Showing 1,181 - 1,200 results of 2,784 for search '((((( usedds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.28s Refine Results
  1. 1181
  2. 1182

    AI, machine learning and deep learning in cyber risk management by Ishrag Hamid, M. M. Hafizur Rahman

    Published 2025-05-01
    “…However, challenges persist in ensuring the accuracy of information, understanding the functionality of models, and protecting individuals’ data. Ethical use of personal information and safeguarding privacy remain critical, with researchers needing to prioritize accuracy, transparency in AI models, and fairness in decision-making. …”
    Get full text
    Article
  3. 1183

    Optimizing encrypted search in the cloud using autoencoder-based query approximation by Mahmoud Mohamed, Khaled Alosman

    Published 2024-12-01
    “…Our work provides a rigorous evaluation of autoencoder-based query approximation for encrypted cloud search using real-world datasets. The research implement a general framework agnostic to model type, data modality, and encryption scheme. …”
    Get full text
    Article
  4. 1184
  5. 1185

    Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation by Gabriel Mendonca, Rosa M. M. Leao, Edmundo De Souza E. Silva, Don Towsley

    Published 2025-01-01
    “…We collect data on DDoS attacks by generating real attack traffic from the homes of a selected group of volunteers, utilizing authentic malware source code. …”
    Get full text
    Article
  6. 1186
  7. 1187
  8. 1188

    A content review of COVID-19-related apps used in Vietnam by Linh Tran, Federica Cucé, Nguyen Thanh An, Kadek Agus Surya Dila, Nguyen Hai Nam, Doan Le Nguyet Cat, Lee Wei Jun, Farrukh Ansar, Fatima Abdallh, Au Vo, Nguyen Tien Huy

    Published 2025-02-01
    “…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
    Get full text
    Article
  9. 1189

    Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization by Mohamed Abd Elaziz, Mohamed Abd Elaziz, Mohamed Abd Elaziz, Ibrahim A. Fares, Abdelghani Dahou, Mansour Shrahili

    Published 2025-05-01
    “…The goal of the developed framework is to improve the detection of IDS without using centralized data to preserve privacy. Whereas it enhances the processing and detection capability of huge amounts of data generated from IoT devices. …”
    Get full text
    Article
  10. 1190

    The impact of artificial intelligence on behavioral intentions to use mobile banking in the post-COVID-19 era by Johannes Schrank, Johannes Schrank

    Published 2025-08-01
    “…Data has been collected from 412 respondents in Thailand, and structural equation modeling has been employed for the data analysis.ResultsThe findings reveal significant positive effects of performance expectancy, effort expectancy, social influence, facilitating conditions, trust, perceived privacy, perceived intelligence and anthropomorphism of AI on users’ behavioral intentions to use mobile banking. …”
    Get full text
    Article
  11. 1191

    PRE-SERVICE TEACHERS' PERCEPTIONS OF THE USE OF GENAI AND TRADITIONAL GRAMMAR-CHECKING TOOLS FOR ENGLISH WRITING by Tiara Putri, Rahmah Fithriani

    Published 2025-07-01
    “…Ethical concerns, particularly regarding data privacy and originality, are also identified. …”
    Get full text
    Article
  12. 1192
  13. 1193

    Examining inclusivity: the use of AI and diverse populations in health and social care: a systematic review by John Gabriel O. Marko, Ciprian Daniel Neagu, P. B. Anand

    Published 2025-02-01
    “…A holistic approach must be used to address disparities, enforce effective regulations, safeguard privacy, promote inclusion and equity, and emphasize rigorous validation.…”
    Get full text
    Article
  14. 1194

    Investigating High School Students’ Attitudes Toward the Use of AI in Education: Evidence from Cambodia by Sarin Sok, Kimkong Heng, Mengkorn Pum

    Published 2025-07-01
    “…Utilizing evidence from an online survey with 315 students (female = 62.50%), the study showed that Cambodian high school students expressed generally favorable attitudes toward utilizing AI-powered tools in education, particularly pertaining to the use of AI to aid in completing school work. However, the study identified key concerns about data privacy and security issues, the risk of becoming over-dependent on AI, and limited originality about students’ work. …”
    Get full text
    Article
  15. 1195

    Some ethical and technological challenges of smart cities by Brian G. Field

    Published 2025-12-01
    “…The moral dilemma and important ethical questions resulting from the use of big data to scrutinise and profile individuals and communities, compromising their privacy and anonymity without their knowledge or consent, cannot be underestimated and appears beyond the control of prevailing data protection protocols.…”
    Get full text
    Article
  16. 1196
  17. 1197
  18. 1198

    Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing by Sijjad Ali, Shuaib Ahmed Wadho, Aun Yichiet, Ming Lee Gan, Chen Kang Lee

    Published 2024-09-01
    “…Cloud computing security and data protection are becoming increasingly critical as its use increases. …”
    Get full text
    Article
  19. 1199

    Integrating multi-modal learning analytics dashboard in K-12 education: insights for enhancing orchestration and teacher decision-making by Isabella Possaghi, Boban Vesin, Feiran Zhang, Kshitij Sharma, Cecilie Knudsen, Håkon Bjørkum, Sofia Papavlasopoulou

    Published 2025-08-01
    “…Further research should investigate students’ responses more closely and further develop strategies for the responsible, explainable, and unbiased use of student affective data in real classrooms.…”
    Get full text
    Article
  20. 1200

    Building occupancy estimation using single channel CW radar and deep learning by Sourav Kumar Pramanik, Md. Shafkat Hossain, Shekh Md. Mahmudul Islam

    Published 2025-04-01
    “…Abstract Counting the number of people in a room is crucial for optimizing smart buildings, enhancing energy efficiency, and ensuring security while preserving privacy. This study introduces a novel radar-based occupancy estimation method leveraging a 24-GHz Continuous Wave (CW) radar system integrated with time-frequency mapping techniques using Continuous Wavelet Transform (CWT) and power spectrum analysis. …”
    Get full text
    Article