Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
561
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning
Published 2023-12-01“…In this paper, we design a new privacy protection framework (BFG) for decentralized FL using blockchain, differential privacy and Generative Adversarial Network. …”
Get full text
Article -
562
A privacy budget adaptive optimization scheme for federated computing power Internet of things
Published 2024-12-01“…Furthermore, by assessing the similarity between the local model and the aggregated model, as well as their respective privacy budget proportions, the global contribution of each node was determined, which was used to fairly, also in real time, optimize and adjust the privacy budget settings in conjunction with the estimated privacy budget. …”
Get full text
Article -
563
Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing
Published 2025-01-01“…This paper introduces a Federated Learning Trust Model (FLTM) to assess trustworthiness across 2000 resources while preserving data privacy. FLTM incorporates six critical metrics: Availability, Reliability, Data Integrity, Identity, Computational Capability, and Throughput. …”
Get full text
Article -
564
-
565
Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication
Published 2025-01-01“…Deep learning and fully homomorphic encryption (FHE) are integrated for privacy-preserving fingerprint recognition. Convolutional neural network (CNN) extract fingerprint features encrypted using the Cheon-Kim-Kim-Song (CKKS) FHE scheme. …”
Get full text
Article -
566
Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
Published 2024-08-01“…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
Get full text
Article -
567
-
568
Quantum Privacy Comparison with <i>R<sub>y</sub></i> Rotation Operation
Published 2025-03-01“…This paper presents a novel quantum privacy comparison (QPC) protocol that employs <i>R<sub>y</sub></i> rotation operations to enable two participants to securely compare their binary secrets without disclosing the actual data to any party except for the comparison result. …”
Get full text
Article -
569
Deep Joint Source Channel Coding for Privacy-Aware End-to-End Image Transmission
Published 2025-01-01“…Furthermore, useful insights on the privacy-utility trade-off are also provided.…”
Get full text
Article -
570
Real-Time Financial Fraud Detection Using Adaptive Graph Neural Networks and Federated Learning
Published 2025-03-01Get full text
Article -
571
Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub
Published 2025-08-01“…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
Get full text
Article -
572
Time Series Classification Using Federated Convolutional Neural Networks and Image-Based Representations
Published 2025-01-01“…Federated Learning (FL) enables collaborative training across distributed clients while ensuring data privacy. The method’s effectiveness is evaluated using 40 datasets from the UCR Archive. …”
Get full text
Article -
573
Federated target trial emulation using distributed observational data for treatment effect estimation
Published 2025-07-01“…Abstract Target trial emulation (TTE) aims to estimate treatment effects by simulating randomized controlled trials using real-world observational data. Applying TTE across distributed datasets shows great promise in improving generalizability and power but is always infeasible due to privacy and data-sharing constraints. …”
Get full text
Article -
574
A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques
Published 2025-03-01“…Quantum-secured networks enhance urban security, smart management, and infrastructure protection by providing data privacy and facilitating secure data transmission, thereby facilitating robust infrastructure and technological development.…”
Get full text
Article -
575
Generating unseen diseases patient data using ontology enhanced generative adversarial networks
Published 2025-01-01“…Abstract Generating realistic synthetic health data (e.g., electronic health records), holds promise for fundamental research, AI model development, and enhancing data privacy safeguards. …”
Get full text
Article -
576
Predicting financial default risks: A machine learning approach using smartphone data
Published 2024-11-01“…This study leverages machine learning (ML) techniques to predict financial default risks using smartphone data, providing a novel approach to financial risk assessment. …”
Get full text
Article -
577
Sample selection using multi-task autoencoders in federated learning with non-IID data
Published 2025-01-01“…Federated learning is a machine learning paradigm in which multiple devices collaboratively train a model under the supervision of a central server while ensuring data privacy. However, its performance is often hindered by redundant, malicious, or abnormal samples, leading to model degradation and inefficiency. …”
Get full text
Article -
578
Federated Learning Model Using CBDPL for Medical Image Segmentation
Published 2025-01-01Get full text
Article -
579
Efficient Keyset Design for Neural Networks Using Homomorphic Encryption
Published 2025-07-01Get full text
Article -
580
Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing
Published 2024-01-01“…To address these issues, we suggest proposing a partial signature-based data auditing system so that both privacy and accuracy can be fortified while reducing the computational cost associated with auditing processes significantly. …”
Get full text
Article