Showing 521 - 540 results of 2,784 for search '((((( useds OR usedds) OR usedddds) OR uses) privacy data ) OR ( use privacy data ))', query time: 0.38s Refine Results
  1. 521

    Privacy-Preserving Machine Learning (PPML) Inference for Clinically Actionable Models by Baris Balaban, Seyma Selcan Magara, Caglar Yilgor, Altug Yucekul, Ibrahim Obeid, Javier Pizones, Frank Kleinstueck, Francisco Javier Sanchez Perez-Grueso, Ferran Pellise, Ahmet Alanay, Erkay Savas, Cetin Bagci, Osman Ugur Sezerman

    Published 2025-01-01
    “…We implement a privacy-preserving tree-based machine learning inference and run two security scenarios (scenario A and scenario B) containing four parts with progressively increasing the number of synthetic data points, which are used to enhance the accuracy of the attacker’s substitute model. …”
    Get full text
    Article
  2. 522

    A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining by Ibrahim Ileri, Tugba Gurgen Erdogan, Ayca Kolukisa-Tarhan

    Published 2025-07-01
    “…Process mining (PM) is a growing field that looks at how to find, analyze, and improve process models using data from information systems. It automates much of the detailed work that usually requires a lot of manual effort. …”
    Get full text
    Article
  3. 523

    Privacy-enhanced federated learning scheme based on generative adversarial networks by Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG

    Published 2023-06-01
    “…Federated learning, a distributed machine learning paradigm, has gained a lot of attention due to its inherent privacy protection capability and heterogeneous collaboration.However, recent studies have revealed a potential privacy risk known as “gradient leakage”, where the gradients can be used to determine whether a data record with a specific property is included in another participant’s batch, thereby exposing the participant’s training data.Current privacy-enhanced federated learning methods may have drawbacks such as reduced accuracy, computational overhead, or new insecurity factors.To address this issue, a differential privacy-enhanced generative adversarial network model was proposed, which introduced an identifier into vanilla GAN, thus enabling the input data to be approached while satisfying differential privacy constraints.Then this model was applied to the federated learning framework, to improve the privacy protection capability without compromising model accuracy.The proposed method was verified through simulations under the client/server (C/S) federated learning architecture and was found to balance data privacy and practicality effectively compared with the DP-SGD method.Besides, the usability of the proposed model was theoretically analyzed under a peer-to-peer (P2P) architecture, and future research work was discussed.…”
    Get full text
    Article
  4. 524

    Taking disagreements into consideration: human annotation variability in privacy policy analysis by Tian Wang, Yuanye Ma, Catherine Blake, Masooda Bashir, Hsin-Yuan Wang

    Published 2025-03-01
    “… Introduction. Privacy policies inform users about data practices but are often complex and difficult to interpret. …”
    Get full text
    Article
  5. 525
  6. 526

    Edge computing privacy protection method based on blockchain and federated learning by Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU

    Published 2021-11-01
    “…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
    Get full text
    Article
  7. 527

    Privacy-Preserving Continual Federated Clustering via Adaptive Resonance Theory by Naoki Masuyama, Yusuke Nojima, Yuichiro Toda, Chu Kiong Loo, Hisao Ishibuchi, Naoyuki Kubota

    Published 2024-01-01
    “…In the clustering domain, various algorithms with a federated learning framework (i.e., federated clustering) have been actively studied and showed high clustering performance while preserving data privacy. However, most of the base clusterers (i.e., clustering algorithms) used in existing federated clustering algorithms need to specify the number of clusters in advance. …”
    Get full text
    Article
  8. 528

    Privacy protection risk identification mechanism based on automated feature combination by CAI Minchao, YAO Hongwei, WANG Yang, QIN Zhan, CHEN Shaomeng, REN Kui

    Published 2024-11-01
    “…Building upon the privacy protection method using homomorphic encryption, the technical challenge of optimizing feature combinations was addressed. …”
    Get full text
    Article
  9. 529
  10. 530

    Using big data analytics to improve HIV medical care utilisation in South Carolina: A study protocol by Mohammad Rifat Haider, Bankole Olatosi, Jiajia Zhang, Sharon Weissman, Jianjun Hu, Xiaoming Li

    Published 2019-07-01
    “…The RFA is authorised to collect and merge data from these different sources and to ensure the privacy of all PLWH. …”
    Get full text
    Article
  11. 531

    A comprehensive review on the users’ identity privacy for 5G networks by Mamoon M. Saeed, Mohammad Kamrul Hasan, Ahmed J. Obaid, Rashid A. Saeed, Rania A. Mokhtar, Elmustafa Sayed Ali, Md Akhtaruzzaman, Sanaz Amanlou, A. K. M. Zakir Hossain

    Published 2022-03-01
    “…Abstract Fifth Generation (5G) is the final generation in mobile communications, with minimum latency, high data throughput, and extra coverage. The 5G network must guarantee very good security and privacy levels for all users for these features. …”
    Get full text
    Article
  12. 532

    Blockchain-based privacy-preserving multi-tasks federated learning framework by Yunyan Jia, Ling Xiong, Yu Fan, Wei Liang, Neal Xiong, Fengjun Xiao

    Published 2024-12-01
    “…To overcome this weakness, this work proposes a privacy-preserving FL framework with multi-tasks using partitioned blockchain, which can run several different FL tasks by multiple requesters. …”
    Get full text
    Article
  13. 533

    Privacy and Security in Digital Health Contact-Tracing: A Narrative Review by Shehani Pigera, Paul van Schaik, Karen Renaud, Miglena Campbell, Petra Manley, Pierre Esser

    Published 2025-01-01
    “…A total of 114 articles were retained as per the inclusion criteria, which included quantitative, qualitative, and mixed-methods studies. The data were analysed using thematic analysis. (3) Results: Eight main themes were derived: privacy, data protection and control, trust, technical issues, perceived benefit, knowledge and awareness, social influence, and psychological factors. (4) Conclusions: Improving privacy standards and the awareness of the digital contact-tracing process will encourage the acceptance of contact-tracing apps.…”
    Get full text
    Article
  14. 534

    Privacy risk adaptive access control model via evolutionary game by Hongfa DING, Changgen PENG, Youliang TIAN, Shuwen XIANG

    Published 2019-12-01
    “…Aiming at the problem that in the private sensitive date centralized and opening information systems,a fine-grained and self-adaptive access control model for privacy preserving is desperately needed,thus the balance between privacy preserving and data access utility should be achieved,a rational multi-player risk-adaptive based access control model for privacy preserving was proposed.Firstly,the privacy risk values of access request and requester were formulized by the private information quantity of the requested dataset,and by using Shannon information.Secondly,a risk-adaptive based access control evolutionary game model was constructed by using evolutionary game under the supposing of bounded rational players.Furthermore,dynamic strategies of participants were analyzed by using replicator dynamics equation,and the method of choosing evolutionary stable strategy was proposed.Simulation and comparison results show that,the proposed model is effective to dynamically and adaptively preserve privacy and more risk adaptive,and dynamic evolutionary access strategies of the bounded rational participants are more suitable for practical scenarios.…”
    Get full text
    Article
  15. 535

    Biometric-based medical watermarking system for verifying privacy and source authentication by Nada Fadhil Mohammed, Majid Jabbar Jawad, Suhad Ahmed Ali

    Published 2020-07-01
    “…Two of the most requirements in e-health care system is the ensuring the authenticity of the source from which the data is received and the privacy of medical record of the patient must be preserved. …”
    Get full text
    Article
  16. 536

    Preserving privacy and video quality through remote physiological signal removal by Saksham Bhutani, Mohamed Elgendi, Carlo Menon

    Published 2025-04-01
    “…However, the continuous and surreptitious recording of individuals by these devices and the collecting of sensitive health data without users’ knowledge or consent raise serious privacy concerns. …”
    Get full text
    Article
  17. 537

    Verifiable secure aggregation scheme for privacy protection in federated learning networks by Wujun Yao, Tanping Zhou, Yiliang Han, Xiaolin Wang

    Published 2025-08-01
    “…Security analysis demonstrates that our solution effectively ensures privacy protection. We tested the performance using a Raspberry Pi as an edge computing device. …”
    Get full text
    Article
  18. 538

    Digital citizenship literacy in Indonesia: The role of privacy awareness and social campaigns by Rossi Iskandar, Arifin Maksum, Arita Marini

    Published 2025-01-01
    “…A quantitative research approach was employed, using a survey method to collect data from 250 respondents of students from several high schools in Jakarta. …”
    Get full text
    Article
  19. 539

    Analysis, Design, and Implementation of a User-Friendly Differential Privacy Application by Reynardo Tjhin, Muhammad Sajjad Akbar, Clement Canonne, Rabia Bashir

    Published 2025-02-01
    “…In the era of artificial intelligence, ensuring privacy in publicly released data is critical to prevent linkage attacks that can reveal sensitive information about individuals. …”
    Get full text
    Article
  20. 540

    Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing by P. Anbumani, R. Dhanapal

    Published 2023-03-01
    “…Secondly, the user's privacy may be adequately protected with a secure authentication paradigm that employs ABS to safeguard the user's private data. …”
    Get full text
    Article