Showing 481 - 500 results of 2,784 for search '(((( useddds OR useddddddds) OR uses) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.20s Refine Results
  1. 481

    Verifiable secure aggregation scheme for privacy protection in federated learning networks by Wujun Yao, Tanping Zhou, Yiliang Han, Xiaolin Wang

    Published 2025-08-01
    “…Security analysis demonstrates that our solution effectively ensures privacy protection. We tested the performance using a Raspberry Pi as an edge computing device. …”
    Get full text
    Article
  2. 482

    Analysis, Design, and Implementation of a User-Friendly Differential Privacy Application by Reynardo Tjhin, Muhammad Sajjad Akbar, Clement Canonne, Rabia Bashir

    Published 2025-02-01
    “…In the era of artificial intelligence, ensuring privacy in publicly released data is critical to prevent linkage attacks that can reveal sensitive information about individuals. …”
    Get full text
    Article
  3. 483

    Digital citizenship literacy in Indonesia: The role of privacy awareness and social campaigns by Rossi Iskandar, Arifin Maksum, Arita Marini

    Published 2025-01-01
    “…A quantitative research approach was employed, using a survey method to collect data from 250 respondents of students from several high schools in Jakarta. …”
    Get full text
    Article
  4. 484
  5. 485
  6. 486

    Blockchain oracles for decentralized agricultural insurance using trusted IoT data by Manoj T, Krishnamoorthi Makkithaya, Narendra V. G., Vijaya Murari T

    Published 2025-01-01
    “…Initially, a method for computing the direct reputation score of IoT devices based on behavioral and data reputation is illustrated. Next, a privacy preserved decentralized oracle mechanism is designed and implemented using a masked secret sharing and secure aggregation scheme. …”
    Get full text
    Article
  7. 487

    Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions by R. Vijay Anand, G. Magesh, I. Alagiri, Madala Guru Brahmam, Balamurugan Balusamy, Chithirai Pon Selvan, Haya Mesfer Alshahrani, Masresha Getahun, Ben Othman Soufiene

    Published 2025-01-01
    “…After that, these local models are aggregated towards a common, global model using secure aggregation methods, which makes sure that there is nozza of data privacy and hence, in the process making sure that more accurate models can be obtained due to diversified data sets. …”
    Get full text
    Article
  8. 488

    Data Security Model Using (AES-LEA) Algorithms for WoT Environment by Zinah A. Al-jazaeri, Joolan Rokan Naif, Ahmad Mohamad Ghandour

    Published 2025-06-01
    “…Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. …”
    Get full text
    Article
  9. 489

    Social Engineering Threat Analysis Using Large-Scale Synthetic Data by Sellappan Palaniappan, Rajasvaran Logeswaran, Shapla Khanam, Pulasthi Gunawardhana

    Published 2025-02-01
    “…Our model achieved an accuracy of 0.8984 and an F1 score of 0.9253, demonstrating its effectiveness in detecting social engineering attacks. The use of synthetic data overcomes the problem of lack of availability of real-world data due to privacy issues, and is demonstrated in this work to be safe, scalable, ethics friendly and effective.…”
    Get full text
    Article
  10. 490

    The secondary use of the Finnish national health data repository Kanta – opportunities and obstacles by Emmi Eronen, Alpo Olavi Värri, Miika Järvinen

    Published 2025-05-01
    “…While protecting the privacy of the individuals’ data in the Kanta Services, improvements to the secondary use law are suggested. …”
    Get full text
    Article
  11. 491

    Community views on the secondary use of general practice data: Findings from a mixed‐methods study by Annette J. Braunack‐Mayer, Carolyn Adams, Alberto Nettel‐Aguirre, Belinda Fabrianesi, Lucy Carolan, Justin Beilby, Felicity Flack

    Published 2024-02-01
    “…Abstract Introduction General practice data, particularly when combined with hospital and other health service data through data linkage, are increasingly being used for quality assurance, evaluation, health service planning and research. …”
    Get full text
    Article
  12. 492
  13. 493

    Clinical Simulation Program for the Training of Health Profession Residents in Confidentiality and the Use of Social Networks by Alejandro Martínez-Arce, Alberto Bermejo-Cantarero, Laura Muñoz de Morales-Romero, Víctor Baladrón-González, Natalia Bejarano-Ramírez, Gema Verdugo-Moreno, María Antonia Montero-Gaspar, Francisco Javier Redondo-Calvo

    Published 2024-10-01
    “…After the course, the participants reported intending to modify their behavior when sharing patient data without their consent and with respect to how patients are informed; Conclusions: The use of advanced simulation in the training of interprofessional teams of residents is as an effective tool for initiating attitudinal change and increasing knowledge related to patient privacy and confidentiality. …”
    Get full text
    Article
  14. 494

    Mobile Phone Network Data in the COVID-19 era: A systematic review of applications, socioeconomic factors affecting compliance to non-pharmaceutical interventions, privacy implicat... by Mohammed Okmi, Tan Fong Ang, Muhammad Faiz Mohd Zaki, Chin Soon Ku, Koo Yuen Phan, Irfan Wahyudi, Lip Yee Por

    Published 2025-01-01
    “…<h4>Background</h4>The use of traditional mobility datasets, such as travel surveys and census data, has significantly impacted various disciplines, including transportation, urban sensing, criminology, and healthcare. …”
    Get full text
    Article
  15. 495

    Federated learning in food research by Zuzanna Fendor, Bas H.M. van der Velden, Xinxin Wang, Andrea Jr. Carnoli, Osman Mutlu, Ali Hürriyetoğlu

    Published 2025-10-01
    “…The use of machine learning in food research is sometimes limited due to data sharing obstacles such as data ownership and privacy requirements. …”
    Get full text
    Article
  16. 496

    Federated meta learning: a review by Chuanyao ZHANG, Shijing SI, Jianzong WANG, Jing XIAO

    Published 2023-03-01
    “…With the popularity of mobile devices, massive amounts of data are constantly produced.The data privacy policies are becoming more and more specified, the flow and use of data are strictly regulated.Federated learning can break data barriers and use client data for modeling.Because users have different habits, there are significant differences between different client data.How to solve the statistical challenge caused by the data imbalance becomes an important topic in federated learning research.Using the fast learning ability of meta learning, it becomes an important way to train different personalized models for different clients to solve the problem of data imbalance in federated learning.The definition and classification of federated learning, as well as the main problems of federated learning were introduced systematically based on the background of federated learning.The main problems included privacy protection, data heterogeneity and limited communication.The research work of federated metalearning in solving the heterogeneous data, the limited communication environment, and improving the robustness against malicious attacks were introduced systematically starting from the background of federated meta learning.Finally, the summary and prospect of federated meta learning were proposed.…”
    Get full text
    Article
  17. 497
  18. 498

    Federated learning with LSTM for intrusion detection in IoT-based wireless sensor networks: a multi-dataset analysis by Raja Waseem Anwar, Mohammad Abrar, Abdu Salam, Faizan Ullah

    Published 2025-03-01
    “…Using an FL approach, multiple IoT nodes collaboratively train a global LSTM model without exchanging raw data, thereby addressing privacy concerns and improving detection capabilities. …”
    Get full text
    Article
  19. 499

    Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments by Mohammed A. Aleisa

    Published 2025-01-01
    “…This architecture entails data privacy and confidentiality, auditability and traceability, and withstanding evolving threats, including potential threats in terms of quantum attacks. …”
    Get full text
    Article
  20. 500

    Risk assessment of data protection in the maritime industry using system-theoretic process analysis by Sutthipong Yungratog, Hyungju Kim, Wonsiri Punurai, Sotarat Thammaboosadee

    Published 2025-06-01
    “…Data protection assessment is a significant issue to security and privacy enhancement. …”
    Get full text
    Article