Search alternatives:
usedddds » useddddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 901 - 920 results of 2,784 for search '(((( usedddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.21s Refine Results
  1. 901

    SHARE: An ethical framework for equitable data sharing in Caribbean health research by Michael H. Campbell, Natalie S. Greaves

    Published 2024-12-01
    “…Using the SHARE framework can support regionally relevant and culturally responsive work already underway in the region and further develop capacity for intentional sharing and (re)use of Caribbean health data.…”
    Get full text
    Article
  2. 902

    Generating and evaluating synthetic data in digital pathology through diffusion models by Matteo Pozzi, Shahryar Noei, Erich Robbi, Luca Cima, Monica Moroni, Enrico Munari, Evelin Torresani, Giuseppe Jurman

    Published 2024-11-01
    “…Abstract Synthetic data is becoming a valuable tool for computational pathologists, aiding in tasks like data augmentation and addressing data scarcity and privacy. …”
    Get full text
    Article
  3. 903

    Establishing A Personal Data Protection Agency for E-Commerce in Indonesia by Bilqis Laila Nuzul Sa'adah, Sukarmi Sukarmi, Reka Dewantara

    Published 2024-12-01
    “… The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
    Get full text
    Article
  4. 904

    A Data-Driven Approach for Generating Synthetic Load Profiles with GANs by Tsvetelina Kaneva, Irena Valova, Katerina Gabrovska-Evstatieva, Boris Evstatiev

    Published 2025-07-01
    “…The generation of realistic electrical load profiles is essential for advancing smart grid analytics, demand forecasting, and privacy-preserving data sharing. Traditional approaches often rely on large, high-resolution datasets and complex recurrent neural architectures, which can be unstable or ineffective when training data are limited. …”
    Get full text
    Article
  5. 905

    Dynamic Ensemble Selection for EEG Signal Classification in Distributed Data Environments by Małgorzata Przybyła-Kasperek, Jakub Sacewicz

    Published 2025-05-01
    “…This study presents a novel approach to EEG signal classification in distributed environments using dynamic ensemble selection. In scenarios where data dispersion arises due to privacy constraints or decentralized data collection, traditional global modelling is impractical. …”
    Get full text
    Article
  6. 906

    Comprehensive testing of large language models for extraction of structured data in pathology by Bastian Grothey, Jan Odenkirchen, Adnan Brkic, Birgid Schömig-Markiefka, Alexander Quaas, Reinhard Büttner, Yuri Tolkach

    Published 2025-03-01
    “…While recent studies show promise in using advanced language models for structuring pathology data, they primarily rely on proprietary models, raising cost and privacy concerns. …”
    Get full text
    Article
  7. 907

    A Web-Based Application for Smart City Data Analysis and Visualization by Panagiotis Karampakakis, Despoina Ioakeimidou, Periklis Chatzimisios, Konstantinos A. Tsintotas

    Published 2025-05-01
    “…Smart cities are urban areas that use contemporary technology to improve citizens’ overall quality of life. …”
    Get full text
    Article
  8. 908

    Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges by Mohsen Marjani, Fariza Nasaruddin, Abdullah Gani, Ahmad Karim, Ibrahim Abaker Targio Hashem, Aisha Siddiqa, Ibrar Yaqoob

    Published 2017-01-01
    “…However, such data are not useful without analytic power. Numerous big data, IoT, and analytics solutions have enabled people to obtain valuable insight into large data generated by IoT devices. …”
    Get full text
    Article
  9. 909

    Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization by Ahmad Musamih, Khaled Salah, Raja Jayaraman, Samer Ellaham, Mohammed Omar, Ibrar Yaqoob

    Published 2025-01-01
    “…In this paper, we propose a blockchain and NFT-based solution that addresses the challenges of managing, sharing, and monetizing genomic data while preserving privacy using Threshold Cryptography and Fully Homomorphic Encryption (FHE). …”
    Get full text
    Article
  10. 910

    A big data analysis algorithm for massive sensor medical images by Sarah A. Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A. Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed

    Published 2024-11-01
    “…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
    Get full text
    Article
  11. 911

    Efficient unpaired data validation and aggregation protocol in industrial Internet of things by MA Rong, FENG Tao

    Published 2024-10-01
    “…Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. …”
    Get full text
    Article
  12. 912

    A COMPREHENSIVE REVIEW OF GENERATIVE ARTIFICIAL INTELLIGENCE APPLICATIONS IN DATA VISUALIZATION by Luong Thi Minh Hue*, Nguyen The Vinh, Nguyen Van Viet, Nguyen Huu Khanh, Nguyen Kim Son, Duong Thuy Huong

    Published 2025-06-01
    “…Using natural language to generate visual representations of data (NL2VIS) is emerging as a promising research direction, driven by the rapid development of Generative AI (GenAI). …”
    Get full text
    Article
  13. 913

    PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing by Sreeja Cherillath Sukumaran, Mohammed Misbahuddin

    Published 2021-05-01
    “…Mobile Cloud Computing (MCC) allows users more possibilities to access services conveniently. But data security and privacy issues still act as barriers for adoption to cloud technology when dealing with confidential data. …”
    Get full text
    Article
  14. 914

    A Remedy for Heterogeneous Data: Clustered Federated Learning with Gradient Trajectory by Ruiqi Liu, Songcan Yu, Linsi Lan, Junbo Wang, Krishna Kant, Neville Calleja

    Published 2024-12-01
    “…Federated Learning (FL) has recently attracted a lot of attention due to its ability to train a machine learning model using data from multiple clients without divulging their privacy. …”
    Get full text
    Article
  15. 915

    Trusted access control mechanism for data with blockchain-assisted attribute encryption by Chang Liu, Dong Wang, Da Li, Shaoyong Guo, Wenjing Li, Xuesong Qiu

    Published 2025-06-01
    “…Ciphertext policy attribute-based encryption (CP-ABE) model is widely used in cloud data sharing scenarios, but there are problems such as privacy leakage of access policy, irrevocability of user or attribute, key escrow, and trust bottleneck. …”
    Get full text
    Article
  16. 916

    An Artificial Intelligence Pipeline for Hepatocellular Carcinoma: From Data to Treatment Recommendations by Zhang X, Yang L, Liu C, Yuan X, Zhang Y

    Published 2025-07-01
    “…However, challenges such as data quality, standardization, and privacy remain. …”
    Get full text
    Article
  17. 917

    Critical Factors in Young People’s Use and Non-Use of AI Technology for Emotion Regulation: A Pilot Study by Junyu Wang, Hongying Tang, Siu-Shing Man, Yingwei Chen, Shuzhang Zhou, Hoi-Shou (Alan) Chan

    Published 2025-07-01
    “…Data were collected through semi-structured face-to-face interviews and were analysed using NVivo 11 software. …”
    Get full text
    Article
  18. 918

    Securing the metaverse: Machine learning–based perspectives on risk, trust, and governance by Krishnashree Achuthan, Sasangan Ramanathan, Raghu Raman

    Published 2025-12-01
    “…The rapid expansion of the metaverse presents significant cybersecurity and privacy challenges, requiring structured, data-driven analysis. …”
    Get full text
    Article
  19. 919

    New frontiers in migration statistics: a narrative review on big data’s role by Ahmad Wali Ahmad Yar, Tuba Bircan

    Published 2025-08-01
    “…However, its use remains largely experimental, with key concerns around data access, representativeness, privacy, and the integration with official statistics. …”
    Get full text
    Article
  20. 920

    The impact of zero-knowledge proofs on data minimisation compliance of digital identity wallets by Emanuela Podda, Pol Hölzmer, Alexandre Amard, Johannes Sedlmeir, Gilbert Fridgen

    Published 2025-07-01
    “…Technically, these attestations involve auxiliary information to ensure their verifiability, leading to the generation, processing, and storage of more than just personal data. In particular, this auxiliary information contains globally unique information that can be misused as personal identifiers and poses risks to the privacy of individuals engaging in transactions using a European Digital Identity Wallet. …”
    Get full text
    Article