Showing 621 - 640 results of 2,784 for search '((((( useds OR usedddds) OR usedddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.32s Refine Results
  1. 621

    Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication by U. Sumalatha, K. Krishna Prakasha, Srikanth Prabhu, Vinod C. Nayak

    Published 2025-01-01
    “…Deep learning and fully homomorphic encryption (FHE) are integrated for privacy-preserving fingerprint recognition. Convolutional neural network (CNN) extract fingerprint features encrypted using the Cheon-Kim-Kim-Song (CKKS) FHE scheme. …”
    Get full text
    Article
  2. 622

    Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram by TIAN Yuechi, LI Fenghua, ZHOU Zejun, SUN Zhe, GUO Shoukun, NIU Ben

    Published 2024-08-01
    “…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
    Get full text
    Article
  3. 623

    Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation by Min Hou, Yue Wu

    Published 2025-03-01
    “…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
    Get full text
    Article
  4. 624
  5. 625

    Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub by Yu (Andrew) Liu, Gurpreet Kaur, Natasha Kholgade Banerjee, Sean Banerjee

    Published 2025-08-01
    “…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
    Get full text
    Article
  6. 626

    Ethical and legal considerations governing use of health data for quality improvement and performance management: a scoping review of the perspectives of health professionals and a... by Tim Shaw, Kevin Leow, Ian Kerridge, Cameron Stewart, Anna Janssen, Kavisha Shah

    Published 2025-04-01
    “…Health administrators additionally emphasised the importance of good governance and data stewardship to improving professional engagement with performance data, but privacy remains a key barrier.Conclusions The growing interest in using health data for quality improvement and performance management requires health services to address barriers to utilisation of performance data. …”
    Get full text
    Article
  7. 627

    Determinants of Continuous Smartwatch Use and Data-Sharing Preferences With Physicians, Public Health Authorities, and Private Companies: Cross-Sectional Survey of Smartwatch Users by Anthony James Goodings, Kayode Philip Fadahunsi, Derjung M Tarn, Jennifer Lutomski, Allison Chhor, Frances Shiely, Patrick Henn, John O'Donoghue

    Published 2025-08-01
    “… Abstract BackgroundSmartwatches are widely adopted globally for tracking health metrics, offering potential for enhancing individual health care and public health efforts. Continuous use of the devices and users’ willingness to share the data collected are critical to realizing their full benefits. …”
    Get full text
    Article
  8. 628

    Advancing Early Detection of Major Depressive Disorder Using Multisite Functional Magnetic Resonance Imaging Data: Comparative Analysis of AI Models by Masab Mansoor, Kashif Ansari

    Published 2025-07-01
    “…MethodsWe used functional magnetic resonance imaging data from 1200 participants (600 with early-stage MDD and 600 healthy controls) across 3 public datasets. …”
    Get full text
    Article
  9. 629
  10. 630

    ChildDiffusion: Unlocking the Potential of Generative AI and Controllable Augmentations for Child Facial Data Using Stable Diffusion and Large Language Models by Muhammad Ali Farooq, Wang Yao, Peter Corcoran

    Published 2025-01-01
    “…In this research, we propose the ChildDiffusion framework, designed to generate photorealistic child facial data using diffusion models. The framework integrates intelligent augmentations via short text prompts, employs various image samplers, and leverages ControlNet for enhanced model conditioning. …”
    Get full text
    Article
  11. 631

    De novo non-canonical nanopore basecalling enables private communication using heavily-modified DNA data at single-molecule level by Qingyuan Fan, Xuyang Zhao, Junyao Li, Ronghui Liu, Ming Liu, Qishun Feng, Yanping Long, Yang Fu, Jixian Zhai, Qing Pan, Yi Li

    Published 2025-05-01
    “…Abstract Hidden messages in DNA molecules by employing chemical modifications has been suggested for private data storage and transmission at high information density. …”
    Get full text
    Article
  12. 632

    Deriving and validating a risk prediction model for long COVID-19: protocol for an observational cohort study using linked Scottish data by Jennifer K Quint, Aziz Sheikh, Chris Robertson, Srinivasa Vittal Katikireddi, Emily Moore, Colin R Simpson, Luke Daines, Eleftheria Vasileiou, Syed Ahmar Shah, Rachel H Mulholland, Vicky Hammersley, Steven Kerr, Ting Shi, David Weatherill, Elisa Pesenti

    Published 2022-07-01
    “…In this protocol, we describe plans to develop a prediction model to identify individuals at risk of developing long-COVID.Methods and analysis We will use the national Early Pandemic Evaluation and Enhanced Surveillance of COVID-19 (EAVE II) platform, a population-level linked dataset of routine electronic healthcare data from 5.4 million individuals in Scotland. …”
    Get full text
    Article
  13. 633

    Shielding Communication Privacy: Unveiling The Strategic Utilization Of Instagram’s Second Account Feature By Millennial Generation by Musfiah Saidah

    Published 2023-07-01
    “…Even though the person who is selected to enter the second account circle is also vulnerable to opening the data privacy of the account owner and even spreading it. …”
    Get full text
    Article
  14. 634

    STF-LPPVA: Local Privacy-Preserving Method for Vehicle Assignment Based on Spatial–Temporal Fusion by Lei Tang, Zhengxin Cao, Xin Zhou, Junzhe Zhang, Junchi Ma

    Published 2025-01-01
    “…There are user privacy risks in cloud-based vehicle dispatch platforms due to the unauthorized collection, use, and dissemination of data. …”
    Get full text
    Article
  15. 635

    Recent Advances in Federated Learning for Connected Autonomous Vehicles: Addressing Privacy, Performance, and Scalability Challenges by Asad Ali, Huang Jianjun, Ayesha Jabbar

    Published 2025-01-01
    “…FL presents a decentralized infrastructure that allows collaborative learning, while also ensuring data privacy, as CAVs increasingly rely on machine learning to process large amounts of sensor data. …”
    Get full text
    Article
  16. 636
  17. 637

    Using fuzzy decision support to create a positive mental health environment for preschoolers by Xinyue Li

    Published 2025-04-01
    “…To assess their mental health before starting school, preschoolers need early detection, intervention, and assessment. However, data shortages, heterogeneity, privacy issues, model interpretability, and generalization restrictions hamper the review process. …”
    Get full text
    Article
  18. 638

    Impact of Normalization Techniques on Synthetic Load Profile Generation Using Deep Generative Models by Luis H. T. Bandoria, Walquiria N. Silva, Madson C. De Almeida

    Published 2025-01-01
    “…However, the impact of data normalization on their performance remains insufficiently explored. …”
    Get full text
    Article
  19. 639
  20. 640

    Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks by Liang Liu, Zhenhai Hu, Lisong Wang

    Published 2019-07-01
    “…The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. To protect node data privacy, Shamir’s secret sharing technology is used to prevent internal attackers from stealing the sensitive data of the surrounding nodes. …”
    Get full text
    Article