Showing 461 - 480 results of 2,784 for search '((((( useds OR uses) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.34s Refine Results
  1. 461

    Adaptive Transformation for Robust Privacy Protection in Video Surveillance by Mukesh Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan Kankanhalli

    Published 2012-01-01
    “…However, the current detectors are not fully reliable, leading to breaches in privacy protection. In this paper, we propose a privacy protection method that adopts adaptive data transformation involving the use of selective obfuscation and global operations to provide robust privacy even with unreliable detectors. …”
    Get full text
    Article
  2. 462

    Sensitivity-Aware Differential Privacy for Federated Medical Imaging by Lele Zheng, Yang Cao, Masatoshi Yoshikawa, Yulong Shen, Essam A. Rashed, Kenjiro Taura, Shouhei Hanaoka, Tao Zhang

    Published 2025-04-01
    “…Our idea is that the sensitivity of each data sample can be objectively measured using real-world attacks. …”
    Get full text
    Article
  3. 463

    Federated Learning for Privacy-Preserving Employee Performance Analytics by Jay Barach

    Published 2025-01-01
    “…This paper introduces HFAN-Priv, a hierarchical federated attention network designed to predict employee resignation risk and evaluate performance trends without sharing raw data across organizations. The framework integrates feature-level and instance-level attention to model complex workforce patterns, applies differential privacy through gradient masking to ensure compliance with data protection regulations, and enhances interpretability using local SHAP and LIME explanations. …”
    Get full text
    Article
  4. 464

    Information Security and Privacy Management in Intelligent Transportation Systems by Mariia Bakhtina, Raimundas Matulevičius, Lukaš Malina

    Published 2024-04-01
    “…First, the framework is used to extract data during the literature review defining state-of-the-art aspects and measures. …”
    Get full text
    Article
  5. 465

    Assessing the Uses, Benefits, and Limitations of Digital Technologies Used by Health Professionals in Supporting Obesity and Mental Health Communication: Scoping Review by Amanda Kearns, Anne Moorhead, Maurice Mulvenna, Raymond Bond

    Published 2025-02-01
    “…MethodsA comprehensive scoping review, which followed a validated methodology, analyzed studies published between 2013 and 2023 across 8 databases. The data extraction focused on HPs’ use of communication technologies, intervention types, biopsychosocial considerations, and perceptions of technology use. …”
    Get full text
    Article
  6. 466

    Expedite Privacy-Preserving Emergency Communication Scheme for VANETs by Long Chen, Xuedan Jia, Lixia Meng, Liangmin Wang

    Published 2013-05-01
    “…But requirements of information collection and data transmission in emergency scenario are very imperative. …”
    Get full text
    Article
  7. 467

    Privacy for Process Mining: A Systematic Literature Review by Ibrahim Ileri, Tugba Gurgen Erdogan, Ayca Kolukisa-Tarhan

    Published 2025-01-01
    “…Process mining is an emerging scientific discipline focused on discovering, inspecting, and enhancing process models using event data collected from information systems, automating the detailed modeling work without the need for extensive manual labor. …”
    Get full text
    Article
  8. 468
  9. 469

    Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward by Sudeep Tanwar, Qasim Bhatia, Pruthvi Patel, Aparna Kumari, Pradeep Kumar Singh, Wei-Chiang Hong

    Published 2020-01-01
    “…The decentralized database in BT emphasizes data security and privacy. Also, the consensus mechanism in it makes sure that data is secured and legitimate. …”
    Get full text
    Article
  10. 470

    A Comprehensive Review of Cryptographic Techniques in Federated Learning for Secure Data Sharing and Applications by Anik Sen, Swee-Huay Heng, Shing-Chiang Tan

    Published 2025-01-01
    “…Federated Learning (FL) introduces a decentralised machine learning paradigm whereby models can be trained over distributed nodes without sharing data. Despite its promise, FL faces significant security challenges, such as gradient inversion, model poisoning, and privacy leakage, which involve strong cryptographic techniques. …”
    Get full text
    Article
  11. 471

    The Nature of the Right to Personal Data: A Civil Law Perspective by L. V. Shvets

    Published 2024-11-01
    “…This paper aims to examine the nature of the right to personal data. Based on an analysis of Russian legislation, the Author concludes that there exists an unnamed, independent subjective right, which serves to enable the data subject to control and define the conditions for data processing, as well as to protect personal data from unauthorized use. …”
    Get full text
    Article
  12. 472

    Trajectory differential privacy protection mechanism based on prediction and sliding window by Ayong YE, Lingyu MENG, Ziwen ZHAO, Yiqing DIAO, Jiaomei ZHANG

    Published 2020-04-01
    “…To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation method were used to predict the location which satisfies the differential privacy and temporal and spatial security,and service similarity map was introduced to detect the availability of the location.If the prediction was successful,the prediction location was directly used to replace the location of differential disturbance,to reduce the privacy cost of continuous query and improve the quality of service.Based on this,the trajectory privacy budget allocation mechanism based on w sliding window was designed to ensure that any continuous w queries in the trajectory meet the ε-differential privacy and solve the trajectory privacy problem of continuous queries.In addition,a privacy customization strategy was designed based on the sensitivity map.By customizing the privacy sensitivity of semantic location,the privacy budget could be customized to improve its utilization.Finally,the validity of the scheme was verified by real data set experiment.The results illustrate that it offers the better privacy and quality of service.…”
    Get full text
    Article
  13. 473

    Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance by K. Vignesh Saravanan, G. Sakthi Priya

    Published 2025-05-01
    “…The performance depends on factors such as Recall, Ranking Privacy, Precision, Searching Speed. The proposed algorithm efficiently retrieves the required data maintaining the privacy and identifies the relevant data at high accuracy and optimal speed. …”
    Get full text
    Article
  14. 474

    New blockchain consensus algorithm applied on healthcare industry: Proof of Visit- (POV) by Çetin Şahin, Muhammed Ali Aydin, Ahmet Sertbaş

    Published 2025-04-01
    “…In this study, it is proposed to share EHR using blockchain infrastructure and to prepare a consensus algorithm specifically for health data on the blockchain. …”
    Get full text
    Article
  15. 475

    Ethical and legal considerations governing use of health data for quality improvement and performance management: a scoping review of the perspectives of health professionals and a... by Tim Shaw, Kevin Leow, Ian Kerridge, Cameron Stewart, Anna Janssen, Kavisha Shah

    Published 2025-04-01
    “…Health administrators additionally emphasised the importance of good governance and data stewardship to improving professional engagement with performance data, but privacy remains a key barrier.Conclusions The growing interest in using health data for quality improvement and performance management requires health services to address barriers to utilisation of performance data. …”
    Get full text
    Article
  16. 476

    Advancing Early Detection of Major Depressive Disorder Using Multisite Functional Magnetic Resonance Imaging Data: Comparative Analysis of AI Models by Masab Mansoor, Kashif Ansari

    Published 2025-07-01
    “…MethodsWe used functional magnetic resonance imaging data from 1200 participants (600 with early-stage MDD and 600 healthy controls) across 3 public datasets. …”
    Get full text
    Article
  17. 477
  18. 478

    ChildDiffusion: Unlocking the Potential of Generative AI and Controllable Augmentations for Child Facial Data Using Stable Diffusion and Large Language Models by Muhammad Ali Farooq, Wang Yao, Peter Corcoran

    Published 2025-01-01
    “…In this research, we propose the ChildDiffusion framework, designed to generate photorealistic child facial data using diffusion models. The framework integrates intelligent augmentations via short text prompts, employs various image samplers, and leverages ControlNet for enhanced model conditioning. …”
    Get full text
    Article
  19. 479

    De novo non-canonical nanopore basecalling enables private communication using heavily-modified DNA data at single-molecule level by Qingyuan Fan, Xuyang Zhao, Junyao Li, Ronghui Liu, Ming Liu, Qishun Feng, Yanping Long, Yang Fu, Jixian Zhai, Qing Pan, Yi Li

    Published 2025-05-01
    “…Abstract Hidden messages in DNA molecules by employing chemical modifications has been suggested for private data storage and transmission at high information density. …”
    Get full text
    Article
  20. 480

    Deriving and validating a risk prediction model for long COVID-19: protocol for an observational cohort study using linked Scottish data by Jennifer K Quint, Aziz Sheikh, Chris Robertson, Srinivasa Vittal Katikireddi, Emily Moore, Colin R Simpson, Luke Daines, Eleftheria Vasileiou, Syed Ahmar Shah, Rachel H Mulholland, Vicky Hammersley, Steven Kerr, Ting Shi, David Weatherill, Elisa Pesenti

    Published 2022-07-01
    “…In this protocol, we describe plans to develop a prediction model to identify individuals at risk of developing long-COVID.Methods and analysis We will use the national Early Pandemic Evaluation and Enhanced Surveillance of COVID-19 (EAVE II) platform, a population-level linked dataset of routine electronic healthcare data from 5.4 million individuals in Scotland. …”
    Get full text
    Article