Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
1
Privacy-Conducive Data Ecosystem Architecture: By-Design Vulnerability Assessment Using Privacy Risk Expansion Factor and Privacy Exposure Index
Published 2025-06-01“…The increasing complexity of data ecosystems demands advanced methodologies for systematic privacy risk assessment. …”
Get full text
Article -
2
Solving Truthfulness-Privacy Trade-Off in Mixed Data Outsourcing by Using Data Balancing and Attribute Correlation-Aware Differential Privacy
Published 2025-01-01“…Anonymization methods are mostly used in data outsourcing to protect privacy; however, it is very hard to apply anonymity to datasets of poor quality while maintaining an equilibrium between privacy, utility, and truthfulness (i.e., ensuring the values in anonymized data are consistent with the real data). …”
Get full text
Article -
3
Crowdsourced data leaking user's privacy while using anonymization technique
Published 2025-04-01“…However, this may pose privacy risks to data owners, even though the data collectors usually anonymize the data before crowdsourcing. …”
Get full text
Article -
4
Addressing contemporary threats in anonymised healthcare data using privacy engineering
Published 2025-03-01Get full text
Article -
5
Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage
Published 2014-01-01“…Researchers are able to obtain valuable information that they would not otherwise be able to access; however, privacy concerns arise when sharing clinical data in these outsourced publicly available data storage services. …”
Get full text
Article -
6
INSURANCE DEVELOPMENTS IN THE LIGHT OF DATA USE
Published 2023-12-01“…It aims to assess the extent to which existing legal regulations can safeguard policyholders from potential mistreatment resulting from the use of such methodologies. The study concludes that despite the safeguards offered by data and consumer protection laws, the unregulated and unconstrained application of data analytics and algorithms in risk evaluation could potentially harm policyholders by infringing on their privacy and leading to discrimination, thereby impinging on their rights.…”
Get full text
Article -
7
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
Published 2023-12-01“…Linkage attack is a type of dominant attack in the privacy domain, which can leverage various data sources for private data mining. …”
Get full text
Article -
8
Design of Privacy Preservation Model for Data Stream Using Condensation Based Anonymization
Published 2025-08-01“…The condensation method minimizes lost information throughout the anonymization process in an effort to maintain the statistical features of the data. Using generalization and suppression approaches, k-Anonymity obscures identifying information in datasets, making it a useful tool for protecting individual privacy. …”
Get full text
Article -
9
Privacy-preserving recommender system using the data collaboration analysis for distributed datasets.
Published 2025-01-01“…To this end, we establish a framework for privacy-preserving recommender systems using the data collaboration analysis of distributed datasets. …”
Get full text
Article -
10
Survey of split learning data privacy
Published 2024-06-01“…In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. …”
Get full text
Article -
11
Can Synthetic Data Protect Privacy?
Published 2025-01-01“…To systematically evaluate the privacy protection performance of synthetic data generation algorithms (Synthpop, CTGAN, RTVAE, TVAE, DataSynthesizer), this study applied various safety metrics. …”
Get full text
Article -
12
-
13
Adaptive personalized privacy-preserving data collection scheme with local differential privacy
Published 2024-04-01“…Local differential privacy (LDP) is a state-of-the-art privacy notion that enables terminal participants to share their private data safely while controlling the privacy disclosure at the source. …”
Get full text
Article -
14
Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering
Published 2020-02-01“…In this article, a novel scheme for data hiding in encrypted domain is proposed using fuzzy C-means clustering and compressive sensing technologies to protect privacy of the host image. …”
Get full text
Article -
15
Enhance differential privacy mechanisms for clinical data analysis using CNNs and reinforcement learning
Published 2025-07-01“…The primary emphasis is on predicting and optimizing ventilation and sedation strategies for patients in Intensive Care Units. We safeguard patient data in the MIMIC-III dataset while preserving analytical utility by integrating differential privacy techniques, such as Gaussian, Laplace, Exponential, Zero-Concentrated, and Rényi mechanisms. …”
Get full text
Article -
16
Privacy-Preserving Healthcare Data Interactions: A Multi-Agent Approach Using LLMs
Published 2025-03-01“…This study builds on prior research [1] by introducing a multi-agent system that uses Large Language Models (LLMs) for secure interactions with healthcare data. …”
Get full text
Article -
17
Protecting Privacy on Social Media: Mitigating Cyberbullying and Data Heist Through Regulated Use and Detox, with a Mediating Role of Privacy Safety Motivations
Published 2024-12-01“…Information theft and cyberbullying pose significant threats to users’ privacy on social media. This study applies Protection Motivation Theory (PMT) to explore how online information disclosure awareness and privacy concerns influence protective actions, such as regulated social media usage and detoxification, in response to negative experiences like data heist and cyberbullying. …”
Get full text
Article -
18
An accuracy-privacy optimization framework considering user’s privacy requirements for data stream mining
Published 2025-06-01“…Additionally, a data fitting module using kernel regression is integrated, a unique approach that predicts accuracy levels based on user-defined privacy thresholds. …”
Get full text
Article -
19
Exploring the association between cultural values and the intention to use digital data wallets
Published 2025-12-01“…We developed a model to examine the intention to use digital data wallets – new privacy-enhancing tools based on the privacy calculus theory and Hofstede's cultural values. …”
Get full text
Article -
20
Data Anonymization and Privacy Preservation in Healthcare Systems
Published 2025-01-01“…With the objective to identify key trends and driving factors, a bibliometric analysis was performed using VOSviewer, which focuses on prominent authors, dominant research topics, and collaborative networks in data privacy. …”
Get full text
Article