Showing 401 - 420 results of 2,784 for search '((((( useds OR uses) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.33s Refine Results
  1. 401

    A Set of Tools and Data Management Framework for the IoT–Edge–Cloud Continuum by Janis Judvaitis, Eduards Blumbergs, Audris Arzovs, Andris Ivars Mackus, Rihards Balass, Leo Selavo

    Published 2024-12-01
    “…The approach of the IECC Data Management Framework (DMF) introduces a novel combination of multiple easy-to-configure plugin environments using data visualization features. …”
    Get full text
    Article
  2. 402

    SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications by Zaineb Naaz, Gamini Joshi, Vidushi Sharma

    Published 2025-04-01
    “…Based on requirements, the control center decrypts the aggregated data using its private key. Employing the Paillier cryptosystem for encryption and RSA for authentication, SAFED is fault-tolerant, maintaining functionality even if some IoT nodes fail. …”
    Get full text
    Article
  3. 403
  4. 404

    BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management by Xinzhang Chen, Arash Shaghaghi, Jesse Laeuchli, Salil S. Kanhere

    Published 2025-01-01
    “…Managing posthumous data is becoming an increasingly complex challenge, with many existing technical solutions proving impractical in real-world applications. …”
    Get full text
    Article
  5. 405

    Ethical Considerations in Emotion Recognition Research by Darlene Barker, Mukesh Kumar Reddy Tippireddy, Ali Farhan, Bilal Ahmed

    Published 2025-05-01
    “…The framework introduces structural safeguards which include data minimization, adaptive consent mechanisms, and transparent model logic as a more complete solution than privacy or fairness approaches. …”
    Get full text
    Article
  6. 406

    Privacy-Preserving Federated Class-Incremental Learning by Jue Xiao, Xueming Tang, Songfeng Lu

    Published 2024-01-01
    “…For privacy protection, we use Bayesian differential privacy to provide more balanced privacy protection for different datasets. …”
    Get full text
    Article
  7. 407

    Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring by Kalashtari Niloofar, Huhs Niklas, Kraitl Jens, Hornberger Christoph, Simanski Olaf

    Published 2024-12-01
    “…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
    Get full text
    Article
  8. 408

    Wasserstein GAN for moving differential privacy protection by Enze Liu, Zhiguang Chu, Xing Zhang

    Published 2025-06-01
    “…Abstract Training machine learning models often requires large datasets, but using sensitive data for training poses risks of privacy leakage. …”
    Get full text
    Article
  9. 409
  10. 410

    Marketing Implications of Information Society Privacy Concerns by Gheorghe ORZAN, Călin VEGHEŞ, Cătălin SILVESTRU, Mihai ORZAN, Ramona BERE

    Published 2012-12-01
    “…The Internet has facilitated access to intimate user knowledge for both official and private agents and most of modern marketing strategies are based on a wealth of personal user data used to target its specific needs and expectations, a process that has its obvious pros and cons, which have been heavily debated intensively in both academic and social venues. …”
    Get full text
    Article
  11. 411

    An Enhanced Communication Protocol for Location Privacy in WSN by Abdel-Shakour Abuzneid, Tarek Sobh, Miad Faezipour

    Published 2015-04-01
    “…WSN is used in many applications, such as object tracking and security monitoring. …”
    Get full text
    Article
  12. 412

    Determinants of Childbirth Choice in Rural Senegal: Mixed-Methods Analysis Using Data from the Niakhar Demographic Surveillance System by Pape Latyr Faye

    Published 2025-06-01
    “…Materials and methods: The study used a mixed-methods approach. Data from women who gave birth in the Niakhar observatory area between 1983 and 2020 were used, and chi-square tests and qualitative analyses were performed. …”
    Get full text
    Article
  13. 413

    Privacy protection scheme for mobile social network by Seyyed Mohammad Safi, Ali Movaghar, Mohammad Ghorbani

    Published 2022-07-01
    “…One way to protect one’s privacy is using encryption. Therefore, in the present paper, an improved secure design was presented for mobile social network using ciphertext-policy attribute-based encryption (CP-ABE) and advanced encryption standard (AES) that will encrypt users data in an end-to-end manner. …”
    Get full text
    Article
  14. 414
  15. 415

    Privacy-preserving task matching scheme for crowdsourcing by SONG Fuyuan, DING Siyang, WANG Wei, JIANG Qin, FU Zhangjie

    Published 2025-05-01
    “…Due to the potential untrustworthiness of crowdsourcing platforms, which may lead to the leakage of users’ private information, users are required to encrypt their data prior to uploading. To fulfill task matching while preserving privacy, the crowdsourcing platform employs encrypted spatial keyword queries to perform task matching of workers’ interests and locations. …”
    Get full text
    Article
  16. 416

    FedDBO: A Novel Federated Learning Approach for Communication Cost and Data Heterogeneity Using Dung Beetle Optimizer by Dongyan Wang, Limin Chen, Xiaotong Lu, Yidi Wang, Yue Shen, Jingjing Xu

    Published 2024-01-01
    “…As an emerging distributed machine learning technology, federated learning has gained widespread attention due to its critical privacy protection mechanism. However, it also faces challenges such as high communication costs and heterogeneous client data.In order to address the above issues. …”
    Get full text
    Article
  17. 417

    Privacy-preserving maximum value determination scheme by Min Hou, Min Hou, Yue Wu

    Published 2025-07-01
    “…This paper introduces a quantum-secure scheme for conducting privacy-preserving maximum value determination, allowing the parties to ascertain the highest value from their confidential inputs while keeping non-maximum data private. …”
    Get full text
    Article
  18. 418

    Comparative Analysis of RAG-Based Open-Source LLMs for Indonesian Banking Customer Service Optimization Using Simulated Data by Hendra Lijaya, Patricia Ho, Handri Santoso

    Published 2025-07-01
    “…These findings underscore the potential of locally operated open-source LLMs for banking applications, ensuring privacy and regulatory compliance. However, limitations include reliance on synthetic data, a narrow question set, and lack of user diversity. …”
    Get full text
    Article
  19. 419

    Record linkage without patient identifiers: Proof of concept using data from South Africa's national HIV program. by Khumbo Shumba, Jacob Bor, Cornelius Nattey, Dickman Gareta, Evelyn Lauren, William Macleod, Matthew P Fox, Adrian Puren, Koleka Mlisana, Dorina Onoya

    Published 2025-01-01
    “…Linkage variables were result value, specimen collection date, facility of collection, year and month of birth, and sex. We used three matching strategies: exact matching on exact values of all variables, caliper matching allowing a ± 5 day window on result date, and specimen barcode matching using unique specimen identifiers. …”
    Get full text
    Article
  20. 420

    Study on privacy preserving encrypted traffic detection by Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN

    Published 2021-08-01
    “…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
    Get full text
    Article