Suggested Topics within your search.
Suggested Topics within your search.
-
721
A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems
Published 2025-07-01“…Comprehensive evaluations using natural gas pipeline pressure control and smart grid voltage control systems demonstrate superior performance: the proposed method achieves 100% system availability compared to 62.57% for static redundancy and 86.53% for moving target defense, maintains 99.98% availability even under common-mode attacks (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>10</mn><mrow><mo>−</mo><mn>2</mn></mrow></msup></semantics></math></inline-formula> probability), and consistently outperforms moving target defense methods integrated with state-of-the-art detection mechanisms (99.7790% and 99.6735% average availability when false data deviations from true values are 5% and 3%, respectively) across different attack detection scenarios, validating its effectiveness in defending against availability attacks and privacy leakage threats in cloud–edge collaboration environments.…”
Get full text
Article -
722
Neutrosophic Logic for Secure Hand-Based Biometrics: Quantifying Privacy-Security Tradeoffs in Remote Authentication Systems
Published 2025-07-01“…To address this gap, we propose a vulnerability assessment framework grounded in neutrosophic logic [11], which evaluates system robustness through truth (T), indeterminacy (I), and falsity (F) membership functions, and this approach quantifies the trade-offs between security and privacy, revealing that hand-based biometrics achieve 92% security effectiveness (T = 0.8) while retaining an 18% uncertainty factor ( 𝐼 = 0.4 ) concerning potential vulnerabilities, and added analysis further identifies deficiencies in template protection (F = 0.2) and data transmission protocols, and we, proposed framework advances us the evaluation of biometric systems by using integrating neutrosophic uncertainty modeling, and it provides actionable insights for designing secure remote authentication architectures. …”
Get full text
Article -
723
Ethics of Artificial Intelligence and Robotics: Key Issues and Modern Ways to Solve Them
Published 2023-12-01Get full text
Article -
724
A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network
Published 2015-10-01“…While obtaining convenient services, the exploitation of mass location data is inevitably leading to a serious concern about location privacy security. …”
Get full text
Article -
725
Vehicle Trajectory Generation Based on Generation Adversarial Network
Published 2024-06-01“…In this paper, the vehicle travel time of sample trajectory data and virtual trajectory data is used as indicators for statistical analysis. …”
Get full text
Article -
726
Artificial Intelligence and Politics: Legal Dilemmas and Risks to Democracy
Published 2025-04-01Get full text
Article -
727
Artificial Intelligence and Politics: Legal Dilemmas and Risks to Democracy
Published 2025-04-01Get full text
Article -
728
Private Stochastic Optimization with Large Worst-Case Lipschitz Parameter
Published 2025-03-01Get full text
Article -
729
AI-based treatment of psychological conditions: the potential use, benefits and drawbacks
Published 2025-04-01“…This suggests that translating small-scale, short-term trials into effective large-scale, longer-term real-world applications may be a particular challenge. While the use of AI in mental healthcare appears to have potential, its use also raises important ethical and privacy concerns, potential risk of bias, and the risk of unintended consequences such as over-diagnosis or unnecessary treatment of normal emotional experiences. …”
Get full text
Article -
730
Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach
Published 2025-02-01“…Abstract Homomorphic Encryption (HE) offers a revolutionary cryptographic approach to safeguarding privacy in machine learning (ML), especially in processing sensitive healthcare data. …”
Get full text
Article -
731
OPTIMIZING KEYWORD SEARCH FOR SEARCH ENGINES USING BLOCKCHAIN TECHNOLOGY
Published 2024-12-01Get full text
Article -
732
The Use of AI in Elementary School Learning: A Systematic Literature Review
Published 2025-03-01“…However, the study also highlights challenges such as inadequate infrastructure, teacher competence, and ethical concerns regarding data privacy and algorithmic bias. Addressing these challenges requires investment in infrastructure, ongoing teacher training, and clear ethical guidelines to ensure equitable access to AI-driven learning. …”
Get full text
Article -
733
Federated knee injury diagnosis using few shot learning
Published 2025-07-01“…While deep learning approaches have shown promise in identifying knee injuries from MRI scans, they often require large amounts of labeled data, which can be both scarce and privacy-sensitive.MethodsThis paper analyses a hybrid methodology that integrates few-shot learning with federated learning for the diagnosis of knee injuries using MRI scans. …”
Get full text
Article -
734
Perceived risk and intention to use digital financial services of Vietnamese youth
Published 2025-01-01“…SPSS26 and AMOS24 software were used for data processing. The results show that “Security risk” does not affect the “Perceived Risk” of the youth. …”
Get full text
Article -
735
Ethical Challenges of Using the Internet of Behavior in the Medical and Healthcare Practice
Published 2024-11-01“…To address these concerns, healthcare organizations must establish ethical protocols, including stringent security measures, informed consent procedures, and robust data protection strategies. Ensuring the secure and responsible use of patient data is critical to maintaining trust in IoB systems. …”
Get full text
Article -
736
Opportunities and Challenges: The Use of ChatGPT in Enabling Library Knowledge Services
Published 2024-08-01“…At the same time, the application focuses on the risks and challenges posed by technical limitations, intellectual property rights, user privacy, harmful information, data sources, academic integrity and other aspects. …”
Get full text
Article -
737
User Needs of Online Tutoring Applications Using House of Quality
Published 2025-01-01“…Methodology: The study employs the House of Quality method and was conducted in the Jabodetabek area from 2021 to 2022. Data collection methods included voluntary and purposive sampling, using questionnaires distributed via Google Forms, as well as interviews and focus group discussions. …”
Get full text
Article -
738
-
739
Entropy-Based Human Activity Measure Using FMCW Radar
Published 2025-07-01“…Existing activity measurement methods, such as gas analyzers, activity trackers, and camera-based systems, have limitations in accuracy, convenience, and privacy. To address these issues, this study proposes an improved activity estimation algorithm using a 60 GHz Frequency-Modulated Continuous-Wave (FMCW) radar. …”
Get full text
Article -
740
Using the Language of elite athletes to predict their personality and on court transgressions
Published 2025-05-01“…These findings show that personality can predict individual choices and behaviors in specific contexts; furthermore, by assessing the degree to which our digital footprint can be used to derive actionable predictions of behavior, the current findings could inform discussions concerning regulations of data privacy.…”
Get full text
Article