Showing 1,201 - 1,220 results of 2,784 for search '((((( useds OR useddds) OR useddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.25s Refine Results
  1. 1201

    Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm. by Yonggang Huang, Teng Teng, Yuanyuan Li, Minghao Zhang

    Published 2025-01-01
    “…However, when dealing with high-dimensional medical data, the inherent transparency of blockchain conflicts with the necessity of protecting patient privacy. …”
    Get full text
    Article
  2. 1202
  3. 1203

    An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios by Jun-Feng Tian, Hao-Ning Wang

    Published 2020-05-01
    “…With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. …”
    Get full text
    Article
  4. 1204

    Digital twins, synthetic patient data, and in-silico trials: can they empower paediatric clinical trials? by ProfMD Mohan Pammi, Prakesh S Shah, MD, Liu K Yang, PhD, Joseph Hagan, ScD, Nima Aghaeepour, PhD, ProfMD Josef Neu, PhD

    Published 2025-05-01
    “…Alternatives to overcome these issues using virtual patient data—namely, digital twins, synthetic patient data, and in-silico trials—are now possible due to rapid advances in digital health-care tools and interventions. …”
    Get full text
    Article
  5. 1205

    HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes by Xiaohui Yang, Jing Liu

    Published 2024-01-01
    “…Furthermore, the scheme supports attribute revocation and forward secrecy to enhance user privacy. The security of HA-Med is rigorously verified through theoretical analysis, and its feasibility is demonstrated through experiments conducted using the Java-based JPBC library.…”
    Get full text
    Article
  6. 1206

    Harnessing multi-source data for AI-driven oncology insights: Productivity, trend, and sentiment analysis by Wissal EL HABTI, Abdellah AZMANI

    Published 2025-03-01
    “…The most prominent article emphasized the Explainability of AI methods (XAI) with a profound discussion of their potential implications and privacy in data fusion contexts. Current trends involve the utilization of supervised learning methods such as CNN, Bayesian networks, and extreme learning machines for various cancers, particularly breast, lung, brain, and skin cancer. …”
    Get full text
    Article
  7. 1207

    Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023 by Supardi Hamid, Mohammad Nurul Huda

    Published 2025-01-01
    “…Data breaches in the government sector are severe threats to cybersecurity and illegal acts that flagrantly violate security and privacy laws. …”
    Get full text
    Article
  8. 1208
  9. 1209

    GABs: A Game-Based Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks by Tristan Daladier Engouang, Yun Liu, Zhenjiang Zhang

    Published 2015-03-01
    “…The content herein models homogeneous WSN environment of highly linked nodes, in a theoretical game with synchronized actions, where, in order to transmit their readings securely across the network in some level of hierarchy, using the technique of data aggregation, sensor nodes with communication and computational resources constraint should establish trusted and direct links between their neighbors for the privacy and integrity of their data against faulty nodes, while ensuring energy saving. …”
    Get full text
    Article
  10. 1210

    Security access permission authentication simulation of multi-source network big data based on blockchain by Bin LI, Hui HE, Zhongying ZHAO, Jingwei GUO

    Published 2024-02-01
    “…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
    Get full text
    Article
  11. 1211

    Design of an Improved Model for Smart Grid Pricing Using ST-GNN-PNet and MAD-RL-StackelNet by Jalit S. A., Warkad S. B., Rane P. R., Bonde S. V.

    Published 2025-01-01
    “…However, current pricing models fail to capture spatio-temporal load behavior, consumer heterogeneity, and externalities like emissions. Privacy constraints also hinder granular data collection, causing revenue loss. …”
    Get full text
    Article
  12. 1212

    F-DATA: A Fugaku Workload Dataset for Job-centric Predictive Modelling in HPC Systems by Francesco Antici, Andrea Bartolini, Jens Domke, Zeynep Kiziltan, Keiji Yamamoto

    Published 2025-07-01
    “…The encoding is based on a Natural Language Processing model and retains sensitive but useful job information for prediction purposes without violating privacy concerns.…”
    Get full text
    Article
  13. 1213

    CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data Generation by Shu Feng, Luhan Gao, Leyi Shi

    Published 2025-02-01
    “…It employs a data generator that integrates artificially generated data with the existing data from local clients by employing label correction and data generation techniques. …”
    Get full text
    Article
  14. 1214

    Next Arrival and Destination Prediction via Spatiotemporal Embedding with Urban Geography and Human Mobility Data by Pengjiang Li, Zaitian Wang, Xinhao Zhang, Pengfei Wang, Kunpeng Liu

    Published 2025-02-01
    “…In this paper, we develop an embedding method to predict the next arrival using the origin–destination (O-D) pair trajectory information and point of interest (POI) data. …”
    Get full text
    Article
  15. 1215

    Provider Perspectives on the Use of Mental Health Apps, and the BritePath App in Particular, With Adolescents at Risk for Suicidal Behavior: Qualitative Study by Frances Lynch, Julie Cavese, Lucy Fulton, Nancy Vuckovic, David Brent

    Published 2025-02-01
    “…Analyses identified 4 key themes related to mental health apps: (1) almost all providers viewed mental health apps as an adjunct to, rather than a replacement for, psychotherapy visits; (2) most providers were concerned about the cost of apps and youth access to them; (3) providers noted the challenge of maintaining patient engagement with apps over time; and (4) providers were concerned about patient privacy, in terms of both data shared with app developers and data privacy within families. …”
    Get full text
    Article
  16. 1216

    Evolution, topics and relevant research methodologies in business intelligence and data analysis in the academic management of higher education institutions. A literature review by M. Correa-Peralta, J. Vinueza-Martínez, L. Castillo-Heredia

    Published 2025-03-01
    “…In the digital era, Business Intelligence (BI) and data analytics have become essential for optimizing academic management in higher education institutions. …”
    Get full text
    Article
  17. 1217

    How machine learning on real world clinical data improves adverse event recording for endoscopy by Stefan Wittlinger, Isabella C. Wiest, Mahboubeh Jannesari Ladani, Jakob Nikolas Kather, Matthias P. Ebert, Fabian Siegel, Sebastian Belle

    Published 2025-07-01
    “…This study evaluates a machine learning-based approach for systematically detecting endoscopic adverse events from real-world clinical metadata, including structured hospital data such as ICD-codes and procedure timings. Using a random forest classifier detecting adverse events perforation, bleeding, and readmission, we analysed 2490 inpatient cases, achieving significant improvements over baseline prediction accuracy. …”
    Get full text
    Article
  18. 1218

    Unraveling the role of data sharing in open finance diffusion: an evolutionary game approach on complex networks by Dongqing Chen, Chaoqun Ma, Liwei Zhang, Lijie Li

    Published 2025-05-01
    “…In this study, we develop a diffusion model using evolutionary game theory on complex networks to explore how data sharing influences lenders’ micro-level decision-making and promotes the macro-level diffusion of open finance. …”
    Get full text
    Article
  19. 1219

    Making trauma ecological momentary assessment studies FAIR: review of design considerations and data procedures by Bryce Hruska, Marilyn L. Piccirillo, Lonneke I. M. Lenferink, Maria L. Pacella-LaBarbara, Ateka A. Contractor, Matthew Price, Talya Greene

    Published 2025-12-01
    “…Many challenges remain for the implementation of these practices including balancing privacy concerns and efforts to make trauma EMA data readily shareable.…”
    Get full text
    Article
  20. 1220