Showing 121 - 140 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.11s Refine Results
  1. 121

    Towards Self-Awareness Privacy Protection for Internet of Things Data Collection by Kok-Seng Wong, Myung Ho Kim

    Published 2014-01-01
    “…IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. …”
    Get full text
    Article
  2. 122

    On the fidelity versus privacy and utility trade-off of synthetic patient data by Tim Adams, Colin Birkenbihl, Karen Otte, Hwei Geok Ng, Jonas Adrian Rieling, Anatol-Fiete Näher, Ulrich Sax, Fabian Prasser, Holger Fröhlich

    Published 2025-05-01
    “…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
    Get full text
    Article
  3. 123

    A scoping review of privacy and utility metrics in medical synthetic data by Bayrem Kaabachi, Jérémie Despraz, Thierry Meurers, Karen Otte, Mehmed Halilovic, Bogdan Kulynych, Fabian Prasser, Jean Louis Raisaro

    Published 2025-01-01
    “…Abstract The use of synthetic data is a promising solution to facilitate the sharing and reuse of health-related data beyond its initial collection while addressing privacy concerns. …”
    Get full text
    Article
  4. 124

    Reconsidering big data security and privacy in cloud and mobile cloud systems by Lo'ai A. Tawalbeh, Gokay Saldamli

    Published 2021-09-01
    “…Secondly, we explore the use of P2P Cloud System (P2PCS) for big data processing and analytics. …”
    Get full text
    Article
  5. 125

    Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection by Lusheng Shi, Kai Li, Huibo Zhu

    Published 2023-01-01
    “…Data fusion and privacy protection technologies are both the research focuses in the field of wireless sensor networks. …”
    Get full text
    Article
  6. 126

    Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data by Shiyue Qin, Fucai Zhou, Zongye Zhang, Zifeng Xu

    Published 2020-01-01
    “…Substring searching on gene sequence data is widely used for analyzing the association between a list of gene mutations and a specific disease. …”
    Get full text
    Article
  7. 127

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. …”
    Get full text
    Article
  8. 128

    A hybrid-security model for privacy-enhanced distributed data mining by Tanzeela Javid, Manoj Kumar Gupta, Abhishek Gupta

    Published 2022-06-01
    “…The accuracy obtained in classification task and clustering task using naïve Bayes and k-means technique is high when different datasets in a privacy-enhanced distributed data mining environment verify the working of the hybrid security model.…”
    Get full text
    Article
  9. 129

    Data Fusion Algorithm of Privacy Protection Based on Qos and Multilayers Hierarchically by Li Li, Qin Qin, Li Hua, Li Jian

    Published 2013-12-01
    “…Because of the special nature of wireless sensor networks, data fusion process is vulnerable to attacks by the destroyer, which is useful for reducing the network communication overhead and improving the data transmission efficiency. …”
    Get full text
    Article
  10. 130
  11. 131

    The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing by Ping Chen, Jingjing Hu, Zhitao Wu, Ruoting Xiong, Wei Ren

    Published 2024-01-01
    “…Negative information selection is an approach to protect the privacy by using negative information to replace original information. …”
    Get full text
    Article
  12. 132

    Promoting sustainable and personalized travel behaviors while preserving data privacy by Cláudia Brito, Noela Pina, Tânia Esteves, Ricardo Vitorino, Inês Cunha, João Paulo

    Published 2025-03-01
    “…With this, three main challenges emerge: (i) increase users’ awareness regarding their carbon footprint, (ii) provide personalized recommendations and incentives for using sustainable transportation alternatives and, (iii) guarantee that any personal data collected from the user is kept private.This paper addresses these challenges by proposing a new methodology. …”
    Get full text
    Article
  13. 133

    A systematic review of data privacy in Mobility as a Service (MaaS) by Zineb Garroussi, Antoine Legrain, Sébastien Gambs, Vincent Gautrais, Brunilde Sansò

    Published 2025-05-01
    “…Using the PRISMA framework, a comprehensive literature search across Web of Science, Elsevier, and IEEE Xplore databases resulted in the selection of 32 studies for detailed analysis.The review is structured around three main themes: (1) Privacy-Preserving Techniques, including anonymization strategies (k-anonymity, differential privacy, obfuscation), encryption methods (blockchain, cryptographic protocols), federated learning for decentralized data processing, and advanced algorithms for optimizing privacy budgets and balancing utility-privacy trade-offs; (2) User Trust and Privacy Perceptions, highlighting that trust in service providers is essential for MaaS adoption, privacy concerns may impact adoption but do not necessarily prevent it (the “privacy paradox”), and awareness of data misuse affects user trust and willingness to adopt MaaS; and (3) Regulatory Frameworks, focusing on the importance of GDPR compliance to ensure strict data protection through consent and transparency, and embedding privacy-by-design principles within MaaS architectures to safeguard user data from the outset.This review emphasizes the need for a holistic approach, integrating technological innovation, user-centered design, and strong regulatory oversight to effectively address privacy challenges in MaaS. …”
    Get full text
    Article
  14. 134

    Sentimental analysis based federated learning privacy detection in fake web recommendations using blockchain model by Jitendra Kumar Samriya, Amit Kumar, Ashok Bhansali, Meena Malik, Varsha Arya, Wadee Alhalabi, Bassma Saleh Alsulami, Brij B. Gupta

    Published 2025-04-01
    “…This work offers an experimental analysis of diverse sentiment data-driven fake recommendation datasets, evaluating performance using accuracy, precision, recall, and F-measure metrics. …”
    Get full text
    Article
  15. 135

    K-Means Clustering with Local Distance Privacy by Mengmeng Yang, Longxia Huang, Chenghua Tang

    Published 2023-12-01
    “…K-means clustering has been widely used for cluster analysis in real life. However, these analyses are based on users’ data, which disclose users’ privacy. …”
    Get full text
    Article
  16. 136

    Privacy-Preserving Modeling of Trajectory Data: Secure Sharing Solutions for Trajectory Data Based on Granular Computing by Yanjun Chen, Ge Zhang, Chengkun Liu, Chunjiang Lu

    Published 2024-11-01
    “…Meanwhile, this work demonstrates the practical applications of the solution for the secure sharing of trajectory data. It integrates trajectory data with economic data using the Takagi–Sugeno fuzzy rule model to fit and predict regional economies, thereby verifying the feasibility of the granular computing model based on differential privacy and ensuring the privacy and security of users’ trajectory information. …”
    Get full text
    Article
  17. 137
  18. 138
  19. 139

    On the research for big data uses for public good purposes by Adeline Decuyper

    Published 2016-12-01
    “…Finally, aside from the opportunities, the mass production and use of data has also brought many challenges, such as evaluating the representativity of the data or handling threats to the privacy of users, that we will discuss in the last section of this article.…”
    Get full text
    Article
  20. 140

    Context-Contingent Privacy Concerns and Exploration of the Privacy Paradox in the Age of AI, Augmented Reality, Big Data, and the Internet of Things: Systematic Review by Christian Herriger, Omar Merlo, Andreas B Eisingerich, Annisa Rizkia Arigayota

    Published 2025-05-01
    “… BackgroundDespite extensive research into technology users’ privacy concerns, a critical gap remains in understanding why individuals adopt different standards for data protection across contexts. …”
    Get full text
    Article