Showing 1,061 - 1,080 results of 2,784 for search '((((( usedds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.24s Refine Results
  1. 1061

    Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision by Shilong Yang, Lu Leng, Ching-Chun Chang, Chin-Chen Chang

    Published 2025-01-01
    “…As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. Computer vision systems can surveil and exploit data without consent. …”
    Get full text
    Article
  2. 1062

    Leveraging Open-Source Large Language Models for Data Augmentation in Hospital Staff Surveys: Mixed Methods Study by Carl Ehrett, Sudeep Hegde, Kwame Andre, Dixizi Liu, Timothy Wilson

    Published 2024-11-01
    “…ConclusionsThe study demonstrates the value of data augmentation with open-source LLMs, highlights the importance of privacy and ethical considerations when using LLMs, and suggests future directions for research in this field.…”
    Get full text
    Article
  3. 1063

    Horizontal federated learning and assessment of Cox models by Frank Westers, Sam Leder, Lucia Tealdi

    Published 2025-06-01
    “…However, training an accurate model requires access to a sufficiently large dataset, which is often challenging due to data fragmentation. A potential solution is to combine data from multiple medical institutions, but privacy constraints typically prevent direct data sharing. …”
    Get full text
    Article
  4. 1064
  5. 1065

    Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks by Yuan Zhang, Jiaru Song, Yongxiong Sun, Zhanheng Gao, Zhe Hu, Minghui Sun

    Published 2025-05-01
    “…At the same time, the data from individual providers often exhibit imbalance and a scarcity of anomalous samples, leading to suboptimal model performance when using a single dataset. …”
    Get full text
    Article
  6. 1066

    Overcoming Data Scarcity in Roadside Thermal Imagery: A New Dataset and Weakly Supervised Incremental Learning Framework by Arnd Pettirsch, Alvaro Garcia-Hernandez

    Published 2025-04-01
    “…Roadside camera systems are commonly used for traffic data collection, yet conventional optical systems are limited by poor performance in varying weather and light conditions and are often restricted by data privacy regulations. …”
    Get full text
    Article
  7. 1067

    A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare by Mamta Kumari, Mahendra Gaikwad, Salim A. Chavan

    Published 2025-05-01
    “…Abstract The latest developments in the Internet of Medical Things (IoMT) have transformed healthcare, allowing for the easy transmission of sensitive data across networked medical equipment. However, this interconnection has produced a fertile environment for cybersecurity threats, necessitating the use of sophisticated intrusion detection systems. …”
    Get full text
    Article
  8. 1068

    THE USE OF SOCIAL MEDIA FOR LEARNING ENGLISH: STUDENTS PERSPECTIVE by Muetia Safitri, Atik Yuliyani, Farida Hamid, Aminah Suriaman

    Published 2022-07-01
    “…Basic statistical analysis was used to analyze data from the questionnaire, and the data from interviews were analyzed using the flow model by Miles and Huberman. …”
    Get full text
    Article
  9. 1069

    DIGITAL DATA-DRIVEN APPROACHES TO MONITOR AND FOSTER WELL-BEING AMONG EXCHANGE STUDENTS DURING DISRUPTIVE EVENTS by Anastasiia Volkova, Nadiia Dets, Olshevska Olga, Yulia Tsarynna, Liudmyla Fihurska

    Published 2025-07-01
    “…Special attention is given to ethical data use, privacy protection, and accessibility of technologies within educational contexts. …”
    Get full text
    Article
  10. 1070

    Building and Sustaining Public Trust in Health Data Sharing for Musculoskeletal Research: Semistructured Interview and Focus Group Study by Zainab K Yusuf, William G Dixon, Charlotte Sharp, Louise Cook, Søren Holm, Caroline Sanders

    Published 2024-10-01
    “… BackgroundAlthough many people are supportive of their deidentified health care data being used for research, concerns about privacy, safety, and security of health care data remain. …”
    Get full text
    Article
  11. 1071

    Chatbots in medicine: certification process and applied use case by Mayssam Nehme, Franck Schneider, Esther Amruthalingam, Elio Schnarrenberger, Raphaël Trëmeaud, Idris Guessous

    Published 2024-10-01
    “…However, their application in medicine and healthcare has been limited due to concerns over data privacy, ther risk of providing medical diagnoses, and ensuring regulatory and legal compliance. …”
    Get full text
    Article
  12. 1072

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “…Abstract  The current condition of the Internet of Things tends to be without the use of security features, especially in the field of privacy and data confidentiality, especially in the low power sensor module i.e. …”
    Get full text
    Article
  13. 1073

    Federated Conditional Variational Auto Encoders for Cyber Threat Intelligence: Tackling Non-IID Data in SDN Environments by Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, Kashif Nisar, Mohammed Azmi Al-Betar

    Published 2025-01-01
    “…Federated Learning is a promising paradigm for sharing Cyber Threat Intelligence (CTI) without privacy issues by leveraging the cross-silos data in Software Defined Networking (SDN). …”
    Get full text
    Article
  14. 1074

    Patient Perspective on Use of an Interactive Website for Sleep Apnea by Carl Stepnowsky, Christine Edwards, Tania Zamora, Robert Barker, Zia Agha

    Published 2013-01-01
    “…The goal of this paper is to report on CPAP adherence, internet use, privacy concerns and user satisfaction in using the website. …”
    Get full text
    Article
  15. 1075

    A Comparative Analysis of Data Protection in E-commerce B2C Contracts in Georgia and the European Union by Nato Gugava, Lika Kobaladze, Tamta Kenia, Oliko Kobakhidze

    Published 2024-12-01
    “…A lot of people communicate with the extensive use of the internet and technologies, including e-procurement, which, in these relationships require the correct processing of personal data, whereas improper protection of great deal of information increases risks of using data for criminal purposes and threatens personal privacy of consumers. …”
    Get full text
    Article
  16. 1076

    Nairobi motorcycle transit comparison dataset: Fuel vs. electric vehicle performance tracking (2023)Mendeley Data by Alois Mbutura, Martin Kitetu, Halloran Stratford, M.J. Booysen

    Published 2025-08-01
    “…To safeguard rider privacy, location data for the first and last trips of each day are excluded. …”
    Get full text
    Article
  17. 1077

    Fed-DPSDG-WGAN: Differentially Private Synthetic Data Generation for Loan Default Prediction via Federated Wasserstein GAN by Padmaja Ramachandra, Santhi Vaithiyanathan

    Published 2025-01-01
    “…We investigate the potential of replacing the original data with statistically similar synthetic data to be used as training data to predict loan defaulters. …”
    Get full text
    Article
  18. 1078

    The ICE–Lexis nexus: An argument against use of commercial databases in immigration enforcement by Jessica P. Needle, Alan Rubel

    Published 2025-09-01
    “…In 2022, immigration advocates filed a lawsuit against commercial data broker LexisNexis (“Lexis”) for its role in facilitating unwarranted surveillance of immigrants and political activists critical of U.S. immigration policy ( Castellanos et al. v. …”
    Get full text
    Article
  19. 1079
  20. 1080