Suggested Topics within your search.
Suggested Topics within your search.
-
1181
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
Published 2021-05-01“…Mobile Cloud Computing (MCC) allows users more possibilities to access services conveniently. But data security and privacy issues still act as barriers for adoption to cloud technology when dealing with confidential data. …”
Get full text
Article -
1182
A Remedy for Heterogeneous Data: Clustered Federated Learning with Gradient Trajectory
Published 2024-12-01“…Federated Learning (FL) has recently attracted a lot of attention due to its ability to train a machine learning model using data from multiple clients without divulging their privacy. …”
Get full text
Article -
1183
-
1184
An Artificial Intelligence Pipeline for Hepatocellular Carcinoma: From Data to Treatment Recommendations
Published 2025-07-01“…However, challenges such as data quality, standardization, and privacy remain. …”
Get full text
Article -
1185
Securing the metaverse: Machine learning–based perspectives on risk, trust, and governance
Published 2025-12-01“…The rapid expansion of the metaverse presents significant cybersecurity and privacy challenges, requiring structured, data-driven analysis. …”
Get full text
Article -
1186
Hybrid Deep Learning Models Using LSTM with Random Forest for Radio Frequency-Based Human Activity Recognition in Line-of-Sight and Non-Line-of-Sight Environments
Published 2025-06-01“…The dataset included data from 8 subjects performing 10 different activities. …”
Get full text
Article -
1187
New frontiers in migration statistics: a narrative review on big data’s role
Published 2025-08-01“…However, its use remains largely experimental, with key concerns around data access, representativeness, privacy, and the integration with official statistics. …”
Get full text
Article -
1188
A novel ε-sensitive correlation indistinguishable scheme for publishing location data.
Published 2019-01-01“…So the published data had to be disposed to protect the privacy. In order to cope with this problem, a number of algorithms based on the strategy of k-anonymity were proposed, but this is not enough for the privacy protection, as the correlation between the sensitive region and the background knowledge can be used to infer the real location. …”
Get full text
Article -
1189
To be or not to be, when synthetic data meet clinical pharmacology: A focused study on pharmacogenetics
Published 2025-01-01“…Abstract The use of synthetic data in pharmacology research has gained significant attention due to its potential to address privacy concerns and promote open science. …”
Get full text
Article -
1190
Full Data-Processing Power Load Forecasting Based on Vertical Federated Learning
Published 2023-01-01“…To address it, according to the procedure in a practical scenario, we propose a vertical FL XGBoost-based PLF, where multiparty secure computation is used to enhance the privacy protection of FL. Concretely, we design a full data-processing PLF, including data cleaning, private set intersection, feature selection, federated XGBoost training, and inference. …”
Get full text
Article -
1191
Research on the security of national secret algorithm based compute first networking
Published 2023-08-01“…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
Get full text
Article -
1192
The impact of zero-knowledge proofs on data minimisation compliance of digital identity wallets
Published 2025-07-01“…Technically, these attestations involve auxiliary information to ensure their verifiability, leading to the generation, processing, and storage of more than just personal data. In particular, this auxiliary information contains globally unique information that can be misused as personal identifiers and poses risks to the privacy of individuals engaging in transactions using a European Digital Identity Wallet. …”
Get full text
Article -
1193
A Continuous Authentication Approach for Mobile Crowdsourcing Based on Federated Learning
Published 2024-01-01“…With the widespread use of smartphones and wearable devices, Mobile Crowdsourcing (MCS) has become a powerful method for gathering and processing data from various users. …”
Get full text
Article -
1194
Examining the impact of environmental product innovation on perceived brand value considering the mediating role of ethical- aspects in the home appliance industry
Published 2025-02-01“…In this study, a convenience sampling method was used. To collect data, a standardized questionnaire was used, whose validity was confirmed by calculating content, convergent, and divergent validity, and its reliability was confirmed through the Cronbach's alpha index. …”
Get full text
Article -
1195
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
Published 2014-11-01“…Cloud storage is an effective solution to the storage performance bottleneck, but it also gives rise to problems of data security and privacy protection. In order to solve this problem, a cloud storage data protection mechanism based on a fingerprint cube algorithm was developed. …”
Get full text
Article -
1196
-
1197
Insights into gender-equity in healthcare accessibility in northern Nigeria: descriptive and predictive approaches
Published 2025-07-01“…All respondents were required to accept these terms and conditions before being allowed to participate in the data collection exercise. • Data were collected using askNivi, an app specifically designed for healthcare related data collection. …”
Get full text
Article -
1198
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
Published 2014-11-01“…Cloud storage is an effective solution to the storage performance bottleneck, but it also gives rise to problems of data security and privacy protection. In order to solve this problem, a cloud storage data protection mechanism based on a fingerprint cube algorithm was developed. …”
Get full text
Article -
1199
C-mixture and multi-constraints based genetic algorithm for collaborative data publishing
Published 2018-04-01“…In order to apply the proposed privacy measure to privacy preserving data publishing, a new algorithm called, CPGEN is developed using genetic algorithm and multi-objective constraints. …”
Get full text
Article -
1200
Passive Indoor People Counting by Bluetooth Signal Deformation Analysis with Deep Learning
Published 2025-05-01“…Notably, in the regression setup, the model can generalize to occupancy values not present in the fine-tuning dataset, requiring only a few minutes of calibration data to adapt to a new environment. We believe that this approach offers a valuable solution for real-time people counting in critical environments such as laboratories, clinics, or hospitals, where preserving privacy may limit the use of camera-based systems. …”
Get full text
Article