Showing 41 - 60 results of 2,784 for search '((((( useds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.33s Refine Results
  1. 41

    Federated LeViT-ResUNet for Scalable and Privacy-Preserving Agricultural Monitoring Using Drone and Internet of Things Data by Mohammad Aldossary, Jaber Almutairi, Ibrahim Alzamil

    Published 2025-04-01
    “…New drone photography and IoT sensors offer quick, high-resolution, multimodal agricultural data collecting. Regional diversity, data heterogeneity, and privacy problems make it hard to conclude these data. …”
    Get full text
    Article
  2. 42
  3. 43

    Unpacking Youth Privacy Management in AI Systems: A Privacy Calculus Model Analysis by Austin Shouli, Ankur Barthwal, Molly Campbell, Ajay Kumar Shrestha

    Published 2025-01-01
    “…The increasing use of Artificial Intelligence (AI) in daily life has introduced substantial issues in protecting user privacy, particularly for young digital citizens. …”
    Get full text
    Article
  4. 44

    Using UMAP for Partially Synthetic Healthcare Tabular Data Generation and Validation by Carla Lázaro, Cecilio Angulo

    Published 2024-12-01
    “…However, such medical data often comprise sensitive patient information, posing challenges regarding data privacy, and are resource-intensive to acquire for significant research purposes. …”
    Get full text
    Article
  5. 45

    Blockchain-enabled data governance for privacy-preserved sharing of confidential data by Jingchi Zhang, Anwitaman Datta

    Published 2024-12-01
    “…Our novel ABE encryption system supports multi-authority use cases while hiding access policy and ensuring identity privacy, which also protects data sharing against corrupt authorities. …”
    Get full text
    Article
  6. 46

    Combining observational and experimental data for causal inference considering data privacy by Mann Charlotte Z., Sales Adam C., Gagnon-Bartsch Johann A.

    Published 2025-03-01
    “…However, many observational datasets cannot be released due to data privacy considerations, so one researcher may not have access to both experimental and observational data. …”
    Get full text
    Article
  7. 47

    Dynamic Cohort Formation with Hierarchical Blockchain Using GDP for Enhanced FL by Sunila Fatima Ahmad, Zahra Abbas, Madiha Haider Syed, Adeel Anjum, Semeen Rehman

    Published 2024-11-01
    “…In addition, Gaussian Differential Privacy (GDP) is used as a privacy-preserving mechanism that adds controlled noise to the data or model updates to protect individual data points from being inferred by adversaries. …”
    Get full text
    Article
  8. 48

    Privacy in the Internet: Myth or reality by Mikarić Bratislav, Marković Marija, Trajković Dušan

    Published 2016-01-01
    “…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
    Get full text
    Article
  9. 49

    Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU by Pascal Riedel, Kaouther Belkilani, Manfred Reichert, Gerd Heilscher, Reinhold von Schwerin

    Published 2024-12-01
    “…We propose a bottom-up, privacy-preserving prediction method using differential privacy (DP) to enhance data privacy for energy analytics on the customer side. …”
    Get full text
    Article
  10. 50

    Evaluating the Impact of Artificial Intelligence Tools on Enhancing Student Academic Performance: Efficacy Amidst Security and Privacy Concerns by Jwern Tick Kiet Phua, Han-Foon Neo, Chuan-Chin Teo

    Published 2025-05-01
    “…This research investigates the perceptions and attitudes of students towards the use of AI tools in their academic activities, focusing on constructs such as perceived usefulness, the perceived ease of use, security and privacy concerns, and both positive and negative attitudes towards AI. …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53
  14. 54

    A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network by Jia Jia, Sathiya Sekar Kumarasamy, Kiran Sree Pokkuluri, K. Suresh Kumar, Thella Preethi Priyanka, Feng Wang

    Published 2024-01-01
    “…So, in our model after completing the node authentication and trust detection, privacy preservation of data is performed using Optimal Key-aided Data Sanitization (OPDS). …”
    Get full text
    Article
  15. 55
  16. 56

    Proactive Data Categorization for Privacy in DevPrivOps by Catarina Silva, João P. Barraca, Paulo Salvador

    Published 2025-02-01
    “…PsDC is a data-categorization model designed for integration with the DevPrivOps methodology and for use in privacy-quantification models. …”
    Get full text
    Article
  17. 57

    Enhancing healthcare data privacy and interoperability with federated learning by Adil Akhmetov, Zohaib Latif, Benjamin Tyler, Adnan Yazici

    Published 2025-05-01
    “…Unlike traditional centralized learning (CL) solutions that require data centralization, our platform uses local model learning, which naturally improves data privacy. …”
    Get full text
    Article
  18. 58

    Secure data sharing technology of medical privacy data in the Web 3.0 by Shusheng Guo, Cheng Chen, Qing Tong

    Published 2024-12-01
    “…Finally, data users apply to multiple parties for joint secure computing to obtain the use of private data. …”
    Get full text
    Article
  19. 59
  20. 60

    Privacy guarantees for personal mobility data in humanitarian response by Nitin Kohli, Emily Aiken, Joshua E. Blumenstock

    Published 2024-11-01
    “…Specifically, we (1) introduce an algorithm for constructing differentially private mobility matrices and derive privacy and accuracy bounds on this algorithm; (2) use real-world data from mobile phone operators in Afghanistan and Rwanda to show how this algorithm can enable the use of private mobility data in two high-stakes policy decisions: pandemic response and the distribution of humanitarian aid; and (3) discuss practical decisions that need to be made when implementing this approach, such as how to optimally balance privacy and accuracy. …”
    Get full text
    Article