Showing 641 - 660 results of 2,784 for search '(((( useddds OR useddddddds) OR uses) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.21s Refine Results
  1. 641
  2. 642
  3. 643
  4. 644

    Vehicle Trajectory Generation Based on Generation Adversarial Network by Zhonghe He, Renchi Shao, Sijia Xiang

    Published 2024-06-01
    “…However, the exposure of vehicle location information also raises important privacy issues. Current typical methods for protecting vehicle location privacy protection methods such as anonymity and pseudonymity, still carry the risk of the vehicle being tracked, leading to data security issues. …”
    Get full text
    Article
  5. 645
  6. 646

    Secured cloud-based image data processing of self-driving vehicles using full homomorphic encryption by Kamran Saeed, M.Fatih Adak

    Published 2025-10-01
    “…Self-driving vehicles leverage internet of things (IoT) technology to utilize multiple sensors to continuously monitor their environment and make decisions without human intervention. Data collected from these sensors require secure transmission and encrypted storage in cloud servers, where retrieving the data without decryption is necessary to ensure privacy. …”
    Get full text
    Article
  7. 647

    Assessing the Fidelity and Utility of Water Systems Data Using Generative Adversarial Networks: A Technical Review by Md Nazmul Kabir Sikder, Yingjie Wang, Feras A. Batarseh

    Published 2025-01-01
    “…This review paper addresses this limitation by utilizing Generative Adversarial Networks (GANs) to generate realistic synthetic datasets, overcoming data scarcity and privacy concerns in WDSs. We review, train, and evaluate seven state-of-the-art GAN models using three multivariate time-series datasets. …”
    Get full text
    Article
  8. 648

    Exploring the future of privacy-preserving heart disease prediction: a fully homomorphic encryption-driven logistic regression approach by Vankamamidi S. Naresh, Sivaranjani Reddi

    Published 2025-02-01
    “…Abstract Homomorphic Encryption (HE) offers a revolutionary cryptographic approach to safeguarding privacy in machine learning (ML), especially in processing sensitive healthcare data. …”
    Get full text
    Article
  9. 649
  10. 650

    Travel Behavior during the 2021 British Columbia Floods Using De-identified Network Mobility Data by Enqi Liao, Syeda N. Zehra, Stephen D. Wong

    Published 2024-05-01
    “…This study investigates residents’ emergent travel behavior before, during, and after the 2021 British Columbia Floods. Using de-identified network mobility data, we analyze travel patterns centered around the municipality of Hope in British Columbia, Canada. …”
    Get full text
    Article
  11. 651
  12. 652
  13. 653

    Fused federated learning framework for secure and decentralized patient monitoring in healthcare 5.0 using IoMT by Bassam Almogadwy, Abdulrahman Alqarafi

    Published 2025-07-01
    “…Abstract Federated Learning (FL) enables artificial intelligence frameworks to train on private information without compromising privacy, which is especially useful in the medical and healthcare industries where the knowledge or data at hand is never enough. …”
    Get full text
    Article
  14. 654
  15. 655

    An efficient secure predictive demand forecasting system using Ethereum virtual machine by Himani Saraswat, Mahesh Manchanda, Sanjay Jasola

    Published 2024-12-01
    “…The system leverages the Ethereum virtual machine to establish a secure, decentralized, and tamper‐resistant platform for demand prediction while ensuring data integrity and privacy. By utilizing the capabilities of smart contracts and decentralized applications within the Ethereum ecosystem, the proposed system offers an efficient and transparent solution for demand forecasting challenges. …”
    Get full text
    Article
  16. 656

    Scalable architecture for autonomous malware detection and defense in software-defined networks using federated learning approaches by Ripal Ranpara, Shobhit K. Patel, Om Prakash Kumar, Fahad Ahmed Al-Zahrani

    Published 2025-08-01
    “…This architecture combines SDN’s centralized management of potentially significant data streams with FL’s decentralized, privacy-preserving learning capabilities in a distributed manner adaptable to varying time and space constraints. …”
    Get full text
    Article
  17. 657

    Collaborative and privacy-preserving cross-vendor united diagnostic imaging via server-rotating federated machine learning by Hao Wang, Xiaoyu Zhang, Xuebin Ren, Zheng Zhang, Shusen Yang, Chunfeng Lian, Jianhua Ma, Dong Zeng

    Published 2025-08-01
    “…Abstract Federated Learning (FL) is a distributed framework that enables collaborative training of a server model across medical data vendors while preserving data privacy. However, conventional FL faces two key challenges: substantial data heterogeneity among vendors and limited flexibility from a fixed server, leading to suboptimal performance in diagnostic-imaging tasks. …”
    Get full text
    Article
  18. 658

    Security and privacy in online teaching during the COVID-19 pandemic: experiences and concerns of academics in Saudi higher education by Basmah Almekhled, Helen Petrie

    Published 2024-11-01
    “…The findings provide several key insights: Key aspects of online privacy and security for Saudi HEI academics: Saudi HEI academic’s notion of online privacy and security is about the protection of personal data, preventing unauthorized access to data and ensuring the confidentiality and integrity of data. …”
    Get full text
    Article
  19. 659

    Old MacDonald and His Hackable Smartphone Application: A Security and Privacy Analysis of Android Agriculture Applications by Logan Mears, Rachel Donner, George Grispos

    Published 2025-01-01
    “…Despite the widespread use of smartphones among farmers increasing from 77% in 2021 to 82% in 2023, minimal research has examined the security and privacy implications of agricultural smartphone applications, potentially used on these devices. …”
    Get full text
    Article
  20. 660

    Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR) System by G. Nouskalis

    Published 2011-01-01
    “…The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. …”
    Get full text
    Article