Showing 641 - 660 results of 2,784 for search '((((( useds OR uses) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.30s Refine Results
  1. 641

    LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks by Shaymaa E. Sorour, Mohammed Aljaafari, Amany M. Shaker, Ahmed E. Amin

    Published 2025-04-01
    “…Federated learning is leveraged to enable collaborative model training across multiple IoT networks while maintaining data privacy and reducing vulnerability to data poisoning. …”
    Get full text
    Article
  2. 642

    Legal Barriers in Developing Educational Technology by Cam Ai Tran, Truc Thanh Lam Nguyen

    Published 2025-03-01
    “…Through a comparative legal analysis of domestic and international laws, the study sheds light on the legal frameworks affecting technology integration in education. Data privacy issues arise from the sensitive information collected in educational settings, while intellectual property challenges relate to protecting and fairly using digital content and software. …”
    Get full text
    Article
  3. 643

    A Systematic Literature Review on Privacy Preservation in VANETs: Trends, Challenges, and Future Directions by Esti Rahmawati Agustina, Kalamullah Ramli, Arif Rahman Hakim, Ruki Harwahyu

    Published 2025-01-01
    “…Privacy preservation is a fundamental requirement in vehicular ad hoc networks (VANETs) because it addresses sensitive vehicle and driver data. …”
    Get full text
    Article
  4. 644

    Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation by Min Hou, Yue Wu

    Published 2025-03-01
    “…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
    Get full text
    Article
  5. 645
  6. 646

    Enhancing Privacy by Large Mask Inpainting and Fusion-Based Segmentation in Street View Imagery by Mahdi Khourishandiz, Abdollah Amirkhani

    Published 2025-08-01
    “…Despite its reliance on accurate sensor calibration and multimodal data availability, the proposed framework offers a scalable solution for privacy-sensitive applications such as urban mapping, and virtual tourism, delivering high-quality anonymized imagery with minimal artifacts.…”
    Get full text
    Article
  7. 647

    BFG: privacy protection framework for internet of medical things based on blockchain and federated learning by Wenkang Liu, Yuxuan He, Xiaoliang Wang, Ziming Duan, Wei Liang, Yuzhen Liu

    Published 2023-12-01
    “…The deep integration of Internet of Medical Things (IoMT) and Artificial intelligence makes the further development of intelligent medical services possible, but privacy leakage and data security problems hinder its wide application. …”
    Get full text
    Article
  8. 648

    Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing by Thinh Le Vinh, Huan Thien Tran, Huyen Trang Phan, Samia Le

    Published 2025-01-01
    “…This paper introduces a Federated Learning Trust Model (FLTM) to assess trustworthiness across 2000 resources while preserving data privacy. FLTM incorporates six critical metrics: Availability, Reliability, Data Integrity, Identity, Computational Capability, and Throughput. …”
    Get full text
    Article
  9. 649
  10. 650

    THE USE OF SOCIAL MEDIA FOR LEARNING ENGLISH: STUDENTS PERSPECTIVE by Muetia Safitri, Atik Yuliyani, Farida Hamid, Aminah Suriaman

    Published 2022-07-01
    “…Basic statistical analysis was used to analyze data from the questionnaire, and the data from interviews were analyzed using the flow model by Miles and Huberman. …”
    Get full text
    Article
  11. 651
  12. 652

    Chatbots in medicine: certification process and applied use case by Mayssam Nehme, Franck Schneider, Esther Amruthalingam, Elio Schnarrenberger, Raphaël Trëmeaud, Idris Guessous

    Published 2024-10-01
    “…However, their application in medicine and healthcare has been limited due to concerns over data privacy, ther risk of providing medical diagnoses, and ensuring regulatory and legal compliance. …”
    Get full text
    Article
  13. 653

    Using electronic health record data to establish a chronic kidney disease surveillance system in China: protocol for the China Kidney Disease Network (CK-NET)-Yinzhou Study by Yu Yang, Peng Shen, Hongbo Lin, Luxia Zhang, Minghui Zhao, Jinwei Wang, Beiyan Bao, Guilan Kong, Xiaoyu Sun, Guohui Ding, Bixia Gao, Chao Yang

    Published 2019-08-01
    “…The China Kidney Disease Network (CK-NET) was established as a comprehensive surveillance system for CKD using various data sources. As part of this, the proposed CK-NET-Yinzhou study aims to build a regional surveillance system in a developed coastal area in China to obtain detailed dynamic information about kidney disease and to improve the ability to manage the disease effectively.Methods and analysis Yinzhou is a district of Ningbo city, Zhejiang province. …”
    Get full text
    Article
  14. 654

    Patient Perspective on Use of an Interactive Website for Sleep Apnea by Carl Stepnowsky, Christine Edwards, Tania Zamora, Robert Barker, Zia Agha

    Published 2013-01-01
    “…The goal of this paper is to report on CPAP adherence, internet use, privacy concerns and user satisfaction in using the website. …”
    Get full text
    Article
  15. 655

    Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub by Yu (Andrew) Liu, Gurpreet Kaur, Natasha Kholgade Banerjee, Sean Banerjee

    Published 2025-08-01
    “…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
    Get full text
    Article
  16. 656

    Considerations for using Artificial Intelligence in Medical Education by Ali Hamidi Madani

    Published 2025-05-01
    “…Dear Editor Today, the traditional context and method of education have changed, marking the beginning of the digital era in education. The use of new technologies, such as virtual reality (VR), augmented reality (AR), simulators, and artificial intelligence (AI), is a key factor in improving the quality of education and learning outcomes. …”
    Get full text
    Article
  17. 657

    Shielding Communication Privacy: Unveiling The Strategic Utilization Of Instagram’s Second Account Feature By Millennial Generation by Musfiah Saidah

    Published 2023-07-01
    “…Even though the person who is selected to enter the second account circle is also vulnerable to opening the data privacy of the account owner and even spreading it. …”
    Get full text
    Article
  18. 658
  19. 659

    Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks by Liang Liu, Zhenhai Hu, Lisong Wang

    Published 2019-07-01
    “…The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. To protect node data privacy, Shamir’s secret sharing technology is used to prevent internal attackers from stealing the sensitive data of the surrounding nodes. …”
    Get full text
    Article
  20. 660

    STF-LPPVA: Local Privacy-Preserving Method for Vehicle Assignment Based on Spatial–Temporal Fusion by Lei Tang, Zhengxin Cao, Xin Zhou, Junzhe Zhang, Junchi Ma

    Published 2025-01-01
    “…There are user privacy risks in cloud-based vehicle dispatch platforms due to the unauthorized collection, use, and dissemination of data. …”
    Get full text
    Article