Showing 901 - 920 results of 2,784 for search '((((( useddds OR useddds) OR useddds) OR useds) privacy data ) OR ( use privacy data ))', query time: 0.25s Refine Results
  1. 901

    Dynamic Ensemble Selection for EEG Signal Classification in Distributed Data Environments by Małgorzata Przybyła-Kasperek, Jakub Sacewicz

    Published 2025-05-01
    “…This study presents a novel approach to EEG signal classification in distributed environments using dynamic ensemble selection. In scenarios where data dispersion arises due to privacy constraints or decentralized data collection, traditional global modelling is impractical. …”
    Get full text
    Article
  2. 902

    Shopping Data for Population Health Surveillance: Opportunities, Challenges, and Future Directions by Alisha Suhag, Romana Burgess, Anya Skatova

    Published 2025-08-01
    “…This paper explores the potential of loyalty card data to strengthen public health surveillance across 4 key behavioral risk domains: diet, alcohol, tobacco, and over-the-counter medication use. …”
    Get full text
    Article
  3. 903

    Comprehensive testing of large language models for extraction of structured data in pathology by Bastian Grothey, Jan Odenkirchen, Adnan Brkic, Birgid Schömig-Markiefka, Alexander Quaas, Reinhard Büttner, Yuri Tolkach

    Published 2025-03-01
    “…While recent studies show promise in using advanced language models for structuring pathology data, they primarily rely on proprietary models, raising cost and privacy concerns. …”
    Get full text
    Article
  4. 904

    SHARE: An ethical framework for equitable data sharing in Caribbean health research by Michael H. Campbell, Natalie S. Greaves

    Published 2024-12-01
    “…Using the SHARE framework can support regionally relevant and culturally responsive work already underway in the region and further develop capacity for intentional sharing and (re)use of Caribbean health data.…”
    Get full text
    Article
  5. 905

    Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization by Ahmad Musamih, Khaled Salah, Raja Jayaraman, Samer Ellaham, Mohammed Omar, Ibrar Yaqoob

    Published 2025-01-01
    “…In this paper, we propose a blockchain and NFT-based solution that addresses the challenges of managing, sharing, and monetizing genomic data while preserving privacy using Threshold Cryptography and Fully Homomorphic Encryption (FHE). …”
    Get full text
    Article
  6. 906

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
    Get full text
    Article
  7. 907

    Generating and evaluating synthetic data in digital pathology through diffusion models by Matteo Pozzi, Shahryar Noei, Erich Robbi, Luca Cima, Monica Moroni, Enrico Munari, Evelin Torresani, Giuseppe Jurman

    Published 2024-11-01
    “…Abstract Synthetic data is becoming a valuable tool for computational pathologists, aiding in tasks like data augmentation and addressing data scarcity and privacy. …”
    Get full text
    Article
  8. 908

    Efficient unpaired data validation and aggregation protocol in industrial Internet of things by MA Rong, FENG Tao

    Published 2024-10-01
    “…Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. …”
    Get full text
    Article
  9. 909

    Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges by Mohsen Marjani, Fariza Nasaruddin, Abdullah Gani, Ahmad Karim, Ibrahim Abaker Targio Hashem, Aisha Siddiqa, Ibrar Yaqoob

    Published 2017-01-01
    “…However, such data are not useful without analytic power. Numerous big data, IoT, and analytics solutions have enabled people to obtain valuable insight into large data generated by IoT devices. …”
    Get full text
    Article
  10. 910

    A Web-Based Application for Smart City Data Analysis and Visualization by Panagiotis Karampakakis, Despoina Ioakeimidou, Periklis Chatzimisios, Konstantinos A. Tsintotas

    Published 2025-05-01
    “…Smart cities are urban areas that use contemporary technology to improve citizens’ overall quality of life. …”
    Get full text
    Article
  11. 911

    A COMPREHENSIVE REVIEW OF GENERATIVE ARTIFICIAL INTELLIGENCE APPLICATIONS IN DATA VISUALIZATION by Luong Thi Minh Hue*, Nguyen The Vinh, Nguyen Van Viet, Nguyen Huu Khanh, Nguyen Kim Son, Duong Thuy Huong

    Published 2025-06-01
    “…Using natural language to generate visual representations of data (NL2VIS) is emerging as a promising research direction, driven by the rapid development of Generative AI (GenAI). …”
    Get full text
    Article
  12. 912

    PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing by Sreeja Cherillath Sukumaran, Mohammed Misbahuddin

    Published 2021-05-01
    “…Mobile Cloud Computing (MCC) allows users more possibilities to access services conveniently. But data security and privacy issues still act as barriers for adoption to cloud technology when dealing with confidential data. …”
    Get full text
    Article
  13. 913

    A Remedy for Heterogeneous Data: Clustered Federated Learning with Gradient Trajectory by Ruiqi Liu, Songcan Yu, Linsi Lan, Junbo Wang, Krishna Kant, Neville Calleja

    Published 2024-12-01
    “…Federated Learning (FL) has recently attracted a lot of attention due to its ability to train a machine learning model using data from multiple clients without divulging their privacy. …”
    Get full text
    Article
  14. 914

    Trusted access control mechanism for data with blockchain-assisted attribute encryption by Chang Liu, Dong Wang, Da Li, Shaoyong Guo, Wenjing Li, Xuesong Qiu

    Published 2025-06-01
    “…Ciphertext policy attribute-based encryption (CP-ABE) model is widely used in cloud data sharing scenarios, but there are problems such as privacy leakage of access policy, irrevocability of user or attribute, key escrow, and trust bottleneck. …”
    Get full text
    Article
  15. 915

    An Artificial Intelligence Pipeline for Hepatocellular Carcinoma: From Data to Treatment Recommendations by Zhang X, Yang L, Liu C, Yuan X, Zhang Y

    Published 2025-07-01
    “…However, challenges such as data quality, standardization, and privacy remain. …”
    Get full text
    Article
  16. 916
  17. 917

    Securing the metaverse: Machine learning–based perspectives on risk, trust, and governance by Krishnashree Achuthan, Sasangan Ramanathan, Raghu Raman

    Published 2025-12-01
    “…The rapid expansion of the metaverse presents significant cybersecurity and privacy challenges, requiring structured, data-driven analysis. …”
    Get full text
    Article
  18. 918

    C-mixture and multi-constraints based genetic algorithm for collaborative data publishing by Yogesh R. Kulkarni, T. Senthil Murugan

    Published 2018-04-01
    “…In order to apply the proposed privacy measure to privacy preserving data publishing, a new algorithm called, CPGEN is developed using genetic algorithm and multi-objective constraints. …”
    Get full text
    Article
  19. 919

    A novel ε-sensitive correlation indistinguishable scheme for publishing location data. by Wang Bin, Zhang Lei, Zhang Guoyin

    Published 2019-01-01
    “…So the published data had to be disposed to protect the privacy. In order to cope with this problem, a number of algorithms based on the strategy of k-anonymity were proposed, but this is not enough for the privacy protection, as the correlation between the sensitive region and the background knowledge can be used to infer the real location. …”
    Get full text
    Article
  20. 920

    New frontiers in migration statistics: a narrative review on big data’s role by Ahmad Wali Ahmad Yar, Tuba Bircan

    Published 2025-08-01
    “…However, its use remains largely experimental, with key concerns around data access, representativeness, privacy, and the integration with official statistics. …”
    Get full text
    Article