Showing 601 - 620 results of 2,784 for search '(((( useddddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.21s Refine Results
  1. 601

    A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms by Amal Albilali, Maysoon Abulkhair, Manal Bayousef, Faisal Albalwy

    Published 2024-01-01
    “…This innovative model combines the strengths of centralized efficiency and decentralized privacy, and introduces a unique mechanism that significantly enhances privacy protection and ensures data integrity. …”
    Get full text
    Article
  2. 602

    A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis by Eman Shalabi, Walid Khedr, Ehab Rushdy, Ahmad Salah

    Published 2025-03-01
    “…Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training. While FL offers privacy benefits through local training, privacy-preserving strategies are needed since model updates can leak training data information due to various attacks. …”
    Get full text
    Article
  3. 603

    Differential Private POI Queries via Johnson-Lindenstrauss Transform by Mengmeng Yang, Tianqing Zhu, Bo Liu, Yang Xiang, Wanlei Zhou

    Published 2018-01-01
    “…In addition, the proposed perturbation method based on the Johnson Lindenstrauss transform satisfies the differential privacy. Two popular point of interest queries, <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>-NN and Range, are used to evaluate the method on two real-world data sets. …”
    Get full text
    Article
  4. 604

    A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain by Lakshman Kannan Venugopal, Rajappan Rajaganapathi, Abhishek Birjepatil, Sundararajan Edwin Raja, Gnanasaravanan Subramaniam

    Published 2023-12-01
    “…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
    Get full text
    Article
  5. 605

    A federated LSTM network for load forecasting using multi-source data with homomorphic encryption by Mengdi Wang, Rui Xin, Mingrui Xia, Zhifeng Zuo, Yinyin Ge, Pengfei Zhang, Hongxing Ye

    Published 2025-03-01
    “…These challenges drive the adoption of federated learning (FL) to address issues related to data silos and privacy. In this paper, a novel framework for short-term load forecasting was proposed using historical data from industries such as power, meteorology, and finance. …”
    Get full text
    Article
  6. 606
  7. 607

    How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries by Nicki Tiffin, Asha George, Amnesty Elizabeth LeFevre

    Published 2019-03-01
    “…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
    Get full text
    Article
  8. 608

    Predictive Model to Analyse Real and Synthetic Data for Learners' Performance Prediction Using Regression Techniques by SHABNAM ARA S.J, Tanuja R, Manjula S.H

    Published 2025-03-01
    “…Real-world data availability is often hampered by privacy concerns, prompting a shift towards synthetic data generation. …”
    Get full text
    Article
  9. 609

    Exploring the Use of AI in Qualitative Data Analysis: Comparing Manual Processing with Avidnote for Theme Generation by S. M. Akramul Kabir, Fareeha Ali, Rana Lotfy Ahmed, Ruqayya Sulaiman-Hill

    Published 2025-04-01
    “…However, fundamental concerns persist regarding the robustness, generalisability, credibility, reliability and trustworthiness of qualitative research when using AI technologies. Ethical considerations, such as data security and privacy, also need to be addressed in research settings. …”
    Get full text
    Article
  10. 610

    Behavioural Economics and Consumer Decision-Making in the Age of Artificial Intelligence (AI), Data Science, Business Analytics, and Internet of Things (IoT) by Yuki Haruto Yamamoto

    Published 2024-05-01
    “…However, while AI and IoT facilitate more efficient and engaging consumer experiences, they introduce complex ethical and practical concerns, particularly around data privacy, algorithmic fairness, and maintenance of consumer trust. …”
    Get full text
    Article
  11. 611

    A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology by Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed

    Published 2023-12-01
    “… Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. …”
    Get full text
    Article
  12. 612

    Secure healthcare data sharing and attack detection framework using radial basis neural network by Abhishek Kumar, Priya Batta, Pramod Singh Rathore, Sachin Ahuja

    Published 2025-05-01
    “…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
    Get full text
    Article
  13. 613
  14. 614

    Respiratory Rate Estimation from Thermal Video Data Using Spatio-Temporal Deep Learning by Mohsen Mozafari, Andrew J. Law, Rafik A. Goubran, James R. Green

    Published 2024-10-01
    “…Thermal videos provide a privacy-preserving yet information-rich data source for remote health monitoring, especially for respiration rate (RR) estimation. …”
    Get full text
    Article
  15. 615
  16. 616

    Comments on &#x201C;Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities&#x201D;&#x2014;Privacy-Preserving Certificate in V2X Communic... by Abel C. H. Chen

    Published 2025-01-01
    “…The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. …”
    Get full text
    Article
  17. 617

    Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring by Eugenia Tîrziu, Ana-Mihaela Vasilevschi, Adriana Alexandru, Eleonora Tudora

    Published 2024-12-01
    “…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
    Get full text
    Article
  18. 618

    Losing control: The effects of social media fatigue, privacy concerns and psychological reactance on social media advertising by Nathalie Nicola

    Published 2022-12-01
    “…This caused users to feel negatively after using SMP. Ad avoidance is caused by significant privacy concerns when encountering personalized ads, such as suspicion as to how data is used, the feeling of being watched and listened to, as well as annoyance at the irrelevance and repetitiveness of SMA. …”
    Get full text
    Article
  19. 619

    Mediating role of trust and privacy concerns between web assurance mechanism and purchase intention of online products by Charu Saxena, Pratibha Thakur

    Published 2024-12-01
    “…A conceptual model has been framed to investigate the direct and indirect relationship between web assurance mechanism and purchase intention of online products via trust and privacy concern. This study uses data collected from 342 respondents. …”
    Get full text
    Article
  20. 620

    Trust-aware privacy-preserving QoS prediction with graph neural collaborative filtering for internet of things services by Weiwei Wang, Wenping Ma, Kun Yan

    Published 2025-02-01
    “…However, issues related to information credibility, user data privacy, and prediction accuracy in QoS prediction for IoT services have become significant challenges in current research. …”
    Get full text
    Article