Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
601
Prompts, privacy, and personalized learning: integrating AI into nursing education—a qualitative study
Published 2025-04-01“…However, questions remain regarding the ethical use of AI-generated outputs, data privacy concerns, and limitations in recognizing emotional nuances. …”
Get full text
Article -
602
Cyber-Biosecurity Challenges in Next-Generation Sequencing: A Comprehensive Analysis of Emerging Threat Vectors
Published 2025-01-01“…Genomic data is inherently sensitive, and vulnerabilities in NGS technologies, software, data-sharing practices, and open-access databases expose it to risks concerning data confidentiality, integrity, and privacy. …”
Get full text
Article -
603
How Differential Privacy Will Affect Estimates of Air Pollution Exposure and Disparities in the United States
Published 2023-05-01“…Using 2010 demonstration census and pollution data, I find that compared to the original census, differentially private (DP) census significantly changes ambient pollution exposure in areas with sparse populations. …”
Get full text
Article -
604
Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis
Published 2023-09-01“…By integrating our protocols with privacy matrix techniques, the cloud server can generate a comprehensive diagnostic model from multiple data sources, offering accurate diagnosis services without disclosing any users’ personal information. …”
Get full text
Article -
605
Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security
Published 2024-12-01“…The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches. …”
Get full text
Article -
606
Cancelable Multi-Branch Deep Learning Framework for Privacy-Preserving ECG Biometric Authentication
Published 2025-01-01“…However, storing and processing raw ECG data raises privacy and security concerns, requiring advanced methods to safeguard user data. …”
Get full text
Article -
607
-
608
SynAdult: Multimodal Synthetic Adult Dataset Generation via Diffusion Models and Neuromorphic Event Simulation for Critical Biometric Applications
Published 2025-01-01“…We propose SynAdult, a multimodal synthetic data generation framework designed to address the scarcity of diverse and privacy-compliant senior adult face datasets for biometric applications and facial analysis. …”
Get full text
Article -
609
Failure of affine‐based reconstruction attack in regenerating vascular feature points
Published 2021-09-01Get full text
Article -
610
Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers
Published 2025-01-01“…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
Get full text
Article -
611
LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Published 2025-04-01“…Federated learning is leveraged to enable collaborative model training across multiple IoT networks while maintaining data privacy and reducing vulnerability to data poisoning. …”
Get full text
Article -
612
Legal Barriers in Developing Educational Technology
Published 2025-03-01“…Through a comparative legal analysis of domestic and international laws, the study sheds light on the legal frameworks affecting technology integration in education. Data privacy issues arise from the sensitive information collected in educational settings, while intellectual property challenges relate to protecting and fairly using digital content and software. …”
Get full text
Article -
613
Detecting Personally Identifiable Information Through Natural Language Processing: A Step Forward
Published 2025-04-01“…The protection of personally identifiable information (PII) is being increasingly demanded by customers and governments via data protection regulations. Private and public organizations store and exchange through the Internet a large amount of data that include the personal information of users, employees, and customers. …”
Get full text
Article -
614
LLM-MalDetect: A Large Language Model-Based Method for Android Malware Detection
Published 2025-01-01Get full text
Article -
615
A Systematic Literature Review on Privacy Preservation in VANETs: Trends, Challenges, and Future Directions
Published 2025-01-01“…Privacy preservation is a fundamental requirement in vehicular ad hoc networks (VANETs) because it addresses sensitive vehicle and driver data. …”
Get full text
Article -
616
Enhancing Privacy by Large Mask Inpainting and Fusion-Based Segmentation in Street View Imagery
Published 2025-08-01“…Despite its reliance on accurate sensor calibration and multimodal data availability, the proposed framework offers a scalable solution for privacy-sensitive applications such as urban mapping, and virtual tourism, delivering high-quality anonymized imagery with minimal artifacts.…”
Get full text
Article -
617
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning
Published 2023-12-01“…The deep integration of Internet of Medical Things (IoMT) and Artificial intelligence makes the further development of intelligent medical services possible, but privacy leakage and data security problems hinder its wide application. …”
Get full text
Article -
618
A privacy budget adaptive optimization scheme for federated computing power Internet of things
Published 2024-12-01“…Furthermore, by assessing the similarity between the local model and the aggregated model, as well as their respective privacy budget proportions, the global contribution of each node was determined, which was used to fairly, also in real time, optimize and adjust the privacy budget settings in conjunction with the estimated privacy budget. …”
Get full text
Article -
619
Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing
Published 2025-01-01“…This paper introduces a Federated Learning Trust Model (FLTM) to assess trustworthiness across 2000 resources while preserving data privacy. FLTM incorporates six critical metrics: Availability, Reliability, Data Integrity, Identity, Computational Capability, and Throughput. …”
Get full text
Article -
620