Showing 461 - 480 results of 2,784 for search '(((( useddddds OR useddddds) OR useddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.21s Refine Results
  1. 461

    A comprehensive review on the users’ identity privacy for 5G networks by Mamoon M. Saeed, Mohammad Kamrul Hasan, Ahmed J. Obaid, Rashid A. Saeed, Rania A. Mokhtar, Elmustafa Sayed Ali, Md Akhtaruzzaman, Sanaz Amanlou, A. K. M. Zakir Hossain

    Published 2022-03-01
    “…Abstract Fifth Generation (5G) is the final generation in mobile communications, with minimum latency, high data throughput, and extra coverage. The 5G network must guarantee very good security and privacy levels for all users for these features. …”
    Get full text
    Article
  2. 462

    A Goal-Oriented Evaluation Methodology for Privacy-Preserving Process Mining by Ibrahim Ileri, Tugba Gurgen Erdogan, Ayca Kolukisa-Tarhan

    Published 2025-07-01
    “…Process mining (PM) is a growing field that looks at how to find, analyze, and improve process models using data from information systems. It automates much of the detailed work that usually requires a lot of manual effort. …”
    Get full text
    Article
  3. 463

    Challenges in IoMT Adoption in Healthcare: Focus on Ethics, Security, and Privacy by Alton Mabina, Neo Rafifing, Boago Seropola, Thapelo Monageng, Pulafela Majoo

    Published 2024-12-01
    “…This study highlights ethical, security, and privacy barriers to IoMT adoption in developing countries and proposes strategies like regulatory frameworks, data encryption, AI transparency, and professional training to address these challenges. …”
    Get full text
    Article
  4. 464

    Privacy protection risk identification mechanism based on automated feature combination by CAI Minchao, YAO Hongwei, WANG Yang, QIN Zhan, CHEN Shaomeng, REN Kui

    Published 2024-11-01
    “…Building upon the privacy protection method using homomorphic encryption, the technical challenge of optimizing feature combinations was addressed. …”
    Get full text
    Article
  5. 465

    PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels by Anastasios N. Bikos

    Published 2025-05-01
    “…Our pre-prototyped framework can provide such privacy preservation (namely <i>virtual proof of privacy (VPP)</i>) and visually secure data transfer promptly (<1000 ms), as well as the physical distance of the smart glasses (∼50 cm).…”
    Get full text
    Article
  6. 466

    ZK-STARK: Mathematical Foundations and Applications in Blockchain Supply Chain Privacy by Arade Madhuri S., Pise Nitin N.

    Published 2025-03-01
    “…Privacy is one of the major security concerns. The zero-knowledge proof enables the transmission of data from the sender to the receiver without disclosing the actual content of the data. …”
    Get full text
    Article
  7. 467

    Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks by Hongning Li, Qingqi Pei, Wenjing Zhang

    Published 2016-07-01
    “…In this paper, to make full use of idle spectrum with low probability of location leakage, we propose a Location Privacy-Preserving Channel Allocation (LP-p CA) scheme. …”
    Get full text
    Article
  8. 468

    GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks by Nges Brian Njungle, Eric Jahns, Zhenqi Wu, Luigi Mastromauro, Milan Stojkov, Michel A. Kinsy

    Published 2025-01-01
    “…Machine learning has become integral to our lives, finding applications in nearly every aspect of our daily routines. However, using personal information in machine learning applications has raised concerns about user data privacy and security. …”
    Get full text
    Article
  9. 469

    Blockchain-based privacy-preserving multi-tasks federated learning framework by Yunyan Jia, Ling Xiong, Yu Fan, Wei Liang, Neal Xiong, Fengjun Xiao

    Published 2024-12-01
    “…To overcome this weakness, this work proposes a privacy-preserving FL framework with multi-tasks using partitioned blockchain, which can run several different FL tasks by multiple requesters. …”
    Get full text
    Article
  10. 470

    A Privacy-Preserving Querying Mechanism with High Utility for Electric Vehicles by Ugur Ilker Atmaca, Sayan Biswas, Carsten Maple, Catuscia Palamidessi

    Published 2024-01-01
    “…Simultaneously, personal data use for analytics is growing at an unprecedented rate, raising concerns for privacy. …”
    Get full text
    Article
  11. 471

    A deep decentralized privacy-preservation framework for online social networks by Samuel Akwasi Frimpong, Mu Han, Emmanuel Kwame Effah, Joseph Kwame Adjei, Isaac Hanson, Percy Brown

    Published 2024-12-01
    “…This paper addresses the critical challenge of privacy in Online Social Networks (OSNs), where centralized designs compromise user privacy. …”
    Get full text
    Article
  12. 472

    PPSC: High-Precision and Scalable Encrypted Privacy-Preserving Speech Classification by WANG Leilei, SONG Kao, ZHANG Yuanyuan, BI Renwan, XIONG Jinbo

    Published 2025-02-01
    “…Secondly, the PPSC scheme securely implements the fundamental modules such as the convolutional layer, ReLU layer, average pooling layer, fully connected layer, and Softmax layer. This ensures the privacy of speech data, speech classification models, and intermediate computing results. …”
    Get full text
    Article
  13. 473

    Privacy risk adaptive access control model via evolutionary game by Hongfa DING, Changgen PENG, Youliang TIAN, Shuwen XIANG

    Published 2019-12-01
    “…Aiming at the problem that in the private sensitive date centralized and opening information systems,a fine-grained and self-adaptive access control model for privacy preserving is desperately needed,thus the balance between privacy preserving and data access utility should be achieved,a rational multi-player risk-adaptive based access control model for privacy preserving was proposed.Firstly,the privacy risk values of access request and requester were formulized by the private information quantity of the requested dataset,and by using Shannon information.Secondly,a risk-adaptive based access control evolutionary game model was constructed by using evolutionary game under the supposing of bounded rational players.Furthermore,dynamic strategies of participants were analyzed by using replicator dynamics equation,and the method of choosing evolutionary stable strategy was proposed.Simulation and comparison results show that,the proposed model is effective to dynamically and adaptively preserve privacy and more risk adaptive,and dynamic evolutionary access strategies of the bounded rational participants are more suitable for practical scenarios.…”
    Get full text
    Article
  14. 474

    Ensuring the security and privacy of information in mobile health-care communication systems by Ademola Adesina, Kehinde Agbele, Ronald Februarie, Ademola Abidoye, Henry Nyongesa

    Published 2011-09-01
    “…The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient's data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. …”
    Get full text
    Article
  15. 475

    Privacy-Preserving Live Video Analytics for Drones via Edge Computing by Piyush Nagasubramaniam, Chen Wu, Yuanyi Sun, Neeraj Karamchandani, Sencun Zhu, Yongzhong He

    Published 2024-11-01
    “…While edge computing offers a solution to the throughput bottleneck, it also opens the door to potential privacy invasions by exposing sensitive visual data to risks. …”
    Get full text
    Article
  16. 476

    Preserving privacy and video quality through remote physiological signal removal by Saksham Bhutani, Mohamed Elgendi, Carlo Menon

    Published 2025-04-01
    “…However, the continuous and surreptitious recording of individuals by these devices and the collecting of sensitive health data without users’ knowledge or consent raise serious privacy concerns. …”
    Get full text
    Article
  17. 477

    Privacy preserving method based on Voronoi diagram in mobile crowd computing by Hao Long, Shukui Zhang, Jin Wang, Cheng-Kuan Lin, Jia-Jun Cheng

    Published 2017-10-01
    “…In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in the task by bidding and collect their data, in which the users’ identity, location, and other private information face the risk of disclosure. …”
    Get full text
    Article
  18. 478

    Taking disagreements into consideration: human annotation variability in privacy policy analysis by Tian Wang, Yuanye Ma, Catherine Blake, Masooda Bashir, Hsin-Yuan Wang

    Published 2025-03-01
    “… Introduction. Privacy policies inform users about data practices but are often complex and difficult to interpret. …”
    Get full text
    Article
  19. 479

    Verifiable secure aggregation scheme for privacy protection in federated learning networks by Wujun Yao, Tanping Zhou, Yiliang Han, Xiaolin Wang

    Published 2025-08-01
    “…Security analysis demonstrates that our solution effectively ensures privacy protection. We tested the performance using a Raspberry Pi as an edge computing device. …”
    Get full text
    Article
  20. 480

    Analysis, Design, and Implementation of a User-Friendly Differential Privacy Application by Reynardo Tjhin, Muhammad Sajjad Akbar, Clement Canonne, Rabia Bashir

    Published 2025-02-01
    “…In the era of artificial intelligence, ensuring privacy in publicly released data is critical to prevent linkage attacks that can reveal sensitive information about individuals. …”
    Get full text
    Article