Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
641
Artificial Intelligence and Politics: Legal Dilemmas and Risks to Democracy
Published 2025-04-01Get full text
Article -
642
Dynamic selectout and voting-based federated learning for enhanced medical image analysis
Published 2025-01-01“…Federated learning (FL) is a promising technique for training machine learning models on distributed, privacy-aware datasets. Nevertheless, FL faces difficulties with agent/client participation, model performance, and the heterogeneous nature of networked data sources when it comes to distributed healthcare systems. …”
Get full text
Article -
643
Vehicle Trajectory Generation Based on Generation Adversarial Network
Published 2024-06-01“…However, the exposure of vehicle location information also raises important privacy issues. Current typical methods for protecting vehicle location privacy protection methods such as anonymity and pseudonymity, still carry the risk of the vehicle being tracked, leading to data security issues. …”
Get full text
Article -
644
Private Stochastic Optimization with Large Worst-Case Lipschitz Parameter
Published 2025-03-01Get full text
Article -
645
Hybrid Optimization Machine Learning Framework for Enhancing Trust and Security in Cloud Network
Published 2024-01-01“…The rapidly evolving field of cloud-based data sharing faces critical challenges in ensuring comprehensive privacy protection and trust for both data producers and seekers. …”
Get full text
Article -
646
Secured cloud-based image data processing of self-driving vehicles using full homomorphic encryption
Published 2025-10-01“…Self-driving vehicles leverage internet of things (IoT) technology to utilize multiple sensors to continuously monitor their environment and make decisions without human intervention. Data collected from these sensors require secure transmission and encrypted storage in cloud servers, where retrieving the data without decryption is necessary to ensure privacy. …”
Get full text
Article -
647
Assessing the Fidelity and Utility of Water Systems Data Using Generative Adversarial Networks: A Technical Review
Published 2025-01-01“…This review paper addresses this limitation by utilizing Generative Adversarial Networks (GANs) to generate realistic synthetic datasets, overcoming data scarcity and privacy concerns in WDSs. We review, train, and evaluate seven state-of-the-art GAN models using three multivariate time-series datasets. …”
Get full text
Article -
648
Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach
Published 2025-02-01“…Abstract Homomorphic Encryption (HE) offers a revolutionary cryptographic approach to safeguarding privacy in machine learning (ML), especially in processing sensitive healthcare data. …”
Get full text
Article -
649
-
650
Travel Behavior during the 2021 British Columbia Floods Using De-identified Network Mobility Data
Published 2024-05-01“…This study investigates residents’ emergent travel behavior before, during, and after the 2021 British Columbia Floods. Using de-identified network mobility data, we analyze travel patterns centered around the municipality of Hope in British Columbia, Canada. …”
Get full text
Article -
651
Predicting Alzheimer's Disease onset: A machine learning framework for early diagnosis using biomarker data
Published 2025-01-01Get full text
Article -
652
AN APPROACH PRIORITIZING THE CAUSAL FACTORS OF LARGE SCALED DATA USING SOFT COMPUTING: A CASE STUDY
Published 2021-12-01Get full text
Article -
653
Fused federated learning framework for secure and decentralized patient monitoring in healthcare 5.0 using IoMT
Published 2025-07-01“…Abstract Federated Learning (FL) enables artificial intelligence frameworks to train on private information without compromising privacy, which is especially useful in the medical and healthcare industries where the knowledge or data at hand is never enough. …”
Get full text
Article -
654
Social media in health care- - Ethically challenging - -Dangerous but attractive- -use with caution
Published 2023-09-01Get full text
Article -
655
An efficient secure predictive demand forecasting system using Ethereum virtual machine
Published 2024-12-01“…The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. …”
Get full text
Article -
656
Scalable architecture for autonomous malware detection and defense in software-defined networks using federated learning approaches
Published 2025-08-01“…This architecture combines SDN’s centralized management of potentially significant data streams with FL’s decentralized, privacy-preserving learning capabilities in a distributed manner adaptable to varying time and space constraints. …”
Get full text
Article -
657
Security and privacy in online teaching during the COVID-19 pandemic: experiences and concerns of academics in Saudi higher education
Published 2024-11-01“…The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. …”
Get full text
Article -
658
Old MacDonald and His Hackable Smartphone Application: A Security and Privacy Analysis of Android Agriculture Applications
Published 2025-01-01“…Despite the widespread use of smartphones among farmers increasing from 77% in 2021 to 82% in 2023, minimal research has examined the security and privacy implications of agricultural smartphone applications, potentially used on these devices. …”
Get full text
Article -
659
Collaborative and privacy-preserving cross-vendor united diagnostic imaging via server-rotating federated machine learning
Published 2025-08-01“…Abstract Federated Learning (FL) is a distributed framework that enables collaborative training of a server model across medical data vendors while preserving data privacy. However, conventional FL faces two key challenges: substantial data heterogeneity among vendors and limited flexibility from a fixed server, leading to suboptimal performance in diagnostic-imaging tasks. …”
Get full text
Article -
660
Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR) System
Published 2011-01-01“…The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. …”
Get full text
Article