.25s Refine Results
  1. 101

    Orchestrating privacy-protected big data analyses of data from different resources with R and DataSHIELD. by Yannick Marcon, Tom Bishop, Demetris Avraam, Xavier Escriba-Montagut, Patricia Ryser-Welch, Stuart Wheater, Paul Burton, Juan R González

    Published 2021-03-01
    “…DataSHIELD uses Opal which is a data integration system used by epidemiological studies and developed by the OBiBa open source project in the domain of bioinformatics. …”
    Get full text
    Article
  2. 102
  3. 103

    THE USE OF HUMAN CHIP IMPLANTS FROM THE HADITH PERSPECTIVE by Vira Fharadillah, Muhammad Ghifari, Abil Ash

    Published 2025-07-01
    “…Chip implants are permitted for clear medical purposes that do not cause harm, while their use for non-medical purposes or those that potentially violate privacy and pose risks is prohibited in Islam. …”
    Get full text
    Article
  4. 104

    Enhancing privacy in clustering and data mining: A novel approach for sensitive data protection by Haythem Hayouni

    Published 2025-01-01
    “…However, these processes often involve the use of sensitive data, raising significant concerns about privacy, security, and trustworthiness. …”
    Get full text
    Article
  5. 105

    Right to privacy, Big Data and data protection: new challenges of the Colombian legal system by Dayron Dannylo Reyes Quintero, Margarita Rosa Lobo Contreras, Lucía Dayana Amaya Barbosa

    Published 2023-11-01
    “…Also, the perception and characteristics of Big Data are disclosed, trying to know how the rights involved in the materialization of the data analysis process can be protected; Finally, a critical sense is applied to the use of Big Data in modern political platforms, understanding the panorama for the Colombian legal system, which brings with it the probable violation of fundamental rights, such as personal privacy.…”
    Get full text
    Article
  6. 106
  7. 107

    Comprehensive Review of Privacy, Utility, and Fairness Offered by Synthetic Data by A. Kiran, P. Rubini, S. Saravana Kumar

    Published 2025-01-01
    “…First and foremost, how well synthetic data can preserve privacy and control disclosure, second is how good is its utility, and third, are they able to give fair results without any bias when used in machine learning. …”
    Get full text
    Article
  8. 108

    Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage by Feng Tian, Xiaolin Gui, Jian An, Pan Yang, Jianqiang Zhao, Xuejun Zhang

    Published 2014-01-01
    “…As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. …”
    Get full text
    Article
  9. 109

    Fair payments for privacy-preserving aggregation of mobile crowdsensing data by Mallikarjun Reddy Dorsala, V.N. Sastry, Sudhakar Chapram

    Published 2022-09-01
    “…With the advent of mobile crowdsensing, the mobile devices equipped with a variety of sensors (such as accelerometer, gyroscope, microphone etc.) are used to collect sensory data. A data aggregator processes the collected sensor data to deliver various services such as traffic management, health care and environmental monitoring. …”
    Get full text
    Article
  10. 110

    Explaining the unexplainable: data sharing and privacy in Web 3.0 by Shim Jieun, Kim Jieun

    Published 2025-03-01
    “…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
    Get full text
    Article
  11. 111

    Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks by Yong-Ki Kim, Hyunjo Lee, Min Yoon, Jae-Woo Chang

    Published 2013-06-01
    “…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
    Get full text
    Article
  12. 112

    A decentralized privacy-preserving framework for diabetic retinopathy detection using federated learning and blockchain by Omar Dib

    Published 2025-06-01
    “…Diabetic Retinopathy (DR) detection in distributed telemedicine environments requires secure, scalable, and privacy-preserving solutions. Traditional federated learning (FL) relies on a central server, raising concerns about data privacy and system trust. …”
    Get full text
    Article
  13. 113

    A Survey on Association Rule Hiding in Privacy Preserving Data Mining by Arezoo Hekmatyar, Naser Nematbakhsh, Mohammad Naderi Dehkordi

    Published 2024-02-01
    “…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
    Get full text
    Article
  14. 114

    Privacy-preserving detection and classification of diabetic retinopathy using federated learning with FedDEO optimization by Dasari Bhulakshmi, Dharmendra Singh Rajput

    Published 2024-12-01
    “…FL enables collaborative learning across multiple decentralized devices while maintaining data privacy. FedDEO optimization enhances the model's performance by fine-tuning hyperparameters in a distributed manner. …”
    Get full text
    Article
  15. 115

    Aerial pathways to resilience: the acceptance of drones in logistics transformation by Sofia Gomes, João M. Lopes, Tiago Trancoso

    Published 2025-05-01
    “…This study examines the determinants of consumer acceptance of drone delivery services, focusing on the roles of perceived usefulness, ease of use, and privacy concerns. We collected data from 1,108 Portuguese consumers through an online survey to assess how these factors influence consumer attitudes and intentions toward adopting drone delivery services. …”
    Get full text
    Article
  16. 116
  17. 117

    Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization by Xiaoxiao Wang, Jingjing Zhang, Huize Wan, Yuan Yao

    Published 2025-02-01
    “…The primary contribution of this work is an innovative approach that uses metaphorical visual language to represent the flow of user data, algorithms, and information. …”
    Get full text
    Article
  18. 118
  19. 119

    Security and privacy within smart cities by Putnik Nenad R., Marković Jana M.

    Published 2025-01-01
    “…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
    Get full text
    Article
  20. 120

    A Systematic Review on the Use of Big Data in Tourism by Jafar Ahangaran, Abbas Sadeghnia

    Published 2024-09-01
    “…Limitations: Although the use of big data in academic research has made significant progress, there are still challenges regarding data quality, data cost, and user privacy concerns. …”
    Get full text
    Article