Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useds » usedds (Expand Search)
usedds » useddds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
141
Desensitized Financial Data Generation Based on Generative Adversarial Network and Differential Privacy
Published 2025-02-01“…This paper proposes a Noise Visibility Function-Differential Privacy Generative Adversarial Network (NVF-DPGAN) model, which generates privacy preserving data similar to the original data, and can be applied to data augmentation for deep learning. …”
Get full text
Article -
142
Internet of things data security and privacy protection based on improved federated learning
Published 2025-07-01“…At the same time, using the decentralized function to encrypt the privacy of the training model, the learning model can provide more secure and reliable services, aiming to solve the problem of large difference in the quality of computing nodes and data privacy leakage in the current FL. …”
Get full text
Article -
143
Federated learning for privacy-enhanced mental health prediction with multimodal data integration
Published 2025-12-01“…The proposed framework incorporates a Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) network within a federated learning environment, ensuring that raw user data remains decentralised and privacy is preserved using differential privacy and encryption techniques. …”
Get full text
Article -
144
Privacy-Aware Table Data Generation by Adversarial Gradient Boosting Decision Tree
Published 2025-08-01“…Privacy preservation poses significant challenges in third-party data sharing, particularly when handling table data containing personal information such as demographic and behavioral records. …”
Get full text
Article -
145
-
146
Legitimate Expectations of Privacy in the Era of Digitalization
Published 2023-04-01“…This article contends that in the present era of digitalization people’s right to privacy should be protected no less than it was before the widespread use of digital technologies. …”
Get full text
Article -
147
Sharing is CAIRing: Characterizing principles and assessing properties of universal privacy evaluation for synthetic tabular data
Published 2024-12-01“…However, the ability to share data is hindered by regulations protecting the privacy of natural persons. …”
Get full text
Article -
148
Privacy under threat – The intersection of IoT and mass surveillance
Published 2024-10-01“…It has been shown that there are issues with applying existing regulations to IoT and mass surveillance and that no universal legal framework currently exists to protect the right to privacy. The use of IoT technology, especially given the rapid development of artificial intelligence, will in the future raise numerous dilemmas regarding the entities responsible for collecting personal data, the consents required for data usage and processing, where the collected personal data will be used, and for what purposes. …”
Get full text
Article -
149
Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption
Published 2025-05-01“…The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. …”
Get full text
Article -
150
-
151
Ensuring Privacy and Security on Banking Websites in Malaysia: A Cookies Scanner Solution
Published 2023-09-01Get full text
Article -
152
Enhancing Data Security in Distributed Systems Using Homomorphic Encryption and Secure Computation Techniques
Published 2025-01-01“…Traditional solutions tend to use standard techniques like basic data wrapping and cryptographic 'rings'; but, due to the design properties required, they end up as lightweight mechanisms, usually not interpretation-at-all capable because of the need for protecting data during processing - leaving these applications hard to use and maintain long-term, or otherwise, limited to cloud computing and federated learning, when individual data types can be worked on within providers like AWS, Azure, etc, etc; or, even, explaining the results with near total indifference to the underlying big data tools, analytics, or neural architectures. …”
Get full text
Article -
153
A Differential Privacy Framework with Adjustable Efficiency–Utility Trade-Offs for Data Collection
Published 2025-02-01“…The widespread use of mobile devices has led to the continuous collection of vast amounts of user-generated data, supporting data-driven decisions across a variety of fields. …”
Get full text
Article -
154
My privacy at risk – my guard is on: a study of SNS use among young adults
Published 2024-03-01“…Purpose – Increasing incidents of privacy invasion on social networking sites (SNS) are intensifying the concerns among stakeholders about the misuse of personal data. …”
Get full text
Article -
155
The Dual Nature of Trust in Participatory Sciences: An Investigation into Data Quality and Household Privacy Preferences
Published 2024-11-01“…In Crowd the Tap, we engaged participants through facilitator organizations including high schools, faith communities, universities, and a corporate volunteer program. We used Kruskal Wallis tests and chi-square tests with Bonferroni post hoc tests to assess how data quality and privacy preferences differed across facilitator groups and amongst those who participated in the project independently (unfacilitated). …”
Get full text
Article -
156
A synchronous compression and encryption method for massive electricity consumption data privacy preserving
Published 2025-01-01“…Our proposed algorithm uses a ternary Logistic-Tent chaotic system for generating a chaotic measurement matrix, allowing simultaneous data compression and encryption of user-side voltage and current data. …”
Get full text
Article -
157
Practical and ready-to-use methodology to assess the re-identification risk in anonymized datasets
Published 2025-07-01“…Abstract To prove that a dataset is sufficiently anonymized, many privacy policies suggest that a re-identification risk assessment be performed, but do not provide a precise methodology for doing so, leaving the industry alone with the problem. …”
Get full text
Article -
158
A Blockchain-Based Secure Data Transaction and Privacy Preservation Scheme in IoT System
Published 2025-08-01“…With the explosive growth of Internet of Things (IoT) devices, massive amounts of heterogeneous data are continuously generated. However, IoT data transactions and sharing face multiple challenges such as limited device resources, untrustworthy network environment, highly sensitive user privacy, and serious data silos. …”
Get full text
Article -
159
A Comprehensive Study of Traditional and Deep-learning Schemes for Privacy and Data Security in the Cloud
Published 2022-12-01“…However, it faces great difficulties in ensuring data confidentiality and privacy. People hesitate to use it due to the risk of innumerable attacks and security breaches. …”
Get full text
Article -
160