Suggested Topics within your search.
Suggested Topics within your search.
-
681
Hybrid Optimization Machine Learning Framework for Enhancing Trust and Security in Cloud Network
Published 2024-01-01“…The rapidly evolving field of cloud-based data sharing faces critical challenges in ensuring comprehensive privacy protection and trust for both data producers and seekers. …”
Get full text
Article -
682
It’s Time to Relax: The Critical Importance of Digital Mental Health Products in the Context of Surveillance Capitalism
Published 2021-07-01“…We want to move beyond the personal data privacy debate and tackle other potential issues – what does this data sharing mean in terms of a shift in collective psychology and ideologies? …”
Get full text
Article -
683
Quality and Privacy Policy Compliance of Mental Health Care Apps in China: Cross-Sectional Evaluation Study
Published 2025-07-01“…Although mental health care apps can enhance outcomes, their handling of highly sensitive personal data poses significant privacy risks. …”
Get full text
Article -
684
A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems
Published 2025-07-01“…Comprehensive evaluations using natural gas pipeline pressure control and smart grid voltage control systems demonstrate superior performance: the proposed method achieves 100% system availability compared to 62.57% for static redundancy and 86.53% for moving target defense, maintains 99.98% availability even under common-mode attacks (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>10</mn><mrow><mo>−</mo><mn>2</mn></mrow></msup></semantics></math></inline-formula> probability), and consistently outperforms moving target defense methods integrated with state-of-the-art detection mechanisms (99.7790% and 99.6735% average availability when false data deviations from true values are 5% and 3%, respectively) across different attack detection scenarios, validating its effectiveness in defending against availability attacks and privacy leakage threats in cloud–edge collaboration environments.…”
Get full text
Article -
685
Neutrosophic Logic for Secure Hand-Based Biometrics: Quantifying Privacy-Security Tradeoffs in Remote Authentication Systems
Published 2025-07-01“…To address this gap, we propose a vulnerability assessment framework grounded in neutrosophic logic [11], which evaluates system robustness through truth (T), indeterminacy (I), and falsity (F) membership functions, and this approach quantifies the trade-offs between security and privacy, revealing that hand-based biometrics achieve 92% security effectiveness (T = 0.8) while retaining an 18% uncertainty factor ( 𝐼 = 0.4 ) concerning potential vulnerabilities, and added analysis further identifies deficiencies in template protection (F = 0.2) and data transmission protocols, and we, proposed framework advances us the evaluation of biometric systems by using integrating neutrosophic uncertainty modeling, and it provides actionable insights for designing secure remote authentication architectures. …”
Get full text
Article -
686
Ethics of Artificial Intelligence and Robotics: Key Issues and Modern Ways to Solve Them
Published 2023-12-01Get full text
Article -
687
A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network
Published 2015-10-01“…While obtaining convenient services, the exploitation of mass location data is inevitably leading to a serious concern about location privacy security. …”
Get full text
Article -
688
Vehicle Trajectory Generation Based on Generation Adversarial Network
Published 2024-06-01“…In this paper, the vehicle travel time of sample trajectory data and virtual trajectory data is used as indicators for statistical analysis. …”
Get full text
Article -
689
Artificial Intelligence and Politics: Legal Dilemmas and Risks to Democracy
Published 2025-04-01Get full text
Article -
690
Artificial Intelligence and Politics: Legal Dilemmas and Risks to Democracy
Published 2025-04-01Get full text
Article -
691
Private Stochastic Optimization with Large Worst-Case Lipschitz Parameter
Published 2025-03-01Get full text
Article -
692
Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach
Published 2025-02-01“…Abstract Homomorphic Encryption (HE) offers a revolutionary cryptographic approach to safeguarding privacy in machine learning (ML), especially in processing sensitive healthcare data. …”
Get full text
Article -
693
Design of an improved graph-based model for real-time anomaly detection in healthcare using hybrid CNN-LSTM and federated learning
Published 2024-12-01“…This system processes over 100,000 messages per second with less than 50 ms of inference latency to enable the prompting of clinical responses. We use Federated Learning combined with Differential Privacy to solve our data security and privacy tasks. …”
Get full text
Article -
694
Assessing the Uses, Benefits, and Limitations of Digital Technologies Used by Health Professionals in Supporting Obesity and Mental Health Communication: Scoping Review
Published 2025-02-01“…MethodsA comprehensive scoping review, which followed a validated methodology, analyzed studies published between 2013 and 2023 across 8 databases. The data extraction focused on HPs’ use of communication technologies, intervention types, biopsychosocial considerations, and perceptions of technology use. …”
Get full text
Article -
695
Collaborative and privacy-preserving cross-vendor united diagnostic imaging via server-rotating federated machine learning
Published 2025-08-01“…Abstract Federated Learning (FL) is a distributed framework that enables collaborative training of a server model across medical data vendors while preserving data privacy. However, conventional FL faces two key challenges: substantial data heterogeneity among vendors and limited flexibility from a fixed server, leading to suboptimal performance in diagnostic-imaging tasks. …”
Get full text
Article -
696
Old MacDonald and His Hackable Smartphone Application: A Security and Privacy Analysis of Android Agriculture Applications
Published 2025-01-01“…Despite the widespread use of smartphones among farmers increasing from 77% in 2021 to 82% in 2023, minimal research has examined the security and privacy implications of agricultural smartphone applications, potentially used on these devices. …”
Get full text
Article -
697
Security and privacy in online teaching during the COVID-19 pandemic: experiences and concerns of academics in Saudi higher education
Published 2024-11-01“…The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. …”
Get full text
Article -
698
Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR) System
Published 2011-01-01“…The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. …”
Get full text
Article -
699
Investigating the Relationship between Social Skills and Social Acceptance with Academic Performance, Considering the Mediating Role of Ethical Privacy
Published 2025-05-01“…Four standard questionnaires of social skills, social acceptance, respect for moral privacy, and academic performance were used for gathering data. …”
Get full text
Article -
700
Do Cookie Banners Respect My Browsing Privacy? Measuring the Effectiveness of Cookie Rejection for Limiting Behavioral Advertising
Published 2024-01-01“…Online behavioral advertising (OBA) is a method within digital advertising that exploits web users’ interests to tailor ads. Its use has raised privacy concerns among researchers, regulators, and the media, emphasizing the need for a reliable mechanism to measure its prevalence. …”
Get full text
Article