Suggested Topics within your search.
Suggested Topics within your search.
-
61
Explaining the unexplainable: data sharing and privacy in Web 3.0
Published 2025-03-01“…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
Get full text
Article -
62
A Survey on Association Rule Hiding in Privacy Preserving Data Mining
Published 2024-02-01“…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
Get full text
Article -
63
Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks
Published 2013-06-01“…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
Get full text
Article -
64
Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization
Published 2025-02-01“…The primary contribution of this work is an innovative approach that uses metaphorical visual language to represent the flow of user data, algorithms, and information. …”
Get full text
Article -
65
Ethical Dilemmas and Coping Strategies in the Use of Psychological Scales in the Era of Big Data
Published 2025-04-01“…Focusing on the ethical risks arising from the reconstruction of psychological scales due to innovations in big data technology, a systematic analysis is conducted on the research and current use of psychological scales within the context of big data. …”
Get full text
Article -
66
Meta-analysis of privacy legal framework: revising the various approaches for balancing privacy risks and usability of healthcare information systems | Meta-analisi del quadro norm...
Published 2022-01-01“…A proactive approach to managing these risks involves the use of privacy by design frameworks and conceptual tools. …”
Get full text
Article -
67
-
68
Federated LeViT-ResUNet for Scalable and Privacy-Preserving Agricultural Monitoring Using Drone and Internet of Things Data
Published 2025-04-01“…New drone photography and IoT sensors offer quick, high-resolution, multimodal agricultural data collecting. Regional diversity, data heterogeneity, and privacy problems make it hard to conclude these data. …”
Get full text
Article -
69
-
70
Study on choosing the parameter ε in differential privacy
Published 2015-12-01Get full text
Article -
71
Privacy-Aware Detection for Large Language Models Using a Hybrid BiLSTM-HMM Approach
Published 2025-01-01“…However, their deployment introduces significant privacy concerns, including the memorization and unintended disclosure of sensitive data. …”
Get full text
Article -
72
Security and privacy within smart cities
Published 2025-01-01“…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
Get full text
Article -
73
Privacy-Preserving Rule Induction Using CKKS
Published 2024-01-01“…This study introduces a new approach called homomorphic encryption-based rule induction (HORI) algorithm, designed specifically for scenarios where data confidentiality is critical. This method is constructed using CKKS homomorphic encryption to make it work with encrypted data, thereby enhancing the privacy of both training data and the input for inference. …”
Get full text
Article -
74
-
75
Towards Self-Awareness Privacy Protection for Internet of Things Data Collection
Published 2014-01-01“…IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. …”
Get full text
Article -
76
Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection
Published 2023-01-01“…Data fusion and privacy protection technologies are both the research focuses in the field of wireless sensor networks. …”
Get full text
Article -
77
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. …”
Get full text
Article -
78
Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data
Published 2020-01-01“…Substring searching on gene sequence data is widely used for analyzing the association between a list of gene mutations and a specific disease. …”
Get full text
Article -
79
A hybrid-security model for privacy-enhanced distributed data mining
Published 2022-06-01“…The accuracy obtained in classification task and clustering task using naïve Bayes and k-means technique is high when different datasets in a privacy-enhanced distributed data mining environment verify the working of the hybrid security model.…”
Get full text
Article -
80
On the fidelity versus privacy and utility trade-off of synthetic patient data
Published 2025-05-01“…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
Get full text
Article