Showing 121 - 140 results of 2,784 for search '((((( usedds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.18s Refine Results
  1. 121

    Legitimate Expectations of Privacy in the Era of Digitalization by E. Ostanina, E. Titova

    Published 2023-04-01
    “…This article contends that in the present era of digitalization people’s right to privacy should be protected no less than it was before the widespread use of digital technologies. …”
    Get full text
    Article
  2. 122

    Decentralized big data mining: federated learning for clustering youth tobacco use in India by Rahul Haripriya, Nilay Khare, Manish Pandey, Sreemoyee Biswas

    Published 2024-12-01
    “…The analysis employs three clustering algorithms K-Means, DBSCAN, and Hierarchical Clustering within a federated learning framework, which ensures that sensitive public health data remains decentralized and private. Federated learning enables collaborative analysis across different regions by sharing only model parameters rather than raw data, thus enhancing privacy. …”
    Get full text
    Article
  3. 123
  4. 124
  5. 125

    Sharing is CAIRing: Characterizing principles and assessing properties of universal privacy evaluation for synthetic tabular data by Tobias Hyrup, Anton Danholt Lautrup, Arthur Zimek, Peter Schneider-Kamp

    Published 2024-12-01
    “…However, the ability to share data is hindered by regulations protecting the privacy of natural persons. …”
    Get full text
    Article
  6. 126

    Privacy under threat – The intersection of IoT and mass surveillance by Siniša Domazet, Darko Marković, Tatjana Skakavac

    Published 2024-10-01
    “…It has been shown that there are issues with applying existing regulations to IoT and mass surveillance and that no universal legal framework currently exists to protect the right to privacy. The use of IoT technology, especially given the rapid development of artificial intelligence, will in the future raise numerous dilemmas regarding the entities responsible for collecting personal data, the consents required for data usage and processing, where the collected personal data will be used, and for what purposes. …”
    Get full text
    Article
  7. 127
  8. 128

    A Differential Privacy Framework with Adjustable Efficiency–Utility Trade-Offs for Data Collection by Jongwook Kim, Sae-Hong Cho

    Published 2025-02-01
    “…The widespread use of mobile devices has led to the continuous collection of vast amounts of user-generated data, supporting data-driven decisions across a variety of fields. …”
    Get full text
    Article
  9. 129

    Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics by U. A. Vishniakou, YiWei Xia, Chuyue Yu

    Published 2024-09-01
    “…The article discusses the use of Ethereum blockchain technology in the Internet of Things (IoT) network for IT diagnostics of patients, which increases data security and user privacy. …”
    Get full text
    Article
  10. 130

    The Dual Nature of Trust in Participatory Sciences: An Investigation into Data Quality and Household Privacy Preferences by Danielle Lin Hunter, Valerie Johnson, Caren Cooper

    Published 2024-11-01
    “…In Crowd the Tap, we engaged participants through facilitator organizations including high schools, faith communities, universities, and a corporate volunteer program. We used Kruskal Wallis tests and chi-square tests with Bonferroni post hoc tests to assess how data quality and privacy preferences differed across facilitator groups and amongst those who participated in the project independently (unfacilitated). …”
    Get full text
    Article
  11. 131
  12. 132

    Abnormality detection and privacy protection strategies for power marketing inspection business of cyber–physical–social systems using big data and artificial intelligence by Li Kai, Mo Pingyan, Yang Yongjiao, Xie Hanyang, Shen Zhixiong

    Published 2025-07-01
    “…However, this effort entails significant challenges resulting from the massive volume of inspection data and complexity of electricity usage scenarios. …”
    Get full text
    Article
  13. 133

    A synchronous compression and encryption method for massive electricity consumption data privacy preserving by Ruifeng Zhao, Jiangang Lu, Zhiwen Yu, Kaiwen Zeng

    Published 2025-01-01
    “…The demand for fine-grained perception of electricity usage information in the new power system is continuously increasing, making it a challenge to address potential unauthorized data access while ensuring channel security. This paper addresses privacy in power systems requiring efficient source-load interactions by introducing a novel data compression synchronous encryption algorithm within a compressed sensing framework. …”
    Get full text
    Article
  14. 134

    A Blockchain-Based Secure Data Transaction and Privacy Preservation Scheme in IoT System by Jing Wu, Zeteng Bian, Hongmin Gao, Yuzhe Wang

    Published 2025-08-01
    “…With the explosive growth of Internet of Things (IoT) devices, massive amounts of heterogeneous data are continuously generated. However, IoT data transactions and sharing face multiple challenges such as limited device resources, untrustworthy network environment, highly sensitive user privacy, and serious data silos. …”
    Get full text
    Article
  15. 135

    A Comprehensive Study of Traditional and Deep-learning Schemes for Privacy and Data Security in the Cloud by mohammed sheet, Melad saeed

    Published 2022-12-01
    “…However, it faces great difficulties in ensuring data confidentiality and privacy. People hesitate to use it due to the risk of innumerable attacks and security breaches. …”
    Get full text
    Article
  16. 136
  17. 137

    Privacy Centric Offline Chatbot using Large Language Models by K. Anjali, K. Vipunsai, K. Ruchitha, M. Bhavani, Ch. China Subba Reddy

    Published 2025-07-01
    “…They also might collect and store the data leading to privacy breaches. This research paper focuses on these problems. …”
    Get full text
    Article
  18. 138

    Predicting chronic pain using wearable devices: a scoping review of sensor capabilities, data security, and standards compliance by Johannes C. Ayena, Johannes C. Ayena, Amina Bouayed, Amina Bouayed, Myriam Ben Arous, Myriam Ben Arous, Youssef Ouakrim, Youssef Ouakrim, Karim Loulou, Karim Loulou, Darine Ameyed, Isabelle Savard, Leila El Kamel, Neila Mezghani, Neila Mezghani

    Published 2025-05-01
    “…Random Forest and multilevel models have demonstrated consistent performance, while advanced models like Convolutional Neural Network-Long Short-Term Memory have faced challenges with data quality and computational demands. Despite compliance with regulations like General Data Protection Regulation and ISO standards, data security and privacy concerns persist. …”
    Get full text
    Article
  19. 139

    Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO

    Published 2019-02-01
    “…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
    Get full text
    Article
  20. 140