Suggested Topics within your search.
Suggested Topics within your search.
-
721
Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration
Published 2025-01-01“…Furthermore, the proposed framework includes a federated learning-based scheme that utilizes differential privacy and homomorphic encryption to ensure the privacy and integrity of the data to enhance model interpretability and efficiency with feature ranking to provide insights into attack patterns and anomaly characteristics. …”
Get full text
Article -
722
Privacy-Preserving Glycemic Management in Type 1 Diabetes: Development and Validation of a Multiobjective Federated Reinforcement Learning Framework
Published 2025-07-01“…Furthermore, these approaches typically rely on centralized data processing, which raises privacy concerns due to the sensitive nature of health care data. …”
Get full text
Article -
723
Effect of Workshop Training on Nursing Students’ Knowledge and Attitude Regarding Children’s Privacy Protection: A Quasi-experimental Study
Published 2024-09-01“…Their attitudes and Knowledge were assessed before and after training using researcher-made children’s privacy knowledge and attitude scales. …”
Get full text
Article -
724
A Decision Cloud Ranking Approach Based on Privacy and Security in Blockchain E-Health Industry 4.0 Systems
Published 2023-12-01“…Second, the weights of each privacy and security property are calculated using the SFS-FWZIC method. …”
Get full text
Article -
725
Precision Oncology Program (POP), an observational study using real-world data and imaging mass cytometry to explore decision support for the Molecular Tumor Board: study protocol
Published 2025-03-01“…In this case, a signed general consent form must be available. Data privacy is ensured by unique patient numbers for pseudo-anonymised data. …”
Get full text
Article -
726
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
Published 2024-12-01“…However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). …”
Get full text
Article -
727
-
728
-
729
The Impact of Artificial Intelligence on the Future Business World
Published 2024-02-01“…In order to assist businesses better understand their consumers' requirements and preferences, AI is being used to examine customer data and generate insights. …”
Get full text
Article -
730
AdaBoost algorithm based on target perturbation
Published 2023-02-01“…Aiming at the problem that the multi-round iteration process in the AdaBoost algorithm will amplify the noise added to achieve differential privacy protection, which leads to slow model convergence and greatly reduced data availability, an AdaBoost algorithm based on target perturbation—DPAda was proposed.Target perturbation was used to add noise to sample weights, accurately calculated their sensitivity, and a dynamic privacy budget was given.In order to solve the problem of excessive noise superposition, three noise injection algorithms based on swing sequence, random response and improved random response were proposed.The experimental results show that compared with DPAda_Random and DPAda_Swing, DPAda_Improved achieves the privacy protection of data, has higher classification accuracy, as well as better than other differential privacy AdaBoost algorithm, and can also solve the problem of excessive noise caused by continuous noise addition.…”
Get full text
Article -
731
MKD-Net: A Novel Neuro Evolutionary Approach for Blockchain-Based Secure Medical Image Classification Using Multi-Kernel DLM
Published 2025-01-01“…Moreover, the integration with blockchain provide secure feature storage and also ensures data integrity, traceability, and enhanced privacy. …”
Get full text
Article -
732
Using electronic health record data to establish a chronic kidney disease surveillance system in China: protocol for the China Kidney Disease Network (CK-NET)-Yinzhou Study
Published 2019-08-01“…The China Kidney Disease Network (CK-NET) was established as a comprehensive surveillance system for CKD using various data sources. As part of this, the proposed CK-NET-Yinzhou study aims to build a regional surveillance system in a developed coastal area in China to obtain detailed dynamic information about kidney disease and to improve the ability to manage the disease effectively.Methods and analysis Yinzhou is a district of Ningbo city, Zhejiang province. …”
Get full text
Article -
733
A Performance Analysis of VPN Technologies Used in an IoT Environment
Published 2025-06-01Get full text
Article -
734
Comprehensive Evaluation Method of Privacy-Preserving Record Linkage Technology Based on the Modified Criteria Importance Through Intercriteria Correlation Method
Published 2024-11-01“…The conflict between data security and shared utilization is significant, with traditional data integration methods risking data leakage and privacy breaches. …”
Get full text
Article -
735
Active Privacy-Preserving, Distributed Edge–Cloud Orchestration–Empowered Smart Residential Mains Energy Disaggregation in Horizontal Federated Learning
Published 2025-01-01“…In addition, edge–cloud collaboration based on HFL not only improves data privacy and data security but also enhances network traffic, as it exchanges AI model updates (model weights and biases) for global collaborative AI modeling. …”
Get full text
Article -
736
Why don’t we share? Social networks and privacy concerns, a comparative analysis of academics of communication field in Turkiye and Malaysia
Published 2022-12-01“…The findings obtained from both data collection tools were evaluated and the relation between the qualitative and quantitative data was discussed. …”
Get full text
Article -
737
-
738
Swarm learning network for privacy-preserving and collaborative deep learning assisted diagnosis of fracture: a multi-center diagnostic study
Published 2025-07-01“…BackgroundWhile artificial intelligence (AI) has revolutionized medical diagnostics, conventional centralized AI models for medical image analysis raise critical concerns regarding data privacy and security. Swarm learning (SL), a decentralized machine learning framework, addresses these limitations by enabling collaborative model training through secure parameter aggregation while preserving data locality. …”
Get full text
Article -
739
Legitimacy of investigative forensic genetic genealogy under Art. 8 ECHR
Published 2025-12-01“…The proportionality of its use largely depends on the provision of appropriate safeguards in an iFGG-enabling law that would protect genetic data privacy. …”
Get full text
Article -
740
Privacy Matters: Experiences of Rural and Remote Emergency Department Patients – A Mixed-Methods Research Conducted in Newfoundland and Labrador, Canada
Published 2025-02-01“…Methods: This study used a mixed-methods design, gathering quantitative and qualitative data using a telephone survey and semi-structured interviews. …”
Get full text
Article