Suggested Topics within your search.
Suggested Topics within your search.
-
341
Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring
Published 2024-12-01“…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
Get full text
Article -
342
-
343
Research on algorithms of data encryption scheme that supports homomorphic arithmetical operations
Published 2015-01-01“…An efficient homomorphic encryption scheme called CESIL was proposed to meet the requirements of operating on encrypted data when protecting users' privacy in computing services.CESIL included key generation algorithm,encryption algorithm,decryption algorithm and calculation algorithm.In CESIL,a polynomial coefficient vector ring was established by defining addition and multiplication using polynomial ring; by using ideal lattice,the vector ring was partitioned into many residue classes to produce a quotient ring and its representative set; the plaintext was encrypted by mapping it to a representative and replacing the representative with another element in the same residue class.The features of operations in quotient ring ensured CESIL operate on encrypted data.Furthermore,the fast Fourier transform (FFT) algorithm was used to increase the efficiency and decrease the length of key.Theoretical analysis and experimental results show that CESIL is semantically secure,and can do addition and multiplication operations on encrypted data homomorphically in a specific scope.Comparing to some existing homomorphic encryption schemes,the CESIL runs efficiently,and has shorter length in key and ciphertext.Thus,the CESIL fits the practical applications better.…”
Get full text
Article -
344
Building Equi-Width Histograms on Homomorphically Encrypted Data
Published 2025-06-01“…Histograms are widely used for summarizing data distributions, detecting anomalies, and improving machine learning models’ accuracy. …”
Get full text
Article -
345
Personal Information Sharing Behavior Using Social Media
Published 2025-06-01“…This study explores personal information sharing behavior publication patterns and trends on social media from 2007-2024 with an aim to highlight the annual growth of personal information sharing behavior (PISB) on social media platforms, key patterns in the PISB literature in terms of frequently cited authors, countries, institutions, sources, highly cited papers, collaboration and authorship patterns, thematic evolution, keyword and key factor analysis (such as countries, sources, and keywords). We used Scopus database for data extraction, and 1020 pertinent records were chosen. …”
Get full text
Article -
346
Privacy-Preserving Process Mining: A Blockchain-Based Privacy-Aware Reversible Shared Image Approach
Published 2024-12-01“…Deeper integration of cross-organizational business process sharing and process mining has advanced the Industrial Internet. Privacy breaches and data security risks limit its use. …”
Get full text
Article -
347
Secured cloud-based image data processing of self-driving vehicles using full homomorphic encryption
Published 2025-10-01“…Self-driving vehicles leverage internet of things (IoT) technology to utilize multiple sensors to continuously monitor their environment and make decisions without human intervention. Data collected from these sensors require secure transmission and encrypted storage in cloud servers, where retrieving the data without decryption is necessary to ensure privacy. …”
Get full text
Article -
348
Assessing the Fidelity and Utility of Water Systems Data Using Generative Adversarial Networks: A Technical Review
Published 2025-01-01“…This review paper addresses this limitation by utilizing Generative Adversarial Networks (GANs) to generate realistic synthetic datasets, overcoming data scarcity and privacy concerns in WDSs. We review, train, and evaluate seven state-of-the-art GAN models using three multivariate time-series datasets. …”
Get full text
Article -
349
-
350
Travel Behavior during the 2021 British Columbia Floods Using De-identified Network Mobility Data
Published 2024-05-01“…This study investigates residents’ emergent travel behavior before, during, and after the 2021 British Columbia Floods. Using de-identified network mobility data, we analyze travel patterns centered around the municipality of Hope in British Columbia, Canada. …”
Get full text
Article -
351
Predicting Alzheimer's Disease onset: A machine learning framework for early diagnosis using biomarker data
Published 2025-01-01Get full text
Article -
352
AN APPROACH PRIORITIZING THE CAUSAL FACTORS OF LARGE SCALED DATA USING SOFT COMPUTING: A CASE STUDY
Published 2021-12-01Get full text
Article -
353
Does data privacy influence digital marketing? The mediating role of AI-driven trust: An empirical study of Zain Telecom company in Jordan
Published 2025-01-01“…The PLS-SEM technique was used in this research to analyze data privacy, digital marketing effectiveness, and AI-driven trust constructs. …”
Get full text
Article -
354
Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption
Published 2025-06-01“…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
Get full text
Article -
355
Data Obfuscation Through Latent Space Projection for Privacy-Preserving AI Governance: Case Studies in Medical Diagnosis and Finance Fraud Detection
Published 2025-03-01“… Abstract BackgroundThe increasing integration of artificial intelligence (AI) systems into critical societal sectors has created an urgent demand for robust privacy-preserving methods. Traditional approaches such as differential privacy and homomorphic encryption often struggle to maintain an effective balance between protecting sensitive information and preserving data utility for AI applications. …”
Get full text
Article -
356
How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries
Published 2019-03-01“…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
Get full text
Article -
357
Analyzing the vulnerabilities in Split Federated Learning: assessing the robustness against data poisoning attacks
Published 2025-08-01“…Abstract Distributed Collaborative Machine Learning (DCML) offers a promising alternative to address privacy concerns in centralized machine learning. …”
Get full text
Article -
358
-
359
FedSVD: Asynchronous Federated Learning With Stale Weight Vector Decomposition
Published 2025-01-01“…Federated learning (FL) emerges as a collaborative learning framework that addresses the critical needs for privacy preservation and communication efficiency. …”
Get full text
Article -
360
Scalable architecture for autonomous malware detection and defense in software-defined networks using federated learning approaches
Published 2025-08-01“…This architecture combines SDN’s centralized management of potentially significant data streams with FL’s decentralized, privacy-preserving learning capabilities in a distributed manner adaptable to varying time and space constraints. …”
Get full text
Article