Showing 41 - 60 results of 2,784 for search '((((( usedds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.16s Refine Results
  1. 41

    Differential Privacy and Collective Bargaining over Workplace Data by Sandy J.J. Gould

    Published 2024-12-01
    “…I argue that using differential privacy, a technique for processing data that makes it harder to determine who contributed data to a dataset, would remove an obstacle to employers sharing workplace data with worker representatives.…”
    Get full text
    Article
  2. 42

    Research on data integration privacy preservation mechanism for DaaS by Zhi-gang ZHOU, Hong-li ZHANG, Xiang-zhan YU, Pan-pan LI

    Published 2016-04-01
    “…In addition, the corres ding fake data set was used to assure the balanced distribution of data in each part, which realized privacy protection of data integration. …”
    Get full text
    Article
  3. 43

    Aggregated privacy-preserving auditing for cloud data integrity by Kai HE, Chuan-he HUANG, Xiao-mao WANG, Jing WANG, Jiao-li SHI

    Published 2015-10-01
    “…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
    Get full text
    Article
  4. 44

    Survey of artificial intelligence data security and privacy protection by Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN

    Published 2021-02-01
    “…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
    Get full text
    Article
  5. 45

    A Review of Differential Privacy in Individual Data Release by Jun Wang, Shubo Liu, Yongkai Li

    Published 2015-10-01
    “…The rapid development of mobile technology has improved users' quality of treatment, and tremendous amounts of medical information are readily available and widely used in data analysis and application, which bring on serious threats to users' privacy. …”
    Get full text
    Article
  6. 46
  7. 47

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…However, this extensive coverage raises substantial concerns about data privacy and traceability, particularly during the claim process, as policyholders currently have limited control over and insight into how their data is accessed and used.MethodsTo address these challenges, we propose a blockchain-based model designed to enhance policyholders’ private control over data access and improve traceability throughout the NHI claim process. …”
    Get full text
    Article
  8. 48

    A privacy-enhanced framework for collaborative Big Data analysis in healthcare using adaptive federated learning aggregation by Rahul Haripriya, Nilay Khare, Manish Pandey, Sreemoyee Biswas

    Published 2025-05-01
    “…Abstract The exponential growth of Big Data in healthcare, particularly in AI-driven medical diagnostics, has raised critical concerns about data privacy in medical image classification. …”
    Get full text
    Article
  9. 49

    Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation by Simeon de Brouwer

    Published 2020-12-01
    “…This term, related to similar concepts from the literature on privacy such as ‘networked privacy’ or ‘data pollution’, is used here to bring to light the incentives and exploitative dynamics behind a phenomenon which, I demonstrate, benefits both the user and the data controller to the detriment of third-party data subjects. …”
    Get full text
    Article
  10. 50

    Orchestrating privacy-protected big data analyses of data from different resources with R and DataSHIELD. by Yannick Marcon, Tom Bishop, Demetris Avraam, Xavier Escriba-Montagut, Patricia Ryser-Welch, Stuart Wheater, Paul Burton, Juan R González

    Published 2021-03-01
    “…DataSHIELD uses Opal which is a data integration system used by epidemiological studies and developed by the OBiBa open source project in the domain of bioinformatics. …”
    Get full text
    Article
  11. 51
  12. 52

    Unique Method for Prognosis of Risk of Depressive Episodes Using Novel Measures to Model Uncertainty Under Data Privacy by Barbara Pękala, Dawid Kosior, Wojciech Rząsa, Katarzyna Garwol, Janusz Czuma

    Published 2025-02-01
    “…The computer support system designed for that purpose combines data privacy protection from various sources and uncertainty modeling, especially for incomplete data. …”
    Get full text
    Article
  13. 53

    A privacy-preserved horizontal federated learning for malignant glioma tumour detection using distributed data-silos. by Shagun Sharma, Kalpna Guleria, Ayush Dogra, Deepali Gupta, Sapna Juneja, Swati Kumari, Ali Nauman

    Published 2025-01-01
    “…Additionally, it also has patient data-privacy concerns leading to anonymous information generalization, regulatory compliance issues, and data leakage challenges. …”
    Get full text
    Article
  14. 54
  15. 55

    Enhancing privacy in clustering and data mining: A novel approach for sensitive data protection by Haythem Hayouni

    Published 2025-01-01
    “…However, these processes often involve the use of sensitive data, raising significant concerns about privacy, security, and trustworthiness. …”
    Get full text
    Article
  16. 56

    Right to privacy, Big Data and data protection: new challenges of the Colombian legal system by Dayron Dannylo Reyes Quintero, Margarita Rosa Lobo Contreras, Lucía Dayana Amaya Barbosa

    Published 2023-11-01
    “…Also, the perception and characteristics of Big Data are disclosed, trying to know how the rights involved in the materialization of the data analysis process can be protected; Finally, a critical sense is applied to the use of Big Data in modern political platforms, understanding the panorama for the Colombian legal system, which brings with it the probable violation of fundamental rights, such as personal privacy.…”
    Get full text
    Article
  17. 57

    Ethical Dilemmas and Coping Strategies in the Use of Psychological Scales in the Era of Big Data by Lirong LIU, Yanan ZHENG

    Published 2025-04-01
    “…Focusing on the ethical risks arising from the reconstruction of psychological scales due to innovations in big data technology, a systematic analysis is conducted on the research and current use of psychological scales within the context of big data. …”
    Get full text
    Article
  18. 58

    Knowledge Distillation for Face Recognition Using Synthetic Data With Dynamic Latent Sampling by Hatef Otroshi Shahreza, Anjith George, Sebastien Marcel

    Published 2024-01-01
    “…We propose a new framework (called SynthDistill) to train lightweight face recognition models by distilling the knowledge from a pretrained teacher model using synthetic data. We generate synthetic face images without identity labels, mitigating the problems in the intra-class variation generation of synthetic datasets, and dynamically sample from the intermediate latent space of a face generator network to generate new variations of the challenging images while further exploring new face images. …”
    Get full text
    Article
  19. 59

    Comprehensive Review of Privacy, Utility, and Fairness Offered by Synthetic Data by A. Kiran, P. Rubini, S. Saravana Kumar

    Published 2025-01-01
    “…First and foremost, how well synthetic data can preserve privacy and control disclosure, second is how good is its utility, and third, are they able to give fair results without any bias when used in machine learning. …”
    Get full text
    Article
  20. 60

    Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage by Feng Tian, Xiaolin Gui, Jian An, Pan Yang, Jianqiang Zhao, Xuejun Zhang

    Published 2014-01-01
    “…As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. …”
    Get full text
    Article