Showing 541 - 560 results of 2,784 for search '((((( useds OR usedddds) OR usedddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.32s Refine Results
  1. 541
  2. 542
  3. 543

    Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study by Denise Lee, Akhil Vaid, Kartikeya M Menon, Robert Freeman, David S Matteson, Michael L Marin, Girish N Nadkarni

    Published 2025-04-01
    “…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
    Get full text
    Article
  4. 544

    Personal Information Sharing Behavior Using Social Media by Ashraf Sharif, Shafiq Ur Rehman, Khalid Mahmood

    Published 2025-06-01
    “…This study explores personal information sharing behavior publication patterns and trends on social media from 2007-2024 with an aim to highlight the annual growth of personal information sharing behavior (PISB) on social media platforms, key patterns in the PISB literature in terms of frequently cited authors, countries, institutions, sources, highly cited papers, collaboration and authorship patterns, thematic evolution, keyword and key factor analysis (such as countries, sources, and keywords). We used Scopus database for data extraction, and 1020 pertinent records were chosen. …”
    Get full text
    Article
  5. 545
  6. 546

    Application of novel security technique in cloud environment using attribute dependent authentication for health care by D. Deena Rose, C. Agees Kumar

    Published 2025-07-01
    “…A new Matrix based encryption algorithm (M-EA), is proposed in this research, for quick computational processing, effective and reliable data storage in the cloud. This research proposed a enhanced model for attainment of data privacy on the cloud, through the use of Attribute Dependent Multi Factor Authentication (ADMFA). …”
    Get full text
    Article
  7. 547

    Mobile Phone Network Data in the COVID-19 era: A systematic review of applications, socioeconomic factors affecting compliance to non-pharmaceutical interventions, privacy implicat... by Mohammed Okmi, Tan Fong Ang, Muhammad Faiz Mohd Zaki, Chin Soon Ku, Koo Yuen Phan, Irfan Wahyudi, Lip Yee Por

    Published 2025-01-01
    “…<h4>Background</h4>The use of traditional mobility datasets, such as travel surveys and census data, has significantly impacted various disciplines, including transportation, urban sensing, criminology, and healthcare. …”
    Get full text
    Article
  8. 548

    Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring by Kalashtari Niloofar, Huhs Niklas, Kraitl Jens, Hornberger Christoph, Simanski Olaf

    Published 2024-12-01
    “…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
    Get full text
    Article
  9. 549

    Federated learning in food research by Zuzanna Fendor, Bas H.M. van der Velden, Xinxin Wang, Andrea Jr. Carnoli, Osman Mutlu, Ali Hürriyetoğlu

    Published 2025-10-01
    “…The use of machine learning in food research is sometimes limited due to data sharing obstacles such as data ownership and privacy requirements. …”
    Get full text
    Article
  10. 550

    Federated meta learning: a review by Chuanyao ZHANG, Shijing SI, Jianzong WANG, Jing XIAO

    Published 2023-03-01
    “…With the popularity of mobile devices, massive amounts of data are constantly produced.The data privacy policies are becoming more and more specified, the flow and use of data are strictly regulated.Federated learning can break data barriers and use client data for modeling.Because users have different habits, there are significant differences between different client data.How to solve the statistical challenge caused by the data imbalance becomes an important topic in federated learning research.Using the fast learning ability of meta learning, it becomes an important way to train different personalized models for different clients to solve the problem of data imbalance in federated learning.The definition and classification of federated learning, as well as the main problems of federated learning were introduced systematically based on the background of federated learning.The main problems included privacy protection, data heterogeneity and limited communication.The research work of federated metalearning in solving the heterogeneous data, the limited communication environment, and improving the robustness against malicious attacks were introduced systematically starting from the background of federated meta learning.Finally, the summary and prospect of federated meta learning were proposed.…”
    Get full text
    Article
  11. 551
  12. 552
  13. 553

    Federated learning with LSTM for intrusion detection in IoT-based wireless sensor networks: a multi-dataset analysis by Raja Waseem Anwar, Mohammad Abrar, Abdu Salam, Faizan Ullah

    Published 2025-03-01
    “…Using an FL approach, multiple IoT nodes collaboratively train a global LSTM model without exchanging raw data, thereby addressing privacy concerns and improving detection capabilities. …”
    Get full text
    Article
  14. 554

    Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System by Pape Latyr Faye

    Published 2025-06-01
    “…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
    Get full text
    Article
  15. 555

    Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments by Mohammed A. Aleisa

    Published 2025-01-01
    “…It then uses blockchain technology for recording unalterable data of identity and access management while Zero-Knowledge Proofs (ZKP) ensures authentication and verification without revealing sensitive information. …”
    Get full text
    Article
  16. 556

    FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer by Dongyan Wang, Limin Chen, Xiaotong Lu, Yidi Wang, Yue Shen, Jingjing Xu

    Published 2024-01-01
    “…As an emerging distributed machine learning technology, federated learning has gained widespread attention due to its critical privacy protection mechanism. However, it also faces challenges such as high communication costs and heterogeneous client data.In order to address the above issues. …”
    Get full text
    Article
  17. 557

    Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data by Hendra Lijaya, Patricia Ho, Handri Santoso

    Published 2025-07-01
    “…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
    Get full text
    Article
  18. 558

    Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing by Hui LIN, Mengyang YU, Youliang TIAN, Yijie HUANG

    Published 2018-05-01
    “…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
    Get full text
    Article
  19. 559

    Artificial intelligence in neuroimaging: Opportunities and ethical challenges by Neha Brahma, S. Vimal

    Published 2024-01-01
    “…Issues such as algorithmic bias, data privacy, and the interpretability of AI-driven insights must be addressed to ensure that these technologies are used responsibly and equitably. …”
    Get full text
    Article
  20. 560

    Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program. by Khumbo Shumba, Jacob Bor, Cornelius Nattey, Dickman Gareta, Evelyn Lauren, William Macleod, Matthew P Fox, Adrian Puren, Koleka Mlisana, Dorina Onoya

    Published 2025-01-01
    “…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
    Get full text
    Article