Showing 1,361 - 1,380 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.23s Refine Results
  1. 1361

    Exploring Current Practices and Challenges of HIPAA Compliance in Software Engineering: Scoping Review by Farah Elkourdi, Chenhao Wei, LU Xiao, Zhongyuan YU, Onur Asan

    Published 2024-01-01
    “…Healthcare systems and applications are increasingly used to improve patient care. However, these applications face data security, privacy, and regulatory compliance challenges. …”
    Get full text
    Article
  2. 1362

    Harnessing Moderate-Sized Language Models for Reliable Patient Data Deidentification in Emergency Department Records: Algorithm Development, Validation, and Implementation Study by Océane Dorémus, Dylan Russon, Benjamin Contrand, Ariel Guerra-Adames, Marta Avalos-Fernandez, Cédric Gil-Jardiné, Emmanuel Lagarde

    Published 2025-04-01
    “… Abstract BackgroundThe digitization of health care, facilitated by the adoption of electronic health records systems, has revolutionized data-driven medical research and patient care. While this digital transformation offers substantial benefits in health care efficiency and accessibility, it concurrently raises significant concerns over privacy and data security. …”
    Get full text
    Article
  3. 1363

    FLPneXAINet: Federated deep learning and explainable AI for improved pneumonia prediction utilizing GAN-augmented chest X-ray data. by Shuvo Biswas, Rafid Mostafiz, Mohammad Shorif Uddin, Muhammad Shahin Uddin

    Published 2025-01-01
    “…Additionally, the need to protect patient privacy complicates the sharing of sensitive clinical data. …”
    Get full text
    Article
  4. 1364

    Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration by Ziyuan Zhou, Long Chen, Yekang Zhao, Xinyi Yang, Zhaoyang Han, Zheng He

    Published 2024-11-01
    “…The mechanism uses the cuckoo filter technology to effectively reduce the computational complexity and ensures the authenticity and integrity of data transmission and use through data retrieval integrity verification. …”
    Get full text
    Article
  5. 1365

    Ethical Design of Data-Driven Decision Support Tools for Improving Cancer Care: Embedded Ethics Review of the 4D PICTURE Project by Marieke Bak, Laura Hartman, Charlotte Graafland, Ida J Korfage, Alena Buyx, Maartje Schermer

    Published 2025-04-01
    “…There are myriad ethical issues to consider as the project will create data-driven prognostic models and develop conversation tools using artificial intelligence while including patient perspectives by setting up boards of experiential experts in 8 different countries. …”
    Get full text
    Article
  6. 1366

    Big Data Analytics for Mental Health Education: A New Framework for University-Level Evaluation under Linguistic Confidence Interval Neutrosophic Numbers by Hong Zhu

    Published 2025-05-01
    “…Ten criteria—including accessibility, awareness, analytics integration, and data ethics—are used to evaluate a diverse set of intervention alternatives ranging from AI-based detection systems to immersive VR training. …”
    Get full text
    Article
  7. 1367

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  8. 1368

    New method for file deduplication in cloud storage by Chao YANG, Qian JI, Si-chun XIONG, Mao-zhen LIU, Jian-feng MA, Qi JIANG, Lin BAI

    Published 2017-03-01
    “…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
    Get full text
    Article
  9. 1369

    Characterizing the neighborhood risk environment in multisite clinic-based cohort studies: A practical geocoding and data linkages protocol for protected health information. by Ariann Nassel, Marta G Wilson-Barthes, Chanelle J Howe, Sonia Napravnik, Michael J Mugavero, Deana Agil, Akilah J Dulin

    Published 2022-01-01
    “…<h4>Background</h4>Maintaining patient privacy when geocoding and linking residential address information with neighborhood-level data can create challenges during research. …”
    Get full text
    Article
  10. 1370

    FedCVG: a two-stage robust federated learning optimization algorithm by Runze Zhang, Yang Zhang, Yating Zhao, Bin Jia, Wenjuan Lian

    Published 2025-05-01
    “…Abstract Federated learning provides an effective solution to the data privacy issue in distributed machine learning. …”
    Get full text
    Article
  11. 1371

    Automatic Traffic Data Collection under Varying Lighting and Temperature Conditions in Multimodal Environments: Thermal versus Visible Spectrum Video-Based Systems by Ting Fu, Joshua Stipancic, Sohail Zangenehpour, Luis Miranda-Moreno, Nicolas Saunier

    Published 2017-01-01
    “…Vision-based monitoring systems using visible spectrum (regular) video cameras can complement or substitute conventional sensors and provide rich positional and classification data. …”
    Get full text
    Article
  12. 1372
  13. 1373

    Private information in public spaces: Facial recognition in the times of smart urban governance by Juliana NOVAES

    Published 2021-02-01
    “…Prior work:  In order to accomplish so, this article analyzes this phenomenon from a capitalism surveillance framework perspective, in light of international data protection standards and with a primary focus on the analysis of the processing of citizens' data in the provision of public services Approach: The main approaches used are literature review and case studies. …”
    Get full text
    Article
  14. 1374

    Integration of smart sensors and IOT in precision agriculture: trends, challenges and future prospectives by Sheikh Mansoor, Shahzad Iqbal, Simona M. Popescu, Song Lim Kim, Yong Suk Chung, Jeong-Ho Baek

    Published 2025-05-01
    “…Precision agriculture presents a viable solution by optimizing resource use, enhancing efficiency, and fostering sustainable practices through data-driven decision-making supported by advanced sensors and Internet of Things (IoT) technologies. …”
    Get full text
    Article
  15. 1375
  16. 1376

    ChatGPT and Artificial Intelligence in Hospital Level Research: Potential, Precautions, and Prospects by Hassaan B. Arshad, Sara A. Butt, Safi U. Khan, Zulqarnain Javed, Khurram Nasir

    Published 2023-11-01
    “…Furthermore, the review discusses the ethical considerations that arise with AI use in health care, including data privacy, AI interpretability, and the risk of AI-induced disparities. …”
    Get full text
    Article
  17. 1377

    Opportunities, challenges, and interventions for agriculture 4.0 adoption by Shanmugam Vijayakumar, Varunseelan Murugaiyan, S. Ilakkiya, Virender Kumar, Raman Meenakshi Sundaram, Rapolu Mahender Kumar

    Published 2025-08-01
    “…Major obstacles include high initial investment costs, fragmented land holdings, diverse cropping systems, limited farmer awareness, lack of technical skills, inadequate digital literacy, complex AI algorithms, unreliable infrastructure, insufficient high-quality training data, poor internet connectivity, data privacy concerns, and a lack of supportive government policies. …”
    Get full text
    Article
  18. 1378

    Application of artificial intelligence in triage in emergencies and disasters: a systematic review by Azadeh Tahernejad, Ali Sahebi, Ali Salehi Sahl Abadi, Mehdi Safari

    Published 2024-11-01
    “…Implementing intelligent triage systems faced challenges such as trust issues, training needs, equipment shortages, and data privacy concerns. Conclusion Developing assessment systems using artificial intelligence enables timely treatment and better resuscitation services for people injured in disasters. …”
    Get full text
    Article
  19. 1379

    Local large language model‐assisted literature mining for on‐surface reactions by Juan Xiang, Yizhang Li, Xinyi Zhang, Yu He, Qiang Sun

    Published 2025-03-01
    “…Herein, we introduce a method for extracting scientific data from unstructured texts using a local LLM, exemplifying its applications to scientific literatures on the topic of on‐surface reactions. …”
    Get full text
    Article
  20. 1380

    Blockchain-enabled cross-border insurance: from legal issues, solution design, to implementation by Jiaxin Ran, Dechuan Li, Qixin Zheng, Jerome Yen, Yingjie Xue

    Published 2024-05-01
    “…However, when it comes to cross-border insurance service, current solutions fall short in effectively navigating the legal and compliance complexities inherent in cross-border insurance service delivery. When transmitting data across borders, it is essential to adhere to the legal requirements of cross-border laws and regulations, especially considering the variations in regional data protection and privacy legislation. …”
    Get full text
    Article