Showing 721 - 740 results of 2,784 for search '((((( useds OR uses) OR useddds) OR used) privacy data ) OR ( use privacy data ))', query time: 0.23s Refine Results
  1. 721

    A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems by Yukun Niu, Xiaopeng Han, Chuan He, Yunfan Wang, Zhigang Cao, Ding Zhou

    Published 2025-07-01
    “…Comprehensive evaluations using natural gas pipeline pressure control and smart grid voltage control systems demonstrate superior performance: the proposed method achieves 100% system availability compared to 62.57% for static redundancy and 86.53% for moving target defense, maintains 99.98% availability even under common-mode attacks (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>10</mn><mrow><mo>−</mo><mn>2</mn></mrow></msup></semantics></math></inline-formula> probability), and consistently outperforms moving target defense methods integrated with state-of-the-art detection mechanisms (99.7790% and 99.6735% average availability when false data deviations from true values are 5% and 3%, respectively) across different attack detection scenarios, validating its effectiveness in defending against availability attacks and privacy leakage threats in cloud–edge collaboration environments.…”
    Get full text
    Article
  2. 722

    Neutrosophic Logic for Secure Hand-Based Biometrics: Quantifying Privacy-Security Tradeoffs in Remote Authentication Systems by A. A. Salama, Abdelnasser Mohamed, Huda E. Khalid, Ahmed K. Essa, Doaa E. Mossa

    Published 2025-07-01
    “…To address this gap, we propose a vulnerability assessment framework grounded in neutrosophic logic [11], which evaluates system robustness through truth (T), indeterminacy (I), and falsity (F) membership functions, and this approach quantifies the trade-offs between security and privacy, revealing that hand-based biometrics achieve 92% security effectiveness (T = 0.8) while retaining an 18% uncertainty factor ( 𝐼 = 0.4 ) concerning potential vulnerabilities, and added analysis further identifies deficiencies in template protection (F = 0.2) and data transmission protocols, and we, proposed framework advances us the evaluation of biometric systems by using integrating neutrosophic uncertainty modeling, and it provides actionable insights for designing secure remote authentication architectures. …”
    Get full text
    Article
  3. 723
  4. 724

    A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network by Jin Wang, Hao Wu, Yudian Liu

    Published 2015-10-01
    “…While obtaining convenient services, the exploitation of mass location data is inevitably leading to a serious concern about location privacy security. …”
    Get full text
    Article
  5. 725

    Vehicle Trajectory Generation Based on Generation Adversarial Network by Zhonghe He, Renchi Shao, Sijia Xiang

    Published 2024-06-01
    “…In this paper, the vehicle travel time of sample trajectory data and virtual trajectory data is used as indicators for statistical analysis. …”
    Get full text
    Article
  6. 726
  7. 727
  8. 728
  9. 729

    AI-based treatment of psychological conditions: the potential use, benefits and drawbacks by Michael Baber, Barbara Baker

    Published 2025-04-01
    “…This suggests that translating small-scale, short-term trials into effective large-scale, longer-term real-world applications may be a particular challenge. While the use of AI in mental healthcare appears to have potential, its use also raises important ethical and privacy concerns, potential risk of bias, and the risk of unintended consequences such as over-diagnosis or unnecessary treatment of normal emotional experiences. …”
    Get full text
    Article
  10. 730

    Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach by Vankamamidi S. Naresh, Sivaranjani Reddi

    Published 2025-02-01
    “…Abstract Homomorphic Encryption (HE) offers a revolutionary cryptographic approach to safeguarding privacy in machine learning (ML), especially in processing sensitive healthcare data. …”
    Get full text
    Article
  11. 731
  12. 732

    The Use of AI in Elementary School Learning: A Systematic Literature Review by Natalina Purba, Desti Pujiati, Partohap Saut Raja Sihombing, Hendra Simanjuntak, Desi Sijabat

    Published 2025-03-01
    “…However, the study also highlights challenges such as inadequate infrastructure, teacher competence, and ethical concerns regarding data privacy and algorithmic bias. Addressing these challenges requires investment in infrastructure, ongoing teacher training, and clear ethical guidelines to ensure equitable access to AI-driven learning. …”
    Get full text
    Article
  13. 733

    Federated knee injury diagnosis using few shot learning by Chirag Goel, Anita X, Jani Anbarasi L

    Published 2025-07-01
    “…While deep learning approaches have shown promise in identifying knee injuries from MRI scans, they often require large amounts of labeled data, which can be both scarce and privacy-sensitive.MethodsThis paper analyses a hybrid methodology that integrates few-shot learning with federated learning for the diagnosis of knee injuries using MRI scans. …”
    Get full text
    Article
  14. 734

    Perceived risk and intention to use digital financial services of Vietnamese youth by Nguyễn Thị Thương, Khúc Thế Anh, Nguyễn Mạnh Cường, Phan Anh Tuấn, Bùi Thị Thanh Huyền, Võ Mỹ Linh

    Published 2025-01-01
    “…SPSS26 and AMOS24 software were used for data processing. The results show that “Security risk” does not affect the “Perceived Risk” of the youth. …”
    Get full text
    Article
  15. 735

    Ethical Challenges of Using the Internet of Behavior in the Medical and Healthcare Practice by Zahra Sadeqi-Arani, Esmaeil Mazroui Nasrabadi

    Published 2024-11-01
    “…To address these concerns, healthcare organizations must establish ethical protocols, including stringent security measures, informed consent procedures, and robust data protection strategies. Ensuring the secure and responsible use of patient data is critical to maintaining trust in IoB systems. …”
    Get full text
    Article
  16. 736

    Opportunities and Challenges: The Use of ChatGPT in Enabling Library Knowledge Services by Huaming LI

    Published 2024-08-01
    “…At the same time, the application focuses on the risks and challenges posed by technical limitations, intellectual property rights, user privacy, harmful information, data sources, academic integrity and other aspects. …”
    Get full text
    Article
  17. 737

    User Needs of Online Tutoring Applications Using House of Quality by Qurrata Aini, Eko Ruddy Cahyadi, Faqih Udin

    Published 2025-01-01
    “…Methodology: The study employs the House of Quality method and was conducted in the Jabodetabek area from 2021 to 2022. Data collection methods included voluntary and purposive sampling, using questionnaires distributed via Google Forms, as well as interviews and focus group discussions. …”
    Get full text
    Article
  18. 738
  19. 739

    Entropy-Based Human Activity Measure Using FMCW Radar by Hak-Hoon Lee, Hyun-Chool Shin

    Published 2025-07-01
    “…Existing activity measurement methods, such as gas analyzers, activity trackers, and camera-based systems, have limitations in accuracy, convenience, and privacy. To address these issues, this study proposes an improved activity estimation algorithm using a 60 GHz Frequency-Modulated Continuous-Wave (FMCW) radar. …”
    Get full text
    Article
  20. 740

    Using the Language of elite athletes to predict their personality and on court transgressions by Maor Daniel Levitin, Itamar Zan Ger, Ze’ev Sovik, Ariel Taieb, Lyle Ungar, Michael Gilead

    Published 2025-05-01
    “…These findings show that personality can predict individual choices and behaviors in specific contexts; furthermore, by assessing the degree to which our digital footprint can be used to derive actionable predictions of behavior, the current findings could inform discussions concerning regulations of data privacy.…”
    Get full text
    Article