Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
201
Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design
Published 2020-05-01“…Users are each day more aware of their privacy and data protection. Although this problem is transversal to every digital service, it is especially relevant when critical and personal information is managed, as in eHealth and well-being services. …”
Get full text
Article -
202
A Data Protection Method for the Electricity Business Environment Based on Differential Privacy and Federal Incentive Mechanisms
Published 2025-06-01“…However, traditional evaluation systems have limitations, with the issue of “data silos” being prominent, and user privacy under federated learning is also at risk. …”
Get full text
Article -
203
Worldwide willingness to share health data high but privacy, consent and transparency paramount, a meta-analysis
Published 2025-08-01“…Articles were included if they quantitatively examined the primary outcome; the public’s willingness to share health data for secondary use, while secondary outcomes included demographic and perception measures associated with willingness to share. …”
Get full text
Article -
204
Membership Inference Attacks Fueled by Few-Shot Learning to Detect Privacy Leakage and Address Data Integrity
Published 2025-05-01“…Deep learning models have an intrinsic privacy issue as they memorize parts of their training data, creating a privacy leakage. …”
Get full text
Article -
205
Federated Analysis With Differential Privacy in Oncology Research: Longitudinal Observational Study Across Hospital Data Warehouses
Published 2025-07-01“…Despite some pioneering work, federated analytics is still not widely used on real-world data, and to our knowledge, no real-world study has yet combined it with other privacy-enhancing techniques such as differential privacy (DP). …”
Get full text
Article -
206
FWFA: Fairness-Weighted Federated Aggregation for Privacy-Aware Decision Intelligence
Published 2025-01-01“…As machine learning (ML) and artificial intelligence (AI) increasingly influence such decisions, promoting responsible AI that minimizes bias while preserving data privacy has become essential. However, existing fairness-aware models are often centralized or ill-equipped to handle non-IID data, limiting their real-world applicability. …”
Get full text
Article -
207
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article -
208
Blockchain-Enhanced Privacy and Security in Electronic Health Records: A Scalable Framework for Decentralised Data Management
Published 2025-07-01“…The framework uniquely integrates a sidechain-enabled blockchain architecture with hybrid encryption (AES-256/RSA and ECC), optimising both scalability and data protection, and is validated using the real-world MIMIC-III dataset. …”
Get full text
Article -
209
A Tailored Compliance Solution for Securing Personal Data privacy under Law 18-07 in Algeria
Published 2025-04-01“…The rapid flow of information and the ubiquity of technology pose significant challenges to data security and privacy. In response to these concerns, the Algerian state enacted Law 18-07 on June 10, 2018, aimed at protecting individuals concerning the processing of their data. …”
Get full text
Article -
210
Privacy in consumer wearable technologies: a living systematic analysis of data policies across leading manufacturers
Published 2025-06-01“…In this study, we systematically evaluated the privacy policies of 17 leading wearable technology manufacturers using a novel rubric comprising 24 criteria across seven dimensions: transparency, data collection purposes, data minimization, user control and rights, third-party data sharing, data security, and breach notification. …”
Get full text
Article -
211
PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services
Published 2023-12-01“…However, while cloud server provides convenience and stability, it also leads to data security and user privacy leakage. Aiming at the problems of insufficient privacy protection and inefficient query in the existing LBS data outsourcing schemes, this paper presents a novel privacy-preserving top-k query for outsourcing situations. …”
Get full text
Article -
212
Efficient Privacy-Preserving Range Query With Leakage Suppressed for Encrypted Data in Cloud-Based Internet of Things
Published 2024-01-01“…To protect user privacy, the acquired data may be encrypted; however, this often presents challenges for efficiently searching the data. …”
Get full text
Article -
213
-
214
Spatio-Temporal Joint Planning for Integrated Energy Systems with Internet Data Center Considering Privacy Preservation
Published 2025-04-01“…However, because both IDC and integrated energy systems (IES) possess underlying user information, data leakage may lead to various risks. Therefore, when designing collaborative optimization solutions for IDCs and IES, it is essential to consider the privacy preservation of both systems. …”
Get full text
Article -
215
Privacy-preserving multi-party data joint analysis scheme based on multiset operations in smart contracts
Published 2025-07-01“…However, the demand for multi-party data joint analysis within these contracts faces challenges of privacy leakage and malicious deception. …”
Get full text
Article -
216
Enhanced Consumer Healthcare Data Protection Through AI-Driven TinyML and Privacy-Preserving Techniques
Published 2025-01-01“…The proposed method with TinyML looks at patient data, like ECG readings and reports of unusual heartbeats, right on local edge devices that have limited resources, enabled immediate privacy checks while using minimal computing power. …”
Get full text
Article -
217
Approaches to Federated Computing for the Protection of Patient Privacy and Security Using Medical Applications
Published 2022-01-01“…The aim of this study is that Medical Applications claims no data is transferred, thereby protecting privacy. …”
Get full text
Article -
218
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01“…Data security and privacy are crucial for the Internet of Medical Things (IoMT) and the digitization of healthcare systems. …”
Get full text
Article -
219
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
Published 2025-05-01“…Experimental results indicate that the proposed solution offers robust resistance to various attacks, including replay attacks and data exposure, providing a robust and privacy‐centric solution for carpooling services.…”
Get full text
Article -
220
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
Published 2025-08-01“…To address these issues, this paper proposes a system that ensures patient anonymity through secure credentials and advanced fraud detection mechanisms. Privacy is preserved using cryptographic techniques such as secure hashing and anonymous credentials, which ensure that sensitive patient information remains confidential throughout the claim process. …”
Get full text
Article