Search alternatives:
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 521 - 540 results of 2,784 for search '(((( useddddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.17s Refine Results
  1. 521

    Light weighted privacy protection ViT inference framework based on secret sharing by MA Min, FU Yu, HUANG Kai, JIA Xiaofeng

    Published 2024-04-01
    “…The ViT (vision transformer) inference framework, which was widely used in image processing, was found to have a risk of leaking user privacy data. …”
    Get full text
    Article
  2. 522

    Sharing images of children on social media: British motherhood influencers and the privacy paradox. by Katherine Baxter, Barbara Czarnecka

    Published 2025-01-01
    “…This study examines the extent to which popular British motherhood influencers infringe on their children's privacy by posting images of them online. We conducted a content analysis of 5,253 Instagram posts from ten UK-based influencers, supplemented by self-reported data from these influencers. …”
    Get full text
    Article
  3. 523

    Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey by Blessing Guembe, Sanjay Misra, Ambrose Azeta

    Published 2024-12-01
    “…Aim This study presents a cutting-edge survey on privacy issues, security attacks, countermeasures and open problems in FL.Methodology The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used to determine the research domain, establish a search query, and analyze all retrieved articles from the selected scientific databases (i.e. …”
    Get full text
    Article
  4. 524
  5. 525

    Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods by Ahmet Emre Ergun, Ozgu Can, Murat Kantarcioglu

    Published 2025-01-01
    “…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
    Get full text
    Article
  6. 526

    CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions by Mohammad Badhruddouza Khan, Salwa Tamkin, Jinat Ara, Mobashwer Alam, Hanif Bhuiyan

    Published 2025-02-01
    “…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
    Get full text
    Article
  7. 527

    Securing face images in UAV networks using chaos and DNA cryptography approach by Saba Inam, Shamsa Kanwal, Eaman Amin, Omar Cheikhrouhou, Monia Hamdi

    Published 2025-07-01
    “…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
    Get full text
    Article
  8. 528

    Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing by Dengzhi Liu, Zhimin Li, Dongbao Jia

    Published 2023-12-01
    “…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
    Get full text
    Article
  9. 529

    A clustering-based approach for classifying data streams using graph matching by Yuxin Du, Mingshu He, Xiaojuan Wang

    Published 2025-02-01
    “…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
    Get full text
    Article
  10. 530

    Exploring the Use of AI in Qualitative Data Analysis: Comparing Manual Processing with Avidnote for Theme Generation by S. M. Akramul Kabir, Fareeha Ali, Rana Lotfy Ahmed, Ruqayya Sulaiman-Hill

    Published 2025-04-01
    “…However, fundamental concerns persist regarding the robustness, generalisability, credibility, reliability and trustworthiness of qualitative research when using AI technologies. Ethical considerations, such as data security and privacy, also need to be addressed in research settings. …”
    Get full text
    Article
  11. 531
  12. 532

    Secure and trusted data sharing in smart healthcare using blockchain and IoT integration by Soubhagya Ranjan Mallick, Srichandan Sobhanayak, Rakesh Kumar Lenkar

    Published 2025-08-01
    “…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
    Get full text
    Article
  13. 533

    Navigating ethics in HIV data and biomaterial management within Black, African, and Caribbean communities in Canada by Rusty Souleymanov, Bolaji Akinyele-Akanbi, Chinyere Njeze, Patricia Ukoli, Paula Migliardi, Linda Larcombe, Gayle Restall, Laurie Ringaert, Michael Payne, John Kim, Wangari Tharao, Ayn Wilcox

    Published 2025-01-01
    “…Abstract Background This study explored the ethical issues associated with community-based HIV testing among African, Caribbean, and Black (ACB) populations in Canada, focusing on their perceptions of consent, privacy, and the management of HIV-related data and bio-samples. …”
    Get full text
    Article
  14. 534

    Effective deep learning aided vehicle classification approach using Seismic Data by Sherief Hashima, Mohamed H. Saad, Ahmad B. Ahmad, Takeshi Tsuji, Hamada Rizk

    Published 2025-07-01
    “…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
    Get full text
    Article
  15. 535

    ECDSA-based tamper detection in medical data using a watermarking technique by Rupa Ch, Naga Vivek K, Gautam Srivastava, Reddy Gadekallu

    Published 2024-01-01
    “…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
    Get full text
    Article
  16. 536
  17. 537

    How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries by Nicki Tiffin, Asha George, Amnesty Elizabeth LeFevre

    Published 2019-03-01
    “…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
    Get full text
    Article
  18. 538

    A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards by Eva Heinrich

    Published 2025-08-01
    “…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
    Get full text
    Article
  19. 539

    Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies by Lisbeth Sinan Lendik

    Published 2023-07-01
    “… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
    Get full text
    Article
  20. 540

    A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond by Ahmad Rahdari, Elham Keshavarz, Ehsan Nowroozi, Rahim Taheri, Mehrdad Hajizadeh, Mohammadreza Mohammadi, Sima Sinaei, Thomas Bauschert

    Published 2025-01-01
    “…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
    Get full text
    Article