Showing 1,761 - 1,780 results of 2,784 for search '"\"\\"(((\\\"use OR \\\"used)s privacy data\\\") OR ((\\\"use OR \\\"used) privacy data\\\"))\\"\""', query time: 0.19s Refine Results
  1. 1761

    Who owns Internet of Thing devices? by Yuxuan Jia, Bing Han, Qiang Li, Hong Li, Limin Sun

    Published 2018-11-01
    “…We propose to automatically extract owner annotation by utilizing a set of techniques (network scanning, machine learning, and natural language processing). We use the probing and classifier to determine whether the response data come from an IoT device. …”
    Get full text
    Article
  2. 1762

    Human activity recognition algorithm based on the spatial feature for WBAN by Chi JIN, Zhijun LI, Dayang SUN, Fengye HU

    Published 2019-09-01
    “…Traditional image-based activity recognition algorithms have some problems,such as high computational cost,numerous blind spots and easy privacy leakage.To solve the problem above,the CCLA (convolution-convolutional long short-term memory-attention) activity recognition algorithm based on the acceleration and gyroscope data was proposed.The convolutional neural network was used to extract spatial features of activity data and got the hidden time series information from the convolutional long short-term memory network.Simulating human brain selecting attention mechanism,attention-encoder was constructed to extract the spatial and temporal features at a higher level.The CCLA algorithm was tested on UCI-HAPT (university of California Irvine-smartphone-based recognition of human activities and postural transitions) public data set,and realized the classification of 12 types of activity with the accuracy of 93.27%.…”
    Get full text
    Article
  3. 1763

    Enhancing Smart Home Security: Blockchain-Enabled Federated Learning with Knowledge Distillation for Intrusion Detection by Mohammed Shalan, Md Rakibul Hasan, Yan Bai, Juan Li

    Published 2025-02-01
    “…The increasing adoption of smart home devices has raised significant concerns regarding privacy, security, and vulnerability to cyber threats. …”
    Get full text
    Article
  4. 1764

    ASKfm: Motives of Self-Disclosure to Anonymous Questions by Pheseline Felim, Dindin Dimyati, Mohammad Shihab

    Published 2018-11-01
    “…By using in-depth interview, data were collected from three males and three females aged 18 to 24 years old. …”
    Get full text
    Article
  5. 1765

    Problems and Prospects of Mobile Technologies in the Digital Space of Scientific Knowledge in Libraries by A. Yu. Gerasimenko

    Published 2022-12-01
    “…They are: financial constraints, inefficiency of the IT infrastructure, violation of the privacy and leakage of personal data, lack of qualified personnel, apathy of users. …”
    Get full text
    Article
  6. 1766

    Elements of a Digital Urbanisation Strategy for Türkiye: Evidence from Psychometric Testing by Fatih Eren, Kübra Çay

    Published 2025-02-01
    “…The research indicates that an ideal grassroots-based digital urbanism strategy for Türkiye should focus on people, use technology to ease everyday activities, maintain personal data privacy, be adaptable, encourage diversity, provide freedom and opportunities, protect the city’s heritage, and strive for sustainability. …”
    Get full text
    Article
  7. 1767

    Harnessing real-world evidence in pharmacoeconomics: A comprehensive review by Bhatia Nitish

    Published 2024-11-01
    “…Regulatory perspectives from agencies like the Food and Drug Administration and European Medicines Agency, as well as ethical and privacy considerations are also reviewed. Emerging trends, such as the integration of artificial intelligence and patient-generated data, offer new opportunities for enhancing the use of RWE in healthcare. …”
    Get full text
    Article
  8. 1768

    Artificial Intelligence for Drug Discovery Accelerating the Development of New Pharmaceuticals by Basri T. Syeda Jeelani, Kulkarni Adokshaja Krishnarao, K Renuka, B Yamini Supriya, R V Kavya, A Buckshumiyan

    Published 2025-01-01
    “…However, despite its potential, current AI can cause several challenges, including small-scale validation, AI bias, data privacy, regulatory compliance, as well as scalability and integration into clinical practice. …”
    Get full text
    Article
  9. 1769

    Simultaneous text and gesture generation for social robots with small language models by Alessio Galatolo, Alessio Galatolo, Katie Winkle

    Published 2025-05-01
    “…By abstracting gesture generation and eliminating reliance on platform-specific motion data, we enable broader applicability in real-world, low-resource, and privacy-sensitive HRI settings.…”
    Get full text
    Article
  10. 1770

    Feasibility of a computerized clinical decision support system delivered via a socially assistive robot during grand rounds: A pilot study by Valentino Šafran, Urška Smrke, Bojan Ilijevec, Samo Horvat, Vojko Flis, Nejc Plohl, Izidor Mlakar

    Published 2025-04-01
    “…Background Adopting Clinical Decision Support Systems in healthcare faces challenges such as complexity, poor integration with workflows, and concerns about data privacy and quality. Issues such as too many alerts, confusing errors, and difficulty using the technology in front of patients make adoption challenging and prevent it from fitting into daily workflows. …”
    Get full text
    Article
  11. 1771

    The Intersection of AI, Ethics, and Journalism: Greek Journalists’ and Academics’ Perspectives by Panagiota (Naya) Kalfeli, Christina Angeli

    Published 2025-01-01
    “…Regarding ethical concerns, there is evident skepticism and caution among journalists and academics about issues, such as, data bias, transparency, privacy, and copyright, which are further intensified by the absence of a regulatory framework.…”
    Get full text
    Article
  12. 1772

    Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations by Shi-Feng Sun, Chen Lyu, Dawu Gu, Yuanyuan Zhang, Yanli Ren

    Published 2015-01-01
    “…This convenience comes at the cost of some serious security and privacy issues. In this work, we propose a novel privacy-preserving scheme for MSNs, which can efficiently solve some of the most serious security and privacy issues such as data confidentiality, fine-grained access control, and flexible revocation. …”
    Get full text
    Article
  13. 1773

    An Unscented Kalman Filter-Based Method for Reconstructing Vehicle Trajectories at Signalized Intersections by Jiantao Mu, Yin Han, Cheng Zhang, Jiao Yao, Jing Zhao

    Published 2021-01-01
    “…Therefore, the method enables us to obtain richer and more accurate trajectory data information, providing a strong prior basis for future urban road traffic management and scholars using trajectory data for various studies.…”
    Get full text
    Article
  14. 1774

    Teachers and Learners’ Perceptions about Implementation of AI Tools in Elementary Mathematics Classes by Xuejing Song, Joonkong Mak, Haowei Chen

    Published 2025-05-01
    “…Apart from several advantages, the findings highlighted few reservations about technological issues and ethical privacy concerns. However, the data analysis concludes AI tools implementation visibly enhance elementary mathematics classroom performance with the help of appropriate technology training and reasonable resources. …”
    Get full text
    Article
  15. 1775

    The moderating role of personalized recommendations in the trust–satisfaction–loyalty relationship: an empirical study of AI-driven e-commerce by Noha Hassan, Mohamed Abdelraouf, Dina El-Shihy

    Published 2025-04-01
    “…Design/methodology/approach A quantitative research approach was used to collect data from a diverse group of e-commerce users who had interacted with AI-based recommendation systems. …”
    Get full text
    Article
  16. 1776

    Towards enhancing security for upcoming 6G-ready smart grids through federated learning and cloud solutions by J. Jithish, Nagarajan Mahalingam, Bo Wang, Kiat Seng Yeo

    Published 2025-08-01
    “…However, training DL models with sensitive user data may violate data privacy regulations, necessitating novel approaches. …”
    Get full text
    Article
  17. 1777

    Patient-Centric Approach to Personalized Electronic Medical Records via QR Code in Japan by Yoshihiko Izumida, Takashi Omura, Masahiro Fujiwara, Shoko Nukaya, Akio Yoneyama, Sow Boubacar, Shinichiro Yabe, Rika Noguchi, Shima Nakayama, Wataru Muraoka, Yuki Okuno, Sho Miyashita, Yurika Ishihara, Yuto Moriwaki, Ryoji Otani, Junichiro Adachi, Kenichiro Tanabe, Yoshihisa Yamano, Yasushi Takai, Masaru Honjo

    Published 2024-12-01
    “… Government policies in the United States and the European Union promote standardization and value creation in the use of FAIR (findability, accessibility, interoperability, and reusability) data, which can enhance trust in digital health systems and is crucial for their success. …”
    Get full text
    Article
  18. 1778

    FedGAN: Federated diabetic retinopathy image generation. by Hassan Kamran, Syed Jawad Hussain, Sohaib Latif, Imtiaz Ali Soomro, Mrim M Alnfiai, Nouf Nawar Alotaibi

    Published 2025-01-01
    “…Deep learning models for diagnostic applications require large amounts of sensitive patient data, raising privacy concerns under centralized training paradigms. …”
    Get full text
    Article
  19. 1779

    A lightweight authentication and key agreement scheme for smart grid by Lili Yan, Yan Chang, Shibin Zhang

    Published 2017-02-01
    “…The security of advanced metering infrastructure is special importance for smart grid. In order to achieve data confidentiality, privacy, and authentication in advanced metering infrastructure, a lightweight authentication and key agreement scheme is proposed in this article. …”
    Get full text
    Article
  20. 1780

    Appling A Hybrid Encryption Algorithm in Cloud Computing‎ by Esraa Alobaydi, Muna Jawhar

    Published 2024-06-01
    “…The rapid digital development has led to a steady increase in the use of cloud storage as a ‌primary means of saving and sharing data and files. …”
    Get full text
    Article