Showing 1,201 - 1,220 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.22s Refine Results
  1. 1201

    CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain by Jiahui Jiang, Tingrui Pei, Jiahao Chen, Zhiwen Hou

    Published 2025-05-01
    “…This method simplifies device resource access by minimizing middleware confirmation, double-checking device access rights, and preventing redundant requests caused by illegal access attempts. Finally, in terms of data privacy and security, IPFS is used to store confidential data. …”
    Get full text
    Article
  2. 1202

    The issue of credibility between customers’ perceptions and the attitude toward Facebook advertising by Jassim Al-Gasawneh, Abdullah AlSokkar, Mahmoud Alghizzawi, Tahreer Abu Hmeidan, Deemah Alarabiat, Ahmed Alamro

    Published 2025-08-01
    “…Type of the article: Research Article AbstractAmong marketing professionals, the use of Social Networking Sites (SNSs) as a platform for advertising is on the rise, despite ongoing concerns regarding credibility and trust in privacy related to advertising on these sites. …”
    Get full text
    Article
  3. 1203

    Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing by Thinh Le Vinh, Huan Thien Tran, Samia Bouzefrane

    Published 2025-01-01
    “…Consequently, PTA-HE provides a highly effective and practical solution for secure mobile computing applications requiring stringent assurances of data privacy and integrity.…”
    Get full text
    Article
  4. 1204

    Harnessing digital health data for suicide prevention and care: A rapid review by Laura Bennett-Poynter, Sridevi Kundurthi, Reena Besa, Dan W. Joyce, Andrey Kormilitzin, Nelson Shen, James Sunwoo, Patrycja Szkudlarek, Lydia Sequiera, Laura Sikstrom

    Published 2025-02-01
    “…The primary aim of this study is to identify considerations for the collection and use of digital health data for suicide prevention and care. …”
    Get full text
    Article
  5. 1205

    Sharing traumatic stress research data: assessing and reducing the risk of re-identification by Nancy Kassam-Adams, Kristi Thompson, Marit Sijbrandij, Grete Dyb

    Published 2025-12-01
    “…Background: FAIR Data practices support data sharing and re-use and are essential for advancing science and practice to benefit individuals, families, and communities affected by trauma. …”
    Get full text
    Article
  6. 1206

    Data Mining Techniques for Predictive Maintenance in Manufacturing Industries a Comprehensive Review by Chinthamu Narender, Ashish, P Mathiyalagan, B Devananda Rao, S Kannadhasan, M Suganya

    Published 2025-01-01
    “…Predictive maintenance (PdM) is one of the major methods used in modern manufacturing to realize downtime minimization, lower the cost of maintenance and maximize machine service life by analyzing the collected data using data mining methodologies. …”
    Get full text
    Article
  7. 1207

    The application of distributed autonomous organization governance mechanisms to civic medical data management by James Cunningham, Nigel Davies, Sarah Devaney, Søren Holm, Mike Harding, Victoria Neumann, John Ainsworth

    Published 2024-12-01
    “…The mechanisms employed by DAOs has the potential to be generalized beyond their core financial domain to a wide range of use cases. In the medical field the use of blockchain and DAOs can provide secure and transparent access to medical data, while ensuring patient privacy. …”
    Get full text
    Article
  8. 1208

    Islam, Big Data, and Digital Ethics: Challenges in Religious Life in the Digital Age by Agung Saputra, Erni Asneli Asbi

    Published 2025-08-01
    “…These technologies offer opportunities to enhance the efficiency of religious practices, such as prayer reminders, Quran recitation, and zakat distribution, but they also present ethical challenges related to privacy, data misuse, and the erosion of deep spiritual experiences. …”
    Get full text
    Article
  9. 1209

    Membership inference attack and defense method in federated learning based on GAN by Jiale ZHANG, Chengcheng ZHU, Xiaobing SUN, Bing CHEN

    Published 2023-05-01
    “…Aiming at the problem that the federated learning system was extremely vulnerable to membership inference attacks initiated by malicious parties in the prediction stage, and the existing defense methods were difficult to achieve a balance between privacy protection and model loss.Membership inference attacks and their defense methods were explored in the context of federated learning.Firstly, two membership inference attack methods called class-level attack and user-level attack based on generative adversarial network (GAN) were proposed, where the former was aimed at leaking the training data privacy of all participants, while the latter could specify a specific participant.In addition, a membership inference defense method in federated learning based on adversarial sample (DefMIA) was further proposed, which could effectively defend against membership inference attacks by designing adversarial sample noise addition methods for global model parameters while ensuring the accuracy of federated learning.The experimental results show that class-level and user-level membership inference attack can achieve over 90% attack accuracy in federated learning, while after using the DefMIA method, their attack accuracy is significantly reduced, approaching random guessing (50%).…”
    Get full text
    Article
  10. 1210

    PCGOD: Enhancing Object Detection With Synthetic Data for Scarce and Sensitive Computer Vision Tasks by Walid Remmas, Martin Lints, Jaak Joonas Uudmae

    Published 2025-01-01
    “…Object detection models rely on large-scale, high-quality annotated datasets, which are often expensive, scarce, or restricted due to privacy concerns. Synthetic data generation has emerged as an alternative, yet existing approaches have limitations: generative models lack structured annotations and precise spatial control, while game-engine-based datasets suffer from inaccuracies due to 3D bounding box projections, limited scene diversity, and poor handling of articulated objects. …”
    Get full text
    Article
  11. 1211

    Big data applications in intelligent transport systems: a bibliometric analysis and review by Mahbub Hassan, Hridoy Deb Mahin, Abdullah Al Nafees, Arpita Paul, Saikat Sarkar Shraban

    Published 2025-03-01
    “…We found that ethical, privacy, and security concerns related to the use of Big Data in ITS have received limited attention. …”
    Get full text
    Article
  12. 1212

    Machine Learning and Data Science in Social Sciences: Methods, Applications, and Future Directions by Elias Dritsas, Maria Trigka

    Published 2025-01-01
    “…We review current strategies for responsible AI deployment, including regulatory frameworks, human-centered design principles, and privacy-preserving methods. By synthesizing methodological advances and cross-cutting challenges, this study provides a focused and interdisciplinary roadmap for the rigorous and equitable use of AI in social science research.…”
    Get full text
    Article
  13. 1213
  14. 1214

    Global trends of big data analytics in health research: a bibliometric study by Li Yao, Li Yao, Yan Liu, Tingrui Wang, Chunyan Han, Qiaoxing Li, Qinqin Li, Xiaoli You, Tingting Ren, Yinhua Wang

    Published 2025-07-01
    “…Co-occurrence word analysis identified six key research areas: (1) the application of big data analytics in health decision-making; (2) challenges in the technological management of health and medical big data; (3) integration of machine learning with health monitoring; (4) privacy and ethical issues in health and medical big data; (5) data integration in precision medicine; and (6) the use of big data in disease management and risk assessment. …”
    Get full text
    Article
  15. 1215

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  16. 1216

    Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid by Jianwei CHEN, Shuyu WANG, Meiping ZHANG, Zhenping ZHANG

    Published 2024-01-01
    “…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
    Get full text
    Article
  17. 1217

    Integration of data science with the intelligent IoT (IIoT): Current challenges and future perspectives by Inam Ullah, Deepak Adhikari, Xin Su, Francesco Palmieri, Celimuge Wu, Chang Choi

    Published 2025-04-01
    “…The Intelligent Internet of Things (IIoT) involves real-world things that communicate or interact with each other through networking technologies by collecting data from these “things” and using intelligent approaches, such as Artificial Intelligence (AI) and machine learning, to make accurate decisions. …”
    Get full text
    Article
  18. 1218

    CHALLENGES AND OPPORTUNITIES IN THE IMPLEMENTATION OF BIG DATA ANALYTICS IN MANAGEMENT INFORMATION SYSTEMS IN BANGLADESH by Golam Mustafa, MD. Nurullah Rabbani, Avishek Nath, Md Mehedi Hasan Emon

    Published 2023-11-01
    “…The findings reveal that organizations in Bangladesh encounter challenges related to limited technological infrastructure, data security and privacy concerns, skill shortages, and regulatory complexities. …”
    Get full text
    Article
  19. 1219

    A smart grid data sharing scheme supporting policy update and traceability by Xiaodong Yang, Ke Yao, Songyu Li, Xiaoni Du, Caifen Wang

    Published 2025-07-01
    “…Finally, the analysis results show that this scheme can protect the privacy of smart grid data, verify the integrity of smart grid data, resist collusion attacks and track the identity of malicious users who leak private keys, and its efficiency is better than similar data sharing schemes.…”
    Get full text
    Article
  20. 1220

    Gradual Geometry-Guided Knowledge Distillation for Source-Data-Free Domain Adaptation by Yangkuiyi Zhang, Song Tang

    Published 2025-04-01
    “…Due to access to the source data during the transfer phase, conventional domain adaptation works have recently raised safety and privacy concerns. …”
    Get full text
    Article