Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useddddds » usedddddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useddddds » usedddddds (Expand Search)
useddddddds » usedddddddds (Expand Search)
use » used (Expand Search)
-
741
-
742
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems
Published 2024-09-01“…Access policies are uploaded to the cloud, stored, and downloaded in plain text, making them vulnerable to privacy breaches. When the access policy is completely hidden, users need to use their own attributes to try matching one by one, which is an inefficient process. …”
Get full text
Article -
743
Synthesis of electric vehicle charging data: A real-world data-driven approach
Published 2024-12-01“…In response, this study introduces an innovative methodology for generating large-scale and diverse EV charging data, mirroring real-world patterns for cost-efficient and privacy-compliant use. …”
Get full text
Article -
744
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
Published 2023-12-01“…However, the deep prediction model requires users to provide a large amount of private electricity consumption data, which has potential privacy risks. Edge nodes can federally train a global model through aggregation using federated learning (FL). …”
Get full text
Article -
745
Relative Applicability of Diverse Automatic Speech Recognition Platforms for Transcription of Psychiatric Treatment Sessions
Published 2025-01-01“…Although such models are good enough for most use cases, storing audio recordings in psychiatry complicates the data handling and adoption of ASR platforms in mental healthcare. …”
Get full text
Article -
746
Sexting in young adults’ social networks in Brazil: an exploratory study on the circulation of nudes
Published 2025-06-01“…Undue exposure was found to be more frequent between non-heterosexual men, which may point to a body centrality in on-line sexual practices in this group. Implications with data security and privacy were discussed and suggestions for future investigations were provided.…”
Get full text
Article -
747
The Risk of Linked Census Data to Transgender Youth
Published 2025-03-01“…Our simulation found that the TopDown configuration attains the maximum achievable level of privacy protection against such an attack. Our results demonstrate the importance of disclosure avoidance for census data and suggest that the TopDown approach used by the Census Bureau is a substantial improvement compared to the previous approach, achieving the maximum level of privacy protection possible against such a linkage attack. …”
Get full text
Article -
748
Photography in the Age of Surveillance: Ethics and the Photographer’s Responsibility
Published 2025-04-01“…It addresses key issues of privacy, ethics and the limits of photographic practice, particularly in relation to the potential for exploitation and voyeurism. …”
Get full text
Article -
749
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01“…However, the vulnerabilities in the underlying smart city technologies, interconnection of heterogeneous devices, and transfer of data over the open public channels expose these networks to a myriad of security and privacy threats. …”
Get full text
Article -
750
FedSW-TSAD: SWGAN-Based Federated Time Series Anomaly Detection
Published 2025-06-01“…As distributed sensing technologies evolve, the collection of time series data is becoming increasingly decentralized, which introduces serious challenges for both model training and data privacy protection. …”
Get full text
Article -
751
Synthetic Financial Data: A Case Study Regarding Polish Limited Liability Companies Data
Published 2024-07-01“…Due to the statistical similarity with real data, they can be used instead of them. This action allows data to be shared externally while guaranteeing their privacy. …”
Get full text
Article -
752
It’s Fine If Others Do It Too: Privacy Concerns, Social Influence, and Political Expression on Facebook in Canada, France, Germany, the United Kingdom, and the United States
Published 2024-10-01“…We use survey data gathered in 2023 from Canada, France, Germany, the United Kingdom, and the United States ( n = 5,936). …”
Get full text
Article -
753
Predicting digital contact tracing tool adoption during COVID-19 from the perspective of TAM: The role of trust, fear, privacy, anxiety, and social media
Published 2025-05-01“…This study investigates the key determinants of DCT adoption and acceptance by integrating the Technology Acceptance Model (TAM) with psychological, social, and regulatory factors related to the context of the study. Methods Using a quantitative, cross-sectional design, data were collected from Saudi participants through an online survey and analysed using Structural Equation Modeling (SEM) with SmartPLS4. …”
Get full text
Article -
754
Strong Association of Perceived Chronic Stress with Leadership Quality, Work–Privacy Conflict and Quantitative Work Demands: Results of the IMPROVE<i>job</i> Study
Published 2025-05-01“…The factors associated with lower perceived chronic stress were identified using a multilevel regression model approach. The model showed a significant association with less work–privacy conflict (<i>p</i> < 0.001, <i>β</i> = 0.31), lower quantitative work demands (<i>p</i> < 0.001, <i>β</i> = 0.28), and good leadership quality (<i>p</i> < 0.001, <i>β</i> = −0.22). …”
Get full text
Article -
755
Big data, big responsibilities
Published 2014-01-01“…With the advent of cloud computing, specialised data centres with powerful computational hardware and software resources can be used for processing and analysing a humongous amount of aggregated data coming from a variety of different sources. …”
Get full text
Article -
756
A data flow process for confidential data and its application in a health research project.
Published 2022-01-01“…However, using healthcare data for secondary purposes raises legal and ethical concerns relating to confidentiality, privacy and data protection rights. …”
Get full text
Article -
757
Rich Data Versus Quantity of Data in Code Generation AI: A Paradigm Shift for Healthcare
Published 2025-06-01“…The paper demonstrates that in sectors where accuracy, auditability, and privacy are paramount, data richness consistently outperforms brute-force scaling strategies. …”
Get full text
Article -
758
Can synthetic data be a proxy for real clinical trial data? A validation study
Published 2021-04-01“…However, data availability remains a challenge due to complex privacy requirements. …”
Get full text
Article -
759
Using fuzzy decision support to create a positive mental health environment for preschoolers
Published 2025-04-01“…To assess their mental health before starting school, preschoolers need early detection, intervention, and assessment. However, data shortages, heterogeneity, privacy issues, model interpretability, and generalization restrictions hamper the review process. …”
Get full text
Article -
760
Impact of Normalization Techniques on Synthetic Load Profile Generation Using Deep Generative Models
Published 2025-01-01“…However, the impact of data normalization on their performance remains insufficiently explored. …”
Get full text
Article