Search alternatives:
uses » use (Expand Search)
Showing 81 - 100 results of 2,784 for search '(((( useddddds OR useddddddds) OR uses) privacy data\ ) OR ( used privacy data\ ))', query time: 0.32s Refine Results
  1. 81

    Reconsidering big data security and privacy in cloud and mobile cloud systems by Lo'ai A. Tawalbeh, Gokay Saldamli

    Published 2021-09-01
    “…Secondly, we explore the use of P2P Cloud System (P2PCS) for big data processing and analytics. …”
    Get full text
    Article
  2. 82

    Data Fusion Algorithm of Privacy Protection Based on Qos and Multilayers Hierarchically by Li Li, Qin Qin, Li Hua, Li Jian

    Published 2013-12-01
    “…Because of the special nature of wireless sensor networks, data fusion process is vulnerable to attacks by the destroyer, which is useful for reducing the network communication overhead and improving the data transmission efficiency. …”
    Get full text
    Article
  3. 83
  4. 84

    The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing by Ping Chen, Jingjing Hu, Zhitao Wu, Ruoting Xiong, Wei Ren

    Published 2024-01-01
    “…Negative information selection is an approach to protect the privacy by using negative information to replace original information. …”
    Get full text
    Article
  5. 85

    A scoping review of privacy and utility metrics in medical synthetic data by Bayrem Kaabachi, Jérémie Despraz, Thierry Meurers, Karen Otte, Mehmed Halilovic, Bogdan Kulynych, Fabian Prasser, Jean Louis Raisaro

    Published 2025-01-01
    “…Abstract The use of synthetic data is a promising solution to facilitate the sharing and reuse of health-related data beyond its initial collection while addressing privacy concerns. …”
    Get full text
    Article
  6. 86

    Promoting sustainable and personalized travel behaviors while preserving data privacy by Cláudia Brito, Noela Pina, Tânia Esteves, Ricardo Vitorino, Inês Cunha, João Paulo

    Published 2025-03-01
    “…With this, three main challenges emerge: (i) increase users’ awareness regarding their carbon footprint, (ii) provide personalized recommendations and incentives for using sustainable transportation alternatives and, (iii) guarantee that any personal data collected from the user is kept private.This paper addresses these challenges by proposing a new methodology. …”
    Get full text
    Article
  7. 87

    A systematic review of data privacy in Mobility as a Service (MaaS) by Zineb Garroussi, Antoine Legrain, Sébastien Gambs, Vincent Gautrais, Brunilde Sansò

    Published 2025-05-01
    “…Using the PRISMA framework, a comprehensive literature search across Web of Science, Elsevier, and IEEE Xplore databases resulted in the selection of 32 studies for detailed analysis.The review is structured around three main themes: (1) Privacy-Preserving Techniques, including anonymization strategies (k-anonymity, differential privacy, obfuscation), encryption methods (blockchain, cryptographic protocols), federated learning for decentralized data processing, and advanced algorithms for optimizing privacy budgets and balancing utility-privacy trade-offs; (2) User Trust and Privacy Perceptions, highlighting that trust in service providers is essential for MaaS adoption, privacy concerns may impact adoption but do not necessarily prevent it (the “privacy paradox”), and awareness of data misuse affects user trust and willingness to adopt MaaS; and (3) Regulatory Frameworks, focusing on the importance of GDPR compliance to ensure strict data protection through consent and transparency, and embedding privacy-by-design principles within MaaS architectures to safeguard user data from the outset.This review emphasizes the need for a holistic approach, integrating technological innovation, user-centered design, and strong regulatory oversight to effectively address privacy challenges in MaaS. …”
    Get full text
    Article
  8. 88

    Using UMAP for Partially Synthetic Healthcare Tabular Data Generation and Validation by Carla Lázaro, Cecilio Angulo

    Published 2024-12-01
    “…However, such medical data often comprise sensitive patient information, posing challenges regarding data privacy, and are resource-intensive to acquire for significant research purposes. …”
    Get full text
    Article
  9. 89

    K-Means Clustering with Local Distance Privacy by Mengmeng Yang, Longxia Huang, Chenghua Tang

    Published 2023-12-01
    “…K-means clustering has been widely used for cluster analysis in real life. However, these analyses are based on users’ data, which disclose users’ privacy. …”
    Get full text
    Article
  10. 90

    Privacy-Preserving Modeling of Trajectory Data: Secure Sharing Solutions for Trajectory Data Based on Granular Computing by Yanjun Chen, Ge Zhang, Chengkun Liu, Chunjiang Lu

    Published 2024-11-01
    “…Meanwhile, this work demonstrates the practical applications of the solution for the secure sharing of trajectory data. It integrates trajectory data with economic data using the Takagi–Sugeno fuzzy rule model to fit and predict regional economies, thereby verifying the feasibility of the granular computing model based on differential privacy and ensuring the privacy and security of users’ trajectory information. …”
    Get full text
    Article
  11. 91
  12. 92
  13. 93

    A Robust Authentication and Trust Detection With Privacy Preservation of Data for Fog Computing in VANET Using Adaptive Deep Neural Network by Jia Jia, Sathiya Sekar Kumarasamy, Kiran Sree Pokkuluri, K. Suresh Kumar, Thella Preethi Priyanka, Feng Wang

    Published 2024-01-01
    “…So, in our model after completing the node authentication and trust detection, privacy preservation of data is performed using Optimal Key-aided Data Sanitization (OPDS). …”
    Get full text
    Article
  14. 94

    Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU by Pascal Riedel, Kaouther Belkilani, Manfred Reichert, Gerd Heilscher, Reinhold von Schwerin

    Published 2024-12-01
    “…We propose a bottom-up, privacy-preserving prediction method using differential privacy (DP) to enhance data privacy for energy analytics on the customer side. …”
    Get full text
    Article
  15. 95
  16. 96

    Context-Contingent Privacy Concerns and Exploration of the Privacy Paradox in the Age of AI, Augmented Reality, Big Data, and the Internet of Things: Systematic Review by Christian Herriger, Omar Merlo, Andreas B Eisingerich, Annisa Rizkia Arigayota

    Published 2025-05-01
    “… BackgroundDespite extensive research into technology users’ privacy concerns, a critical gap remains in understanding why individuals adopt different standards for data protection across contexts. …”
    Get full text
    Article
  17. 97

    Dynamic Cohort Formation with Hierarchical Blockchain Using GDP for Enhanced FL by Sunila Fatima Ahmad, Zahra Abbas, Madiha Haider Syed, Adeel Anjum, Semeen Rehman

    Published 2024-11-01
    “…In addition, Gaussian Differential Privacy (GDP) is used as a privacy-preserving mechanism that adds controlled noise to the data or model updates to protect individual data points from being inferred by adversaries. …”
    Get full text
    Article
  18. 98

    An Efficient Privacy-preserving Deep Learning Scheme for Medical Image Analysis by J. Andrew Onesimu, J Karthikeyan

    Published 2020-12-01
    “…Data providers morph the images without privacy information using image morphing component. …”
    Get full text
    Article
  19. 99

    Privacy Auditing of Lithium-Ion Battery Ageing Model by Recovering Time-Series Data Using Gradient Inversion Attack in Federated Learning by Kaspars Sudars, Ivars Namatevs, Arturs Nikulins, Kaspars Ozols

    Published 2025-05-01
    “…The exchange of gradients is a widely used method in modelling systems for machine learning (e.g., distributed training, federated learning) in privacy-sensitive domains. …”
    Get full text
    Article
  20. 100

    An approach that utilizes blockchain to effectively and securely preserve data privacy for location data from IoT in smart cities by D. Rawal, J. Seedorf, B. Patil

    Published 2025-07-01
    “…Environmental surveillance, emergency response, and smart city planning all require the use of geospatial data, which includes satellite imagery, cartographic records, and real-time GPS coordinates. …”
    Get full text
    Article