Showing 1,021 - 1,040 results of 2,784 for search '((((( usedds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.27s Refine Results
  1. 1021

    Next Arrival and Destination Prediction via Spatiotemporal Embedding with Urban Geography and Human Mobility Data by Pengjiang Li, Zaitian Wang, Xinhao Zhang, Pengfei Wang, Kunpeng Liu

    Published 2025-02-01
    “…However, trajectory data are often mutilated because of personal privacy and hardware limitations, i.e., we usually can only obtain partial trajectory information. …”
    Get full text
    Article
  2. 1022

    How machine learning on real world clinical data improves adverse event recording for endoscopy by Stefan Wittlinger, Isabella C. Wiest, Mahboubeh Jannesari Ladani, Jakob Nikolas Kather, Matthias P. Ebert, Fabian Siegel, Sebastian Belle

    Published 2025-07-01
    “…This study evaluates a machine learning-based approach for systematically detecting endoscopic adverse events from real-world clinical metadata, including structured hospital data such as ICD-codes and procedure timings. Using a random forest classifier detecting adverse events perforation, bleeding, and readmission, we analysed 2490 inpatient cases, achieving significant improvements over baseline prediction accuracy. …”
    Get full text
    Article
  3. 1023

    Evolution, topics and relevant research methodologies in business intelligence and data analysis in the academic management of higher education institutions. A literature review by M. Correa-Peralta, J. Vinueza-Martínez, L. Castillo-Heredia

    Published 2025-03-01
    “…In the digital era, Business Intelligence (BI) and data analytics have become essential for optimizing academic management in higher education institutions. …”
    Get full text
    Article
  4. 1024

    Unraveling the role of data sharing in open finance diffusion: an evolutionary game approach on complex networks by Dongqing Chen, Chaoqun Ma, Liwei Zhang, Lijie Li

    Published 2025-05-01
    “…In this study, we develop a diffusion model using evolutionary game theory on complex networks to explore how data sharing influences lenders’ micro-level decision-making and promotes the macro-level diffusion of open finance. …”
    Get full text
    Article
  5. 1025

    Making trauma ecological momentary assessment studies FAIR: review of design considerations and data procedures by Bryce Hruska, Marilyn L. Piccirillo, Lonneke I. M. Lenferink, Maria L. Pacella-LaBarbara, Ateka A. Contractor, Matthew Price, Talya Greene

    Published 2025-12-01
    “…Many challenges remain for the implementation of these practices including balancing privacy concerns and efforts to make trauma EMA data readily shareable.…”
    Get full text
    Article
  6. 1026

    Boosting EEG and ECG Classification with Synthetic Biophysical Data Generated via Generative Adversarial Networks by Archana Venugopal, Diego Resende Faria

    Published 2024-11-01
    “…By addressing the challenges of limited biophysical data, including privacy concerns and restricted volunteer availability, our model generates realistic synthetic waveforms learned from real data. …”
    Get full text
    Article
  7. 1027

    A Robust Image Encryption Protocol for Secure Data Sharing in Brain Computer Interface Applications by Sunil Prajapat, Pankaj Kumar, Kashish Chaudhary, Kranti Kumar, Gyanendra Kumar, Ali Kashif Bashir

    Published 2025-01-01
    “…However, the susceptibility of BCI data to tampering during transmission underscores the critical need for robust security and privacy measures. …”
    Get full text
    Article
  8. 1028

    Analysis of the Obstacles to Ethical Use of Artificial Intelligence by Abbas Shoul, Mohammad Amini, Fatemeh Arabpour

    Published 2025-05-01
    “…Results: The results show that among the 6 identified barriers (lack of accountability, lack of transparency, lack of legal regulations, possibility of bias and discrimination, violation of data privacy, and violation of social justice and livelihood of individuals), the barrier of lack of transparency, followed by the lack of legal regulations, are considered to be the most important and influential barriers to the ethical use of AI. …”
    Get full text
    Article
  9. 1029

    An Adaptive Window Size Selection Method for Differentially Private Data Publishing over Infinite Trajectory Stream by Geonhyoung Jo, Kangsoo Jung, Seog Park

    Published 2018-01-01
    “…Differential privacy techniques are being used as a de facto standard to prevent such privacy violation caused by data analysis. …”
    Get full text
    Article
  10. 1030

    The Use of Blockchain Technology in the Food Traceability System by Cecilia Rasetto

    Published 2025-07-01
    “…To make just a few examples, the more relevant legal issues are related to data validation, storage, cyber security, and privacy. …”
    Get full text
    Article
  11. 1031

    Large language models generating synthetic clinical datasets: a feasibility and comparative analysis with real-world perioperative data by Austin A. Barr, Joshua Quan, Eddie Guo, Emre Sezgin, Emre Sezgin

    Published 2025-02-01
    “…BackgroundClinical data is instrumental to medical research, machine learning (ML) model development, and advancing surgical care, but access is often constrained by privacy regulations and missing data. …”
    Get full text
    Article
  12. 1032

    Digital evidence and its use for criminal proceedings by Jakub Matis

    Published 2025-07-01
    “…By examining these aspects, the paper contributes to a deeper understanding of how digital evidence is utilized in criminal investigations and legal proceedings, advocating for legislative updates to address the growing importance of digital data in modern criminal cases. Furthermore, it underscores the need for careful consideration of privacy rights and proportionality when dealing with personal information obtained from digital devices and online platforms. …”
    Get full text
    Article
  13. 1033

    Secure federated distillation GAN for CIDS in industrial CPS by Junwei LIANG, Geng YANG, Maode MA, Sadiq Muhammad

    Published 2023-12-01
    “…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
    Get full text
    Article
  14. 1034

    A secure and scalable blockchain-based model for electronic health record management by Kalyani Pampattiwar, Pallavi Chavan

    Published 2025-04-01
    “…Abstract In the contemporary digital era, the storage of Electronic Health Records on open platforms presents significant security and privacy challenges. Addressing these concerns requires standardizing the clinical deployment models currently in use. …”
    Get full text
    Article
  15. 1035

    Factors Affecting Personal Information Sharing: Small-Scale Sample Analysis on Social Media by Belia Rida Syifa Fauzia, Lukman Yudokusumo, Yova Ruldeviyani

    Published 2024-08-01
    “…As the number of users on these platforms increases, concerns regarding user security and privacy also increase. Data breaches in 2021 affecting 235 million users on Instagram, TikTok, and YouTube underscored the importance of researching the multifaceted dynamics around privacy concerns, levels of trust, risk awareness, and user behavior patterns related to sharing personal information on social media platforms. …”
    Get full text
    Article
  16. 1036
  17. 1037

    Edge-FLGuard: A Federated Learning Framework for Real-Time Anomaly Detection in 5G-Enabled IoT Ecosystems by Manuel J. C. S. Reis

    Published 2025-06-01
    “…The rapid convergence of 5G networks and Internet of Things (IoT) technologies has unlocked unprecedented connectivity and responsiveness across smart environments—but has also amplified cybersecurity risks due to device heterogeneity, data privacy concerns, and distributed attack surfaces. …”
    Get full text
    Article
  18. 1038

    Navigating challenges/opportunities in developing smart agricultural extension platforms: Multi-media data mining techniques by Josué Kpodo, A. Pouyan Nejadhashemi

    Published 2025-09-01
    “…Addressing data privacy issues involves adhering to open-access principles and enforcing strict data encryption and anonymization standards. …”
    Get full text
    Article
  19. 1039

    Cybersecurity Anomaly Detection: AI and Ethereum Blockchain for a Secure and Tamperproof IoHT Data Management by Oluwaseun Priscilla Olawale, Sahar Ebadinezhad

    Published 2024-01-01
    “…Since medical Information Technology (IT) is evolving and data privacy is a major concern with sensors generally, in healthcare IoT. …”
    Get full text
    Article
  20. 1040

    Ethical implications related to processing of personal data and artificial intelligence in humanitarian crises: a scoping review by Tino Kreutzer, James Orbinski, Lora Appel, Aijun An, Jerome Marston, Ella Boone, Patrick Vinck

    Published 2025-04-01
    “…Abstract Background Humanitarian organizations are rapidly expanding their use of data in the pursuit of operational gains in effectiveness and efficiency. …”
    Get full text
    Article