-
41
Mental health apps in India: regulatory landscape and future directions
Published 2025-02-01Subjects: Get full text
Article -
42
EXAMINING THE IMPACT OF AI TECHNOLOGY ON MARKETING STRATEGIES IN FINANCIAL SERVICES
Published 2024-12-01Subjects: Get full text
Article -
43
Dynamic selectout and voting-based federated learning for enhanced medical image analysis
Published 2025-01-01Subjects: Get full text
Article -
44
Fine-tuning a local LLaMA-3 large language model for automated privacy-preserving physician letter generation in radiation oncology
Published 2025-01-01Subjects: Get full text
Article -
45
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
Published 2023-03-01Subjects: Get full text
Article -
46
Federated Learning Approach for Breast Cancer Detection Based on DCNN
Published 2024-01-01Subjects: Get full text
Article -
47
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01Subjects: Get full text
Article -
48
An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks
Published 2014-01-01“…The scheme adopts a symmetric-key homomorphic encryption to protect data privacy and combines it with homomorphic MAC synchronically to check the aggregation data integrity. …”
Get full text
Article -
49
A Privacy Preserving Method in WSN
Published 2013-01-01“…This paper surveyed the general privacy preserving methods from two aspects of location privacy and data privacy in WSN and analyzed their theories and characteristics. …”
Get full text
Article -
50
Privacy protection scheme of DBSCAN clustering based on homomorphic encryption
Published 2021-02-01“…In order to reduce the risk of data privacy leakage in the process of outsourced clustering, a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene, three data preprocessing methods for different data accuracy were given, and a policy for choosing a proper data preprocessing method based on data characteristics, accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption, a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy, and has a higher clustering accuracy rate and lower time overhead.…”
Get full text
Article -
51
Research on ciphertext search for the cloud environment
Published 2013-07-01“…Ciphertext search technology can combine the protection of user data's privacy with the efficient usage of cloud platform services. …”
Get full text
Article -
52
Energy-saving privacy data secure aggregation method
Published 2014-11-01“…For the Internet of things(IoT) secure data aggregation issues,data privacy-preserving and limited computation ability and energy of nodes should be tradeoff.Based on analyzing the pros-and-cons of current works,a low energy-consuming secure data aggregation method (LCSDA) was proposed.This method uses shortest path principle to choose neighbor nodes and generates the data aggregation paths in the cluster based on prim minimum spanning tree algorithm.Simulation results show that this method could effectively cut down energy consumption and reduce the probability of cluster head node being captured,in the same time preserving data privacy.…”
Get full text
Article -
53
Ultra-Short-Term Distributed Photovoltaic Power Probabilistic Forecasting Method Based on Federated Learning and Joint Probability Distribution Modeling
Published 2025-01-01“…Existing methods regarding cluster information sharing tend to easily trigger issues of data privacy leakage during information sharing, or they suffer from insufficient information sharing while protecting data privacy, leading to suboptimal forecasting performance. …”
Get full text
Article -
54
Federated Learning Lifecycle Management for Distributed Medical Artificial Intelligence Applications: A Case Study on Post-Transcatheter Aortic Valve Replacement Complication Predi...
Published 2025-01-01“…Nevertheless, existing legal frameworks and concerns regarding data privacy associated with medical information impose substantial constraints on implementing AI solutions in this domain. …”
Get full text
Article -
55
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
Published 2023-05-01“…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
Get full text
Article -
56
Privacy-Preserving Continual Federated Clustering via Adaptive Resonance Theory
Published 2024-01-01“…With the increasing importance of data privacy protection, various privacy-preserving machine learning methods have been proposed. …”
Get full text
Article -
57
Research on differential privacy protection parameter configuration method based on confidence level
Published 2019-08-01“…In order to solve the problem that the user's real data information is disclosed during the data release and analysis process,and reduce the probability of an attacker gaining real results through differential attacks and probabilistic inference attacks,a differential privacy protection parameter configuration method based on confidence level is proposed.Analysis of attacker confidence under attacker probabilistic inference attack model and make it no higher than the privacy probability threshold set according to the data privacy attribute.The proposed method can configure more reasonable privacy protection parameters for different query privilege of query users,and avoids the risk of privacy disclosure.The experimental analysis shows that the proposed method analyzes the correspondence between attacker confidence level and privacy protection parameters based on query privilege,noise distribution characteristics and data privacy attributes,and derives the configuration formula of privacy protection parameters,which configure the appropriate parameters without violating the privacy protection probability threshold.…”
Get full text
Article -
58
AFM-DViT: A framework for IoT-driven medical image analysis
Published 2025-02-01“…These results highlight the model’s robust detection accuracy while maintaining data privacy. The AFM-DViT model offers an effective solution for secure and efficient medical image analysis in IoT-enabled environments.…”
Get full text
Article -
59
Traffic Sign Recognition in Rainy Conditions Based on Federated Learning
Published 2025-01-01“…The proposed method is demonstrated by experimental results to enhance performance in challenging weather conditions while also maintaining data privacy in machine learning applications. Overall, this paper underscores the potential of integrating federated learning with CNNs to improve traffic sign recognition capabilities.…”
Get full text
Article -
60
Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering
Published 2024-12-01“…It is envisaged that the proposed approach will prolong the lifespan of IoT devices and maintain high accuracy in event detection, all while ensuring robust data privacy.…”
Get full text
Article