Search alternatives:
uses » use (Expand Search)
Showing 61 - 80 results of 2,784 for search '(((( useddddds OR useddddds) OR uses) privacy data\ ) OR ( used privacy data\ ))', query time: 0.27s Refine Results
  1. 61

    Explaining the unexplainable: data sharing and privacy in Web 3.0 by Shim Jieun, Kim Jieun

    Published 2025-03-01
    “…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
    Get full text
    Article
  2. 62

    Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks by Yong-Ki Kim, Hyunjo Lee, Min Yoon, Jae-Woo Chang

    Published 2013-06-01
    “…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
    Get full text
    Article
  3. 63

    A Survey on Association Rule Hiding in Privacy Preserving Data Mining by Arezoo Hekmatyar, Naser Nematbakhsh, Mohammad Naderi Dehkordi

    Published 2024-02-01
    “…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
    Get full text
    Article
  4. 64

    Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization by Xiaoxiao Wang, Jingjing Zhang, Huize Wan, Yuan Yao

    Published 2025-02-01
    “…As user interactions on online social platforms increase, so does the public’s concern over the exposure of user privacy data. However, ordinary users often lack a clear and intuitive understanding of how their personal online information flows and how algorithms are involved in this process. …”
    Get full text
    Article
  5. 65

    Ethical Dilemmas and Coping Strategies in the Use of Psychological Scales in the Era of Big Data by Lirong LIU, Yanan ZHENG

    Published 2025-04-01
    “…Focusing on the ethical risks arising from the reconstruction of psychological scales due to innovations in big data technology, a systematic analysis is conducted on the research and current use of psychological scales within the context of big data. …”
    Get full text
    Article
  6. 66
  7. 67
  8. 68

    Federated LeViT-ResUNet for Scalable and Privacy-Preserving Agricultural Monitoring Using Drone and Internet of Things Data by Mohammad Aldossary, Jaber Almutairi, Ibrahim Alzamil

    Published 2025-04-01
    “…New drone photography and IoT sensors offer quick, high-resolution, multimodal agricultural data collecting. Regional diversity, data heterogeneity, and privacy problems make it hard to conclude these data. …”
    Get full text
    Article
  9. 69
  10. 70
  11. 71

    Privacy-Aware Detection for Large Language Models Using a Hybrid BiLSTM-HMM Approach by Maryam Abbasalizadeh, Sashank Narain

    Published 2025-01-01
    “…However, their deployment introduces significant privacy concerns, including the memorization and unintended disclosure of sensitive data. …”
    Get full text
    Article
  12. 72

    Security and privacy within smart cities by Putnik Nenad R., Marković Jana M.

    Published 2025-01-01
    “…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
    Get full text
    Article
  13. 73

    Privacy-Preserving Rule Induction Using CKKS by Jihyeon Choi, Jina Choi, Younho Lee, Jung-Sik Hong

    Published 2024-01-01
    “…This study introduces a new approach called homomorphic encryption-based rule induction (HORI) algorithm, designed specifically for scenarios where data confidentiality is critical. This method is constructed using CKKS homomorphic encryption to make it work with encrypted data, thereby enhancing the privacy of both training data and the input for inference. …”
    Get full text
    Article
  14. 74
  15. 75

    Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data by Shiyue Qin, Fucai Zhou, Zongye Zhang, Zifeng Xu

    Published 2020-01-01
    “…Substring searching on gene sequence data is widely used for analyzing the association between a list of gene mutations and a specific disease. …”
    Get full text
    Article
  16. 76

    Towards Self-Awareness Privacy Protection for Internet of Things Data Collection by Kok-Seng Wong, Myung Ho Kim

    Published 2014-01-01
    “…IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. …”
    Get full text
    Article
  17. 77

    Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection by Lusheng Shi, Kai Li, Huibo Zhu

    Published 2023-01-01
    “…Data fusion and privacy protection technologies are both the research focuses in the field of wireless sensor networks. …”
    Get full text
    Article
  18. 78

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…In the data era, threats to personal privacy information in ubiquitous sharing environments are widespread, such as apps frequently collecting personal information beyond scope, and big data-enabled price discrimination against frequent customers. …”
    Get full text
    Article
  19. 79

    A hybrid-security model for privacy-enhanced distributed data mining by Tanzeela Javid, Manoj Kumar Gupta, Abhishek Gupta

    Published 2022-06-01
    “…The accuracy obtained in classification task and clustering task using naïve Bayes and k-means technique is high when different datasets in a privacy-enhanced distributed data mining environment verify the working of the hybrid security model.…”
    Get full text
    Article
  20. 80

    On the fidelity versus privacy and utility trade-off of synthetic patient data by Tim Adams, Colin Birkenbihl, Karen Otte, Hwei Geok Ng, Jonas Adrian Rieling, Anatol-Fiete Näher, Ulrich Sax, Fabian Prasser, Holger Fröhlich

    Published 2025-05-01
    “…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
    Get full text
    Article