Suggested Topics within your search.
Suggested Topics within your search.
-
581
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
Published 2025-01-01“…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
Get full text
Article -
582
CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions
Published 2025-02-01“…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
Get full text
Article -
583
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The proposed auditing scheme in this paper can be used to guarantee the correctness and the completeness of the stored data in 5G-enabled software-defined edge computing. …”
Get full text
Article -
584
Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification
Published 2024-12-01“…First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutation-ordered binary (POB) and Shamir's secret sharing (SSS). …”
Get full text
Article -
585
Ethical Considerations in Emotion Recognition Research
Published 2025-05-01“…The framework introduces structural safeguards which include data minimization, adaptive consent mechanisms, and transparent model logic as a more complete solution than privacy or fairness approaches. …”
Get full text
Article -
586
Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews
Published 2025-06-01“…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
Get full text
Article -
587
Estimating rare disease prevalence and costs in the USA: a cohort study approach using the Healthcare Cost Institute claims data
Published 2024-04-01“…Building capabilities to use machine learning to accelerate the diagnosis of RDs would vastly improve with changes to healthcare data, such as standardising data input, linking databases, addressing privacy issues and assigning ICD-10 codes for all RDs, resulting in more robust data for RD analytics.…”
Get full text
Article -
588
Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure
Published 2025-06-01“…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
Get full text
Article -
589
-
590
Lessons Learned From European Health Data Projects With Cancer Use Cases: Implementation of Health Standards and Internet of Things Semantic Interoperability
Published 2025-03-01“…These initiatives aim to enhance the analysis of heterogeneous health data while aligning with EHDS implementation, specifically for the EHDS for the secondary use of data (EHDS2). …”
Get full text
Article -
591
Concurrent prescriptions for opioids and benzodiazepines and risk of opioid overdose: protocol for a retrospective cohort study using linked administrative data
Published 2021-02-01“…Our aim was to assess the risk of opioid overdose associated with concurrent use of opioids and benzodiazepines relative to opioids alone.Methods and analysis A retrospective cohort study will be conducted using medical claims data from adult residents of Montréal, Canada. …”
Get full text
Article -
592
A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation
Published 2019-06-01“…It is necessary for telehealth care providers to demonstrate that they have taken sufficient actions to protect their patients’ data security and privacy. The government provided a HIPAA audit protocol that is highly useful for internal security and privacy auditing on health care systems, however, this protocol includes extensive details that are not always specific to telehealth and therefore is difficult to be used by telehealth practitioners. …”
Get full text
Article -
593
A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards
Published 2025-08-01“…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
Get full text
Article -
594
Prompts, privacy, and personalized learning: integrating AI into nursing education—a qualitative study
Published 2025-04-01“…However, questions remain regarding the ethical use of AI-generated outputs, data privacy concerns, and limitations in recognizing emotional nuances. …”
Get full text
Article -
595
A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond
Published 2025-01-01“…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
Get full text
Article -
596
-
597
Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies
Published 2023-07-01“… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
Get full text
Article -
598
Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security
Published 2024-12-01“…The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches. …”
Get full text
Article -
599
Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers
Published 2025-01-01“…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
Get full text
Article -
600
Detecting Personally Identifiable Information Through Natural Language Processing: A Step Forward
Published 2025-04-01“…The protection of personally identifiable information (PII) is being increasingly demanded by customers and governments via data protection regulations. Private and public organizations store and exchange through the Internet a large amount of data that include the personal information of users, employees, and customers. …”
Get full text
Article