Search alternatives:
useddds » usedddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 1,961 - 1,980 results of 2,784 for search '(((( useddds OR usedddddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.25s Refine Results
  1. 1961

    Overview of searchable encryption research by Ying LI, Chunguang MA

    Published 2018-07-01
    “…With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.…”
    Get full text
    Article
  2. 1962

    Regulating cryptocurrencies in a post-pandemic global economy: A comparative legal analysis of the EU, the US, and Russia by Lana Stern

    Published 2025-09-01
    “…Drawing on a comparative analysis of Russia, the European Union, the United States, and Malta, it evaluates the effectiveness of CBDC-integrated anti-money laundering (AML) mechanisms in addressing the three key stages of illicit finance: placement, layering, and integration. Using primary sources, including pilot program data, legislative texts, and policy consultations, alongside secondary academic literature, the Study explores how design elements such as ledger visibility, programmable transaction limits, sanctions screening, and tiered privacy structures can be embedded into CBDC infrastructure. …”
    Get full text
    Article
  3. 1963

    Enhancing Software Sustainability: Leveraging Large Language Models to Evaluate Security Requirements Fulfillment in Requirements Engineering by Ahmad F. Subahi

    Published 2025-02-01
    “…In the digital era, cybersecurity is integral for preserving national security, digital privacy, and social sustainability. This research emphasizes the role of non-functional equirements (NFRs) in developing secure software systems that enhance societal wellbeing by ensuring data protection, user privacy, and system robustness. …”
    Get full text
    Article
  4. 1964

    An Efficient Architecture for Edge AI Federated Learning With Homomorphic Encryption by Dadmehr Rahbari, Masoud Daneshtalab, Maksim Jenihhin

    Published 2025-01-01
    “…With the rapid growth of edge AI applications, there is an increasing demand for federated learning (FL) frameworks that are both efficient and privacy-preserving. This work introduces a robust approach that leverages homomorphic encryption (HE) to ensure data confidentiality during decentralized training. …”
    Get full text
    Article
  5. 1965

    Conceptualizing smart citizen as smart voter and its relationships with smart election process by Muhammad Younus, Dyah Mutiarin, Halimah Abdul Manaf, Achmad Nurmandi, Andi Luhur Prianto

    Published 2025-03-01
    “…However, it also raises ethical concerns, such as data privacy, digital inequality, and risks of misinformation, which need careful management to sustain public trust. …”
    Get full text
    Article
  6. 1966

    A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions by Oumayma Jouini, Kaouthar Sethom, Abdallah Namoun, Nasser Aljohani, Meshari Huwaytim Alanazi, Mohammad N. Alanazi

    Published 2024-06-01
    “…Hot topics included big data, cloud, edge, multimedia, security, privacy, QoS, and activity recognition, while critical domains included industry, healthcare, agriculture, transportation, smart homes and cities, and assisted living. …”
    Get full text
    Article
  7. 1967

    Criminal Law Challenged by Crossing into Virtual Reality by Mahdi Karimi

    Published 2025-03-01
    “…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
    Get full text
    Article
  8. 1968

    Revolutionising Educational Management with AI and Wireless Networks: A Framework for Smart Resource Allocation and Decision-Making by Christos Koukaras, Euripides Hatzikraniotis, Maria Mitsiaki, Paraskevas Koukaras, Christos Tjortjis, Stavros G. Stavrinides

    Published 2025-05-01
    “…By leveraging data-driven insights enabled by reliable wireless connectivity, institutions can make more informed decisions, use resources more effectively, and automate routine tasks. …”
    Get full text
    Article
  9. 1969

    Emerging technologies and applications in multimodality imaging for ischemic heart disease: current state and future of artificial intelligence by Praveen Kumar Chandra Sekar, Ramakrishnan Veerabathiran

    Published 2024-11-01
    “…Addressing regulatory and ethical challenges, such as data privacy and algorithm transparency, is crucial for the broader adoption of these advanced technologies. …”
    Get full text
    Article
  10. 1970

    The moderating role of personalized recommendations in the trust–satisfaction–loyalty relationship: an empirical study of AI-driven e-commerce by Noha Hassan, Mohamed Abdelraouf, Dina El-Shihy

    Published 2025-04-01
    “…Design/methodology/approach A quantitative research approach was used to collect data from a diverse group of e-commerce users who had interacted with AI-based recommendation systems. …”
    Get full text
    Article
  11. 1971

    A Review of Multimodal Interaction in Remote Education: Technologies, Applications, and Challenges by Yangmei Xie, Liuyi Yang, Miao Zhang, Sinan Chen, Jialong Li

    Published 2025-04-01
    “…Though multimodal communication may bring a historical improvement to the mode of online education, the platform still faces many issues, such as media synchronization, higher computational demand, physical adaptability, and privacy concerns. These problems demand further research in the fields of algorithm optimization, access to technology guidance, and the ethical use of big data. …”
    Get full text
    Article
  12. 1972

    Unleashing the Power of Wireless Communication in Healthcare by Empowering Patient Care and Connectivity: A Comprehensive Survey by Urvashi Chaudhary, Mohammad Furqan Ali, Ambrish Kumar, Abhishek Sharma, Dushantha K. Nalin Jayakody

    Published 2025-01-01
    “…These challenges and opportunities include data security and privacy issues, as well as the need for a robust communication infrastructure. …”
    Get full text
    Article
  13. 1973

    Assessing the transferability of BERT to patient safety: classifying multiple types of incident reports by Ying Wang, Farah Magrabi

    Published 2025-08-01
    “…For ambiguous medium and low severity levels, the F-score improvements ranged from 3.6% to 19.7% across all test datasets.Discussion Fine-tuned BERT led to improved performance, particularly in identifying rare classes and generalising effectively to unseen data, compared with small CNNs.Conclusion Fine-tuned BERT may be useful for classification tasks in patient safety where data privacy, scarcity and imbalance are common challenges.…”
    Get full text
    Article
  14. 1974

    Preferences and Willingness to Pay for Health App Assessments Among Health Care Stakeholders: Discrete Choice Experiment by Anna-Lena Frey, Simon Leigh, Carla Toro, Carme Pratdepàdua Bufill, Charles McCay, Tatjana Prenđa Trupec, Giuseppe D'Avenio, Menno Kok, Antanas Montvila, Philipp Goedecker, Petra Hoogendoorn

    Published 2025-05-01
    “… BackgroundThe adoption of high-quality health apps has been slow, despite the myriad benefits associated with their use. This is partly due to concerns regarding the effectiveness, safety, and data privacy of such apps. …”
    Get full text
    Article
  15. 1975

    DAMPAK PEMANFAATAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERILAKU PENGAMBILAN KEPUTUSAN TERHADAP ETIKA BISNIS DAN KEBERLANJUTAN ORGANISASI by Putu Ayu Diah Widari Putri, Nyoman Yudha Astriayu Widyari, Ida Ayu Komang Tiara Pratistha Sari

    Published 2025-06-01
    “…In an increasingly complex and competitive business era, AI has become a strategic tool that can increase the speed, accuracy, and objectivity of data-based decision-making. However, its use also poses significant ethical challenges, such as issues of transparency, algorithmic bias, accountability, and data privacy. …”
    Get full text
    Article
  16. 1976

    FedBFGCN: A Graph Federated Learning Framework Based on Balanced Channel Attention and Cross-Layer Feature Fusion Convolution by Hefei Wang, Ruichun Gu, Jingyu Wang, Xiaolin Zhang, Hui Wei

    Published 2025-01-01
    “…In addition, this framework also uses homomorphic encryption methods to enhance privacy protection and improve data security. …”
    Get full text
    Article
  17. 1977

    A Survey on Public Key Encryption with Keyword Search: Taxonomy and Methods by M.H. Noorallahzade, R. Alimoradi, A. Gholami

    Published 2022-01-01
    “…Given the many benefits that cloud computing brings, organizations tend to outsource most of their data to reduce a large portion of their costs, but concern about the privacy of data is a major obstacle to outsourcing sensitive data. …”
    Get full text
    Article
  18. 1978

    BERTinchamps: Cost-Effective In-House Training of Language Models in French by Amaury Fierens, Sébastien Jodogne

    Published 2024-12-01
    “…While training LMs directly inside an institution is desirable for leveraging local data and addressing data privacy concerns, this process demands a costly and complex computational infrastructure. …”
    Get full text
    Article
  19. 1979

    Advancements in artificial intelligence for atopic dermatitis: diagnosis, treatment, and patient management by Fang Cao, Yujie Yang, Cui Guo, Hui Zhang, Qianying Yu, Jing Guo

    Published 2025-12-01
    “…Despite challenges in data privacy and model transparency, the potential of artificial intelligence in advancing AD care is enormous, bringing the future to precision medicine and improving patient outcomes. …”
    Get full text
    Article
  20. 1980

    Analysis of Modernization Movements in Housing During the Early Republican Period: Karabük, Türkiye by Ayşe Merve Saraçoğlu Gezer, Ayşen Esra Bölükbaşı Ertürk

    Published 2025-04-01
    “…In this study, the idea that houses are not only structural products, but the structures that have become homes for humans, is approached and discussed through concepts such as spatial organization, relationality, accessibility, visibility, density of use, depth, privacy, and belonging. The Yenişehir district in Karabük province, which is thought to have been transformed into design by considering these concepts, also constitutes the focus area of the study idea in this sense. …”
    Get full text
    Article