Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
221
A Symmetric Projection Space and Adversarial Training Framework for Privacy-Preserving Machine Learning with Improved Computational Efficiency
Published 2025-03-01“…By designing a new projection loss function and combining autoencoders with adversarial training, the proposed method effectively balances privacy protection and model utility. Experimental results show that, for financial time-series data tasks, the model using the projection loss achieves a precision of 0.95, recall of 0.91, and accuracy of 0.93, significantly outperforming the traditional cross-entropy loss. …”
Get full text
Article -
222
Fostering social media user intentions: AI-enabled privacy and intrusiveness concerns
Published 2025-03-01“…Findings – Privacy concerns significantly affect perceived usefulness. …”
Get full text
Article -
223
Balancing Privacy and Performance: A Differential Privacy Approach in Federated Learning
Published 2024-10-01“…Federated learning (FL), a decentralized approach to machine learning, facilitates model training across multiple devices, ensuring data privacy. However, achieving a delicate privacy preservation–model convergence balance remains a major problem. …”
Get full text
Article -
224
Evaluating the effectiveness of data governance frameworks in ensuring security and privacy of healthcare data: A quantitative analysis of ISO standards, GDPR, and HIPAA in blockch...
Published 2025-01-01“…Although there are existing frameworks to govern healthcare data but they have certain limitations in effectiveness of data governance to ensure security and privacy. …”
Get full text
Article -
225
My Holistic Data Share: A WEB3 Data Share Application: Extending Beyond Finance to Privacy-Protected Decentralized Share of Multi-Dimensional Data to Enhance Global Healthcare
Published 2024-08-01“…This paper introduces a concept beyond cryptocurrencies and finance into everyday real-world use cases that need combinatorial access to a person’s holistic data, including financial and health records, genomic data, and advanced directives, among others, that need to be privacy protected and shared with specific actors identified for their roles in the WEB3 ecosystem through decentralized identifiers and non-fungible token badges identifying particular recipients. …”
Get full text
Article -
226
Federated learning for intrusion detection in IoT environments: a privacy-preserving strategy
Published 2025-06-01“…While allowing devices to benefit from the network’s collective insights, this decentralised learning methodology safeguards data privacy. Using a real-world IoT dataset and two popular federated learning algorithms—Federated Average and Federated Average with Momentum—the study assesses the effectiveness of PEIoT-DS. …”
Get full text
Article -
227
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01“…EHR contains a large amount of private information, however, data outsourcing can create security risks, potentially compromising the integrity and privacy of EHR. …”
Get full text
Article -
228
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01“…EHR contains a large amount of private information, however, data outsourcing can create security risks, potentially compromising the integrity and privacy of EHR. …”
Get full text
Article -
229
Privacy‐preserving speaker verification system based on binary I‐vectors
Published 2021-05-01Get full text
Article -
230
Blockchain-Based Privacy-Preserving Authentication and Access Control Model for E-Health Users
Published 2025-03-01“…The advancement of e-health systems has resulted in substantial enhancements in healthcare delivery via effective data management and accessibility. The use of digital health solutions presents dangers to sensitive health information, including unauthorised access, privacy violations, and security weaknesses. …”
Get full text
Article -
231
An enhanced dynamic KC-slice model for privacy preserving data publishing with multiple sensitive attributes by inducing sensitivity
Published 2022-01-01“…Privacy Preserving Data Publishing (PPDP) is an important aspect of real world scenarios. …”
Get full text
Article -
232
Board of Directors Role in Data Privacy Governance: Making the Transition from Compliance Driven to Good Business Stewardship
Published 2024-02-01“…Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. …”
Get full text
Article -
233
Efficient Traceability Systems with Smart Contracts: Balancing On-Chain and Off-Chain Data Storage for Enhanced Scalability and Privacy
Published 2024-11-01“…The hash key method offers significant advantages in reducing blockchain storage costs, enhancing privacy, and maintaining data integrity, but it depends on reliable off-chain storage. …”
Get full text
Article -
234
Heap Bucketization Anonymity—An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes
Published 2022-01-01“…Currently, significant focus has been established to protect privacy during data publishing. The existing privacy models for multiple sensitive attributes do not concentrate on the correlation among the attributes, which in turn leads to much utility loss. …”
Get full text
Article -
235
-
236
Distributed cross-learning for equitable federated models - privacy-preserving prediction on data from five California hospitals
Published 2025-02-01“…We introduce Distributed Cross-Learning for Equitable Federated models (D-CLEF), which incorporates horizontally- or vertically-partitioned data without disseminating patient-level records, to protect patients’ privacy. …”
Get full text
Article -
237
Sensitive data donation in practice: unforeseen challenges and lessons learned
Published 2025-05-01Get full text
Article -
238
-
239
Solving blockchain trilemma using off‐chain storage protocol
Published 2023-07-01Get full text
Article -
240
The method for approximate continuous Skyline query based on privacy protection in road network
Published 2025-07-01“…Abstract Existing road network continuous Skyline queries often neglect user location privacy and data privacy protection. This paper proposes a method for Approximate Continuous Skyline Query with Privacy Protection in road network (ACPP) environments to address these issues. …”
Get full text
Article