Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
21
Technology Policy Recommendations Using Artificial Intelligence
Published 2021-04-01Get full text
Article -
22
Enhancing privacy and traceability of public health insurance claim system using blockchain technology
Published 2025-02-01“…However, this extensive coverage raises substantial concerns about data privacy and traceability, particularly during the claim process, as policyholders currently have limited control over and insight into how their data is accessed and used.MethodsTo address these challenges, we propose a blockchain-based model designed to enhance policyholders’ private control over data access and improve traceability throughout the NHI claim process. …”
Get full text
Article -
23
Survey of split learning data privacy
Published 2024-06-01“…In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. …”
Get full text
Article -
24
A privacy-enhanced framework for collaborative Big Data analysis in healthcare using adaptive federated learning aggregation
Published 2025-05-01“…Abstract The exponential growth of Big Data in healthcare, particularly in AI-driven medical diagnostics, has raised critical concerns about data privacy in medical image classification. …”
Get full text
Article -
25
Can Synthetic Data Protect Privacy?
Published 2025-01-01“…To systematically evaluate the privacy protection performance of synthetic data generation algorithms (Synthpop, CTGAN, RTVAE, TVAE, DataSynthesizer), this study applied various safety metrics. …”
Get full text
Article -
26
-
27
Adaptive personalized privacy-preserving data collection scheme with local differential privacy
Published 2024-04-01“…Local differential privacy (LDP) is a state-of-the-art privacy notion that enables terminal participants to share their private data safely while controlling the privacy disclosure at the source. …”
Get full text
Article -
28
Secondary use under the European Health Data Space: setting the scene and towards a research agenda on privacy-enhancing technologies
Published 2025-06-01Subjects: “…European Health Data Space…”
Get full text
Article -
29
Ethical Dilemmas and Coping Strategies in the Use of Psychological Scales in the Era of Big Data
Published 2025-04-01“…Focusing on the ethical risks arising from the reconstruction of psychological scales due to innovations in big data technology, a systematic analysis is conducted on the research and current use of psychological scales within the context of big data. …”
Get full text
Article -
30
Knowledge Distillation for Face Recognition Using Synthetic Data With Dynamic Latent Sampling
Published 2024-01-01“…We propose a new framework (called SynthDistill) to train lightweight face recognition models by distilling the knowledge from a pretrained teacher model using synthetic data. We generate synthetic face images without identity labels, mitigating the problems in the intra-class variation generation of synthetic datasets, and dynamically sample from the intermediate latent space of a face generator network to generate new variations of the challenging images while further exploring new face images. …”
Get full text
Article -
31
Unique Method for Prognosis of Risk of Depressive Episodes Using Novel Measures to Model Uncertainty Under Data Privacy
Published 2025-02-01“…The computer support system designed for that purpose combines data privacy protection from various sources and uncertainty modeling, especially for incomplete data. …”
Get full text
Article -
32
A privacy-preserved horizontal federated learning for malignant glioma tumour detection using distributed data-silos.
Published 2025-01-01“…Additionally, it also has patient data-privacy concerns leading to anonymous information generalization, regulatory compliance issues, and data leakage challenges. …”
Get full text
Article -
33
Privacy-Preserving Rule Induction Using CKKS
Published 2024-01-01“…This study introduces a new approach called homomorphic encryption-based rule induction (HORI) algorithm, designed specifically for scenarios where data confidentiality is critical. This method is constructed using CKKS homomorphic encryption to make it work with encrypted data, thereby enhancing the privacy of both training data and the input for inference. …”
Get full text
Article -
34
-
35
An accuracy-privacy optimization framework considering user’s privacy requirements for data stream mining
Published 2025-06-01“…Additionally, a data fitting module using kernel regression is integrated, a unique approach that predicts accuracy levels based on user-defined privacy thresholds. …”
Get full text
Article -
36
Data Anonymization and Privacy Preservation in Healthcare Systems
Published 2025-01-01“…With the objective to identify key trends and driving factors, a bibliometric analysis was performed using VOSviewer, which focuses on prominent authors, dominant research topics, and collaborative networks in data privacy. …”
Get full text
Article -
37
Data Privacy Protection in Islamic Communication Perspective
Published 2024-02-01“…Technology in the era of society 5.0 was rising to facilitate human work, but it is used to misuse big data from the individual level. …”
Get full text
Article -
38
Privacy-Preserving Data Sharing in Telehealth Services
Published 2024-11-01“…Telehealth services, while providing immense benefits in terms of accessibility and efficiency, introduce complex challenges in maintaining data privacy and security. This paper proposes a privacy-preserving framework for secure data sharing within telehealth services, employing blockchain technology and advanced cryptographic techniques. …”
Get full text
Article -
39
Privacy-Aware Detection for Large Language Models Using a Hybrid BiLSTM-HMM Approach
Published 2025-01-01“…However, their deployment introduces significant privacy concerns, including the memorization and unintended disclosure of sensitive data. …”
Get full text
Article -
40