Showing 661 - 680 results of 2,784 for search '((((( usedds OR usedds) OR usedds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.21s Refine Results
  1. 661

    PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare by Hegde Manjunath, M. Karthik, Hegde Varun, Rao Rohini R., Mantoor Vinayak M., Bhat Radhakrishna

    Published 2025-04-01
    “…PLASMA’s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. …”
    Get full text
    Article
  2. 662

    Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging by Hadi Mahdipour, Jaime Laviada, Fernando Las-Heras Andres, Mehdi Sookhak

    Published 2025-01-01
    “…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
    Get full text
    Article
  3. 663

    Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption by Filip Jerkovic, Nurul I. Sarkar, Jahan Ali

    Published 2025-06-01
    “…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
    Get full text
    Article
  4. 664

    Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies by Kumar Rahul, Shieh Chin-Shiuh, Chakrabarti Prasun, Kumar Ashok, Moolchandani Jhankar, Sinha Raj

    Published 2025-01-01
    “…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
    Get full text
    Article
  5. 665

    Do Cookie Banners Respect My Browsing Privacy? Measuring the Effectiveness of Cookie Rejection for Limiting Behavioral Advertising by Mateo Ormeno, Ha Dao, Valeria Herskovic, Kensuke Fukuda

    Published 2024-01-01
    “…Online behavioral advertising (OBA) is a method within digital advertising that exploits web users’ interests to tailor ads. Its use has raised privacy concerns among researchers, regulators, and the media, emphasizing the need for a reliable mechanism to measure its prevalence. …”
    Get full text
    Article
  6. 666

    Investigating the Relationship between Social Skills and Social Acceptance with Academic Performance, Considering the Mediating Role of Ethical Privacy by Taghreed Radhi Abdol Mohsin, Hassan Ghalavandi

    Published 2025-05-01
    “…Four standard questionnaires of social skills, social acceptance, respect for moral privacy, and academic performance were used for gathering data. …”
    Get full text
    Article
  7. 667

    Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things. by Xujun Tang

    Published 2024-01-01
    “…Researching the privacy protection method of public service advertising visual design is of great significance to protecting the privacy data security of public service advertising visual designers and the personal privacy of other citizens. …”
    Get full text
    Article
  8. 668

    Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks by Abdulrahman A. Alshdadi, Abdulwahab Ali Almazroi, Nasir Ayub, Miltiadis D. Lytras, Eesa Alsolami, Faisal S. Alsubaei, Riad Alharbey

    Published 2025-02-01
    “…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
    Get full text
    Article
  9. 669

    Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities by Ahma Greta, Kadriu Arbana

    Published 2025-06-01
    “…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
    Get full text
    Article
  10. 670
  11. 671

    Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis by Madhura K., Niyaz Panakaje, S. M. Riha Parvin, Shakira Irfana, Mural Henrita Cutinha, Yatheen A, Rovina Sharon Soans

    Published 2024-12-01
    “…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
    Get full text
    Article
  12. 672

    Federated Learning for Surface Roughness by Kai-Lun Cheng, Yu-Hung Ting, Wen-Ren Jong, Shia-Chung Chen, Zhe-Wei Zhou

    Published 2025-06-01
    “…This study proposes a federated learning-based real-time surface roughness prediction framework for WEDM to address issues of empirical parameter tuning and data privacy. By sharing only the model parameters, cross-machine training was enabled without exposing raw data. …”
    Get full text
    Article
  13. 673

    Self-monitoring of health - user viewpoints on gathering data using consumer health technologies during leisure time by Nora Weinberger, Martina F. Baumann, Maria Maia

    Published 2025-06-01
    “…It focuses on attitudes toward health data collection, data sharing, privacy concerns, and the use of EEG-supported devices.ResultsFindings reveal a complex landscape of trust and concern. …”
    Get full text
    Article
  14. 674

    Using big data analytics to improve HIV medical care utilisation in South Carolina: A study protocol by Mohammad Rifat Haider, Bankole Olatosi, Jiajia Zhang, Sharon Weissman, Jianjun Hu, Xiaoming Li

    Published 2019-07-01
    “…The RFA is authorised to collect and merge data from these different sources and to ensure the privacy of all PLWH. …”
    Get full text
    Article
  15. 675

    Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing by P. Anbumani, R. Dhanapal

    Published 2023-03-01
    “…Secondly, the user's privacy may be adequately protected with a secure authentication paradigm that employs ABS to safeguard the user's private data. …”
    Get full text
    Article
  16. 676
  17. 677

    Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study by Denise Lee, Akhil Vaid, Kartikeya M Menon, Robert Freeman, David S Matteson, Michael L Marin, Girish N Nadkarni

    Published 2025-04-01
    “…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
    Get full text
    Article
  18. 678

    NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols by Rafiullah Khan, Mohib Ullah, Atif Khan, Muhammad Irfan Uddin, Maha Al-Yahya

    Published 2021-01-01
    “…Numerous techniques are available to address privacy infringement, including Private Information Retrieval (PIR) protocols that use peer nodes to preserve privacy. …”
    Get full text
    Article
  19. 679

    QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles by Ji-ming Chen, Ting-ting Li, Liang-jun Wang

    Published 2019-07-01
    “…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
    Get full text
    Article
  20. 680

    How Social Scene Characteristics Affect Customers’ Purchase Intention: The Role of Trust and Privacy Concerns in Live Streaming Commerce by Wenjian Li, Steiner Cujilema, Lisong Hu, Gang Xie

    Published 2025-04-01
    “…The research employs Structural Equation Modeling (SEM) to test the hypothesis using data from 504 valid responses. (3) The results demonstrate that the characteristics of social scenes proposed in this study enhance consumer trust and positively impact purchase intention. …”
    Get full text
    Article