Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
61
Privacy protection method on time-series data publication
Published 2015-11-01“…A differential privacy model was proposed based on the sampling filtering and the mechanism of evaluation.Firstly,fixed sampling method was used to sample the original data and the non-sampling data be published directly.Secondly,for the sampling date,utilize the differential privacy mechanism to add the noise.Then,use Kalman to correct the sampling date.Finally,use the mutual information to evaluate data under different sampling intervals.Through the experiment,it is proved that the mechanism can achieve a good balance between the practicality and protective.…”
Get full text
Article -
62
Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics
Published 2024-09-01“…The article discusses the use of Ethereum blockchain technology in the Internet of Things (IoT) network for IT diagnostics of patients, which increases data security and user privacy. …”
Get full text
Article -
63
Synthetic data for privacy-preserving clinical risk prediction
Published 2024-10-01“…Compared with other privacy-enhancing approaches—such as federated learning—analyses performed on synthetic data can be applied downstream without modification, such that synthetic data can act in place of real data for a wide range of use cases. …”
Get full text
Article -
64
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01“…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
Get full text
Article -
65
Differential Privacy and Collective Bargaining over Workplace Data
Published 2024-12-01“…I argue that using differential privacy, a technique for processing data that makes it harder to determine who contributed data to a dataset, would remove an obstacle to employers sharing workplace data with worker representatives.…”
Get full text
Article -
66
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01“…In addition, the corres ding fake data set was used to assure the balanced distribution of data in each part, which realized privacy protection of data integration. …”
Get full text
Article -
67
Aggregated privacy-preserving auditing for cloud data integrity
Published 2015-10-01“…To solve the problem of data integrity in cloud storage,an aggregated privacy-preserving auditing scheme was proposed.To preserve data privacy against the auditor,data proof and tag proof were encrypted and combined by using the bilinearity property of the bilinear pairing on the cloud server.Furthermore,an efficient index mechanism was designed to support dynamic auditing,which could ensure that data update operations did not lead to high additional computation or communication cost.Meanwhile,an aggregation method for different proofs was designed to handle multiple auditing requests.Thus the proposed scheme could also support batch auditing for multiple owners and multiple clouds and multiple files.The communication cost of batch auditing was independent of the number of auditing requests.The theoretical analysis and experimental results show that the proposed scheme is provably secure.Compared with existing auditing scheme,the efficacy of the proposed individual auditing and batch auditing improves 21.5% and 31.8% respectively.…”
Get full text
Article -
68
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01“…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
Get full text
Article -
69
A Review of Differential Privacy in Individual Data Release
Published 2015-10-01“…The rapid development of mobile technology has improved users' quality of treatment, and tremendous amounts of medical information are readily available and widely used in data analysis and application, which bring on serious threats to users' privacy. …”
Get full text
Article -
70
Data driven healthcare insurance system using machine learning and blockchain technologies
Published 2025-07-01Get full text
Article -
71
Decentralized big data mining: federated learning for clustering youth tobacco use in India
Published 2024-12-01“…The analysis employs three clustering algorithms K-Means, DBSCAN, and Hierarchical Clustering within a federated learning framework, which ensures that sensitive public health data remains decentralized and private. Federated learning enables collaborative analysis across different regions by sharing only model parameters rather than raw data, thus enhancing privacy. …”
Get full text
Article -
72
Privacy-Preserving Clinical Decision Support for Emergency Triage Using LLMs: System Architecture and Real-World Evaluation
Published 2025-07-01“…We evaluate the system through two studies: (1) a benchmark of 750+ USMLE-style questions validating the medical reasoning of fine-tuned LLMs; and (2) a real-world case study (<i>n</i> = 132, 75.8% first-pass agreement) using de-identified MIMIC-III data to assess triage accuracy and responsiveness. …”
Get full text
Article -
73
Blockchain Approach for Healthcare Using Fog Topology and Lightweight Consensus
Published 2025-01-01Get full text
Article -
74
Privacy Auditing of Lithium-Ion Battery Ageing Model by Recovering Time-Series Data Using Gradient Inversion Attack in Federated Learning
Published 2025-05-01“…The exchange of gradients is a widely used method in modelling systems for machine learning (e.g., distributed training, federated learning) in privacy-sensitive domains. …”
Get full text
Article -
75
Privacy self-management and the issue of privacy externalities: of thwarted expectations, and harmful exploitation
Published 2020-12-01“…This term, related to similar concepts from the literature on privacy such as ‘networked privacy’ or ‘data pollution’, is used here to bring to light the incentives and exploitative dynamics behind a phenomenon which, I demonstrate, benefits both the user and the data controller to the detriment of third-party data subjects. …”
Get full text
Article -
76
Privacy Centric Offline Chatbot using Large Language Models
Published 2025-07-01“…They also might collect and store the data leading to privacy breaches. This research paper focuses on these problems. …”
Get full text
Article -
77
A Privacy-Preserving RL-Based Secure Charging Coordinator Using Efficient FL for Smart Grid Home Batteries
Published 2025-02-01Get full text
Article -
78
Orchestrating privacy-protected big data analyses of data from different resources with R and DataSHIELD.
Published 2021-03-01“…DataSHIELD uses Opal which is a data integration system used by epidemiological studies and developed by the OBiBa open source project in the domain of bioinformatics. …”
Get full text
Article -
79
-
80
A Hybrid Framework for Enhancing Privacy in Blockchain-Based Personal Data Sharing using Off-Chain Storage and Zero-Knowledge Proofs
Published 2025-06-01“…However, its widespread adoption is constrained by challenges such as limited scalability, privacy concerns, and conflicts with regulatory frameworks like the General Data Protection Regulation (GDPR). …”
Get full text
Article