Showing 601 - 620 results of 2,784 for search '((((( useds OR uses) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.27s Refine Results
  1. 601

    A Communication-Efficient Distributed Matrix Multiplication Scheme with Privacy, Security, and Resiliency by Tao Wang, Zhiping Shi, Juan Yang, Sha Liu

    Published 2024-08-01
    “…Inspired by the application of repairing Reed–Solomon (RS) codes in distributed storage and secret sharing, we propose SDMM schemes with reduced communication overhead through the use of trace polynomials. Specifically, these schemes are designed to address three critical concerns: (i) ensuring information-theoretic privacy against collusion among servers; (ii) providing security against Byzantine servers; and (iii) offering resiliency against stragglers to mitigate computing delays. …”
    Get full text
    Article
  2. 602

    Light weighted privacy protection ViT inference framework based on secret sharing by MA Min, FU Yu, HUANG Kai, JIA Xiaofeng

    Published 2024-04-01
    “…The ViT (vision transformer) inference framework, which was widely used in image processing, was found to have a risk of leaking user privacy data. …”
    Get full text
    Article
  3. 603

    Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey by Blessing Guembe, Sanjay Misra, Ambrose Azeta

    Published 2024-12-01
    “…Aim This study presents a cutting-edge survey on privacy issues, security attacks, countermeasures and open problems in FL.Methodology The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used to determine the research domain, establish a search query, and analyze all retrieved articles from the selected scientific databases (i.e. …”
    Get full text
    Article
  4. 604

    FairRAG: A Privacy-Preserving Framework for Fair Financial Decision-Making by Rashmi Nagpal, Unyimeabasi Usua, Rafael Palacios, Amar Gupta

    Published 2025-07-01
    “…These improvements were maintained when using differentially private synthetic data, thus indicating robust privacy and accuracy trade-offs.…”
    Get full text
    Article
  5. 605

    Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability by Yong Zhou, Hong Lei, Zijian Bao

    Published 2024-01-01
    “…However, traditional donation systems, typically centralized, are prone to issues such as data redundancy, vulnerability to single-point failures, and a deficiency in transparency and traceability. …”
    Get full text
    Article
  6. 606

    Synergistic Disruption: Harnessing AI and Blockchain for Enhanced Privacy and Security in Federated Learning by Sandi Rahmadika, Winda Agustiarmi, Ryan Fikri, Bruno Joachim Kweka

    Published 2025-04-01
    “…Blockchain technology makes self-executing agreements possible by enabling smart contracts, which reduce the need for middlemen and increase efficiency by precisely encoding contractual terms in code. By using AI oracles, these contracts can communicate with outside data sources and make well-informed decisions based on actual occurrences. …”
    Get full text
    Article
  7. 607

    Sharing images of children on social media: British motherhood influencers and the privacy paradox. by Katherine Baxter, Barbara Czarnecka

    Published 2025-01-01
    “…This study examines the extent to which popular British motherhood influencers infringe on their children's privacy by posting images of them online. We conducted a content analysis of 5,253 Instagram posts from ten UK-based influencers, supplemented by self-reported data from these influencers. …”
    Get full text
    Article
  8. 608

    A lightweight and secure authentication and privacy protection scheme for internet of medical things by Sanjay Kumar, Kumar Abhishek, Shitharth Selvarajan

    Published 2025-07-01
    “…However, transmitting sensitive patient data through IoMT devices raises significant security and privacy concerns. …”
    Get full text
    Article
  9. 609

    The Looming Privacy Challenges Posed by Commercial Satellite Imaging: Remedies and Research Directions by Nathanael Denis, Roberto Di Pietro

    Published 2025-01-01
    “…While these technologies benefit applications such as natural disaster monitoring and precision agriculture, they also introduce novel privacy risks. This perspective paper provides several contributions: we start by analyzing privacy risks using the LINDDUN privacy framework, categorizing threats like linking, identification, and data disclosure. …”
    Get full text
    Article
  10. 610

    Self-Disclosure on Professional Social Networking Sites: A Privacy Calculus Perspective by Imairi Eitiveni, Achmad Nizar Hidayanto, Yuvitri Annisa Dwityafani, Larastri Kumaralalita

    Published 2023-01-01
    “…A model contextualizing privacy calculus theory combined with the trust factor was developed and evaluated using 661 quantitative data collected through a questionnaire. …”
    Get full text
    Article
  11. 611

    Privacy preserving strategies for electronic health records in the era of large language models by Jitendra Jonnagaddala, Zoie Shui-Yee Wong

    Published 2025-01-01
    “…Risks can be reduced by using strategies like privacy-preserving locally deployed LLMs, synthetic data generation, differential privacy, and deidentification. …”
    Get full text
    Article
  12. 612

    Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods by Ahmet Emre Ergun, Ozgu Can, Murat Kantarcioglu

    Published 2025-01-01
    “…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
    Get full text
    Article
  13. 613

    CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions by Mohammad Badhruddouza Khan, Salwa Tamkin, Jinat Ara, Mobashwer Alam, Hanif Bhuiyan

    Published 2025-02-01
    “…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
    Get full text
    Article
  14. 614

    A content review of COVID-19-related apps used in Vietnam by Linh Tran, Federica Cucé, Nguyen Thanh An, Kadek Agus Surya Dila, Nguyen Hai Nam, Doan Le Nguyet Cat, Lee Wei Jun, Farrukh Ansar, Fatima Abdallh, Au Vo, Nguyen Tien Huy

    Published 2025-02-01
    “…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
    Get full text
    Article
  15. 615

    Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing by Dengzhi Liu, Zhimin Li, Dongbao Jia

    Published 2023-12-01
    “…The proposed auditing scheme in this paper can be used to guarantee the correctness and the completeness of the stored data in 5G-enabled software-defined edge computing. …”
    Get full text
    Article
  16. 616

    MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM by Virendra P. Vishwakarma, Abhay Kumar Yadav

    Published 2025-01-01
    “…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
    Get full text
    Article
  17. 617
  18. 618

    PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation by Zhengqiang Ge, Xinyu Liu, Qiang Li, Yu Li, Dong Guo

    Published 2021-12-01
    “…To significantly protect the user’s privacy and prevent the user’s preference disclosure from leading to malicious entrapment, we present a combination of the recommendation algorithm and the privacy protection mechanism. …”
    Get full text
    Article
  19. 619

    FL-QNNs: Memory Efficient and Privacy Preserving Framework for Peripheral Blood Cell Classification by Meenakshi Aggarwal, Vikas Khullar, Nitin Goyal, Bhavani Sankar Panda, Hardik Doshi, Nafeesh Ahmad, Vivek Bhardwaj, Gaurav Sharma

    Published 2025-01-01
    “…Then implement the federated learning (FL) framework with IID (Independent and identically distributed) and Non-IID datasets maintain similar results by preserving data. Further FL-QNNs approach is used with these baseline models and achieved 98-99% accuracy and while optimizing memory, preserving data and resources. …”
    Get full text
    Article
  20. 620

    A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation by Leming Zhou, Robert Thieret, Valerie Watzlaf, Dilhari DeAlmeida, Bambang Parmanto

    Published 2019-06-01
    “…It is necessary for telehealth care providers to demonstrate that they have taken sufficient actions to protect their patients’ data security and privacy. The government provided a HIPAA audit protocol that is highly useful for internal security and privacy auditing on health care systems, however, this protocol includes extensive details that are not always specific to telehealth and therefore is difficult to be used by telehealth practitioners. …”
    Get full text
    Article