Suggested Topics within your search.
Suggested Topics within your search.
-
521
A Communication-Efficient Distributed Matrix Multiplication Scheme with Privacy, Security, and Resiliency
Published 2024-08-01“…Inspired by the application of repairing Reed–Solomon (RS) codes in distributed storage and secret sharing, we propose SDMM schemes with reduced communication overhead through the use of trace polynomials. Specifically, these schemes are designed to address three critical concerns: (i) ensuring information-theoretic privacy against collusion among servers; (ii) providing security against Byzantine servers; and (iii) offering resiliency against stragglers to mitigate computing delays. …”
Get full text
Article -
522
Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability
Published 2024-01-01“…However, traditional donation systems, typically centralized, are prone to issues such as data redundancy, vulnerability to single-point failures, and a deficiency in transparency and traceability. …”
Get full text
Article -
523
PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach
Published 2025-03-01Get full text
Article -
524
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
Get full text
Article -
525
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01“…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
Get full text
Article -
526
A clustering-based approach for classifying data streams using graph matching
Published 2025-02-01“…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
Get full text
Article -
527
Synthetic healthcare data utility with biometric pattern recognition using adversarial networks
Published 2025-03-01Get full text
Article -
528
Community views on the secondary use of general practice data: Findings from a mixed‐methods study
Published 2024-02-01“…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
Get full text
Article -
529
Secure and trusted data sharing in smart healthcare using blockchain and IoT integration
Published 2025-08-01“…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
Get full text
Article -
530
Effective deep learning aided vehicle classification approach using Seismic Data
Published 2025-07-01“…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
Get full text
Article -
531
The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles
Published 2025-05-01“…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
Get full text
Article -
532
ECDSA-based tamper detection in medical data using a watermarking technique
Published 2024-01-01“…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
Get full text
Article -
533
Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks
Published 2024-10-01“…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
Get full text
Article -
534
A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation
Published 2019-06-01“…The assessment results may be used to identify possible vulnerabilities in telehealth systems and practice or demonstrate to patients the sufficient security and privacy protection to patients’ data.…”
Get full text
Article -
535
-
536
Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers
Published 2025-01-01“…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
Get full text
Article -
537
Detecting Personally Identifiable Information Through Natural Language Processing: A Step Forward
Published 2025-04-01“…The protection of personally identifiable information (PII) is being increasingly demanded by customers and governments via data protection regulations. Private and public organizations store and exchange through the Internet a large amount of data that include the personal information of users, employees, and customers. …”
Get full text
Article -
538
Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security
Published 2024-12-01“…The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches. …”
Get full text
Article -
539
Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
Published 2024-08-01“…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
Get full text
Article -
540
LLM-MalDetect: A Large Language Model-Based Method for Android Malware Detection
Published 2025-01-01Get full text
Article