Suggested Topics within your search.
Suggested Topics within your search.
-
641
LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Published 2025-04-01“…Federated learning is leveraged to enable collaborative model training across multiple IoT networks while maintaining data privacy and reducing vulnerability to data poisoning. …”
Get full text
Article -
642
Legal Barriers in Developing Educational Technology
Published 2025-03-01“…Through a comparative legal analysis of domestic and international laws, the study sheds light on the legal frameworks affecting technology integration in education. Data privacy issues arise from the sensitive information collected in educational settings, while intellectual property challenges relate to protecting and fairly using digital content and software. …”
Get full text
Article -
643
A Systematic Literature Review on Privacy Preservation in VANETs: Trends, Challenges, and Future Directions
Published 2025-01-01“…Privacy preservation is a fundamental requirement in vehicular ad hoc networks (VANETs) because it addresses sensitive vehicle and driver data. …”
Get full text
Article -
644
Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation
Published 2025-03-01“…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
Get full text
Article -
645
The ethics of using artificial intelligence in medical research
Published 2024-12-01Get full text
Article -
646
Enhancing Privacy by Large Mask Inpainting and Fusion-Based Segmentation in Street View Imagery
Published 2025-08-01“…Despite its reliance on accurate sensor calibration and multimodal data availability, the proposed framework offers a scalable solution for privacy-sensitive applications such as urban mapping, and virtual tourism, delivering high-quality anonymized imagery with minimal artifacts.…”
Get full text
Article -
647
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning
Published 2023-12-01“…The deep integration of Internet of Medical Things (IoMT) and Artificial intelligence makes the further development of intelligent medical services possible, but privacy leakage and data security problems hinder its wide application. …”
Get full text
Article -
648
Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing
Published 2025-01-01“…This paper introduces a Federated Learning Trust Model (FLTM) to assess trustworthiness across 2000 resources while preserving data privacy. FLTM incorporates six critical metrics: Availability, Reliability, Data Integrity, Identity, Computational Capability, and Throughput. …”
Get full text
Article -
649
-
650
THE USE OF SOCIAL MEDIA FOR LEARNING ENGLISH: STUDENTS PERSPECTIVE
Published 2022-07-01“…Basic statistical analysis was used to analyze data from the questionnaire, and the data from interviews were analyzed using the flow model by Miles and Huberman. …”
Get full text
Article -
651
Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission
Published 2025-01-01“…Furthermore, useful insights on the privacy-utility trade-off are also provided.…”
Get full text
Article -
652
Chatbots in medicine: certification process and applied use case
Published 2024-10-01“…However, their application in medicine and healthcare has been limited due to concerns over data privacy, ther risk of providing medical diagnoses, and ensuring regulatory and legal compliance. …”
Get full text
Article -
653
Using electronic health record data to establish a chronic kidney disease surveillance system in China: protocol for the China Kidney Disease Network (CK-NET)-Yinzhou Study
Published 2019-08-01“…The China Kidney Disease Network (CK-NET) was established as a comprehensive surveillance system for CKD using various data sources. As part of this, the proposed CK-NET-Yinzhou study aims to build a regional surveillance system in a developed coastal area in China to obtain detailed dynamic information about kidney disease and to improve the ability to manage the disease effectively.Methods and analysis Yinzhou is a district of Ningbo city, Zhejiang province. …”
Get full text
Article -
654
Patient Perspective on Use of an Interactive Website for Sleep Apnea
Published 2013-01-01“…The goal of this paper is to report on CPAP adherence, internet use, privacy concerns and user satisfaction in using the website. …”
Get full text
Article -
655
Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub
Published 2025-08-01“…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
Get full text
Article -
656
Considerations for using Artificial Intelligence in Medical Education
Published 2025-05-01“…Dear Editor Today, the traditional context and method of education have changed, marking the beginning of the digital era in education. The use of new technologies, such as virtual reality (VR), augmented reality (AR), simulators, and artificial intelligence (AI), is a key factor in improving the quality of education and learning outcomes. …”
Get full text
Article -
657
Shielding Communication Privacy: Unveiling The Strategic Utilization Of Instagram’s Second Account Feature By Millennial Generation
Published 2023-07-01“…Even though the person who is selected to enter the second account circle is also vulnerable to opening the data privacy of the account owner and even spreading it. …”
Get full text
Article -
658
Goalie: Defending Against Correlated Value and Sign Encoding Attacks
Published 2025-03-01Get full text
Article -
659
Energy-efficient and privacy-preserving spatial range aggregation query processing in wireless sensor networks
Published 2019-07-01“…The algorithm does not rely on the pre-established topology but considers only the query area that the user is interested in, abandoning all nodes to participate in distributing the query messages while gathering the sensory data in the query range. To protect node data privacy, Shamir’s secret sharing technology is used to prevent internal attackers from stealing the sensitive data of the surrounding nodes. …”
Get full text
Article -
660
STF-LPPVA: Local Privacy-Preserving Method for Vehicle Assignment Based on Spatial–Temporal Fusion
Published 2025-01-01“…There are user privacy risks in cloud-based vehicle dispatch platforms due to the unauthorized collection, use, and dissemination of data. …”
Get full text
Article