Suggested Topics within your search.
Suggested Topics within your search.
-
21
Privacy-Preserving Data Sharing in Telehealth Services
Published 2024-11-01“…Telehealth services, while providing immense benefits in terms of accessibility and efficiency, introduce complex challenges in maintaining data privacy and security. This paper proposes a privacy-preserving framework for secure data sharing within telehealth services, employing blockchain technology and advanced cryptographic techniques. …”
Get full text
Article -
22
Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN
Published 2024-11-01“…This study proposes a privacy-preserving synthetic data generation method using a conditional tabular generative adversarial network (CTGAN) aimed at maintaining the utility of IoT sensor network data for IDS while safeguarding privacy. …”
Get full text
Article -
23
Disease prevention versus data privacy: using landcover maps to inform spatial epidemic models.
Published 2012-01-01Get full text
Article -
24
Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations
Published 2022-03-01“…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
Get full text
Article -
25
Unpacking Youth Privacy Management in AI Systems: A Privacy Calculus Model Analysis
Published 2025-01-01“…The increasing use of Artificial Intelligence (AI) in daily life has introduced substantial issues in protecting user privacy, particularly for young digital citizens. …”
Get full text
Article -
26
Blockchain-enabled data governance for privacy-preserved sharing of confidential data
Published 2024-12-01“…Our novel ABE encryption system supports multi-authority use cases while hiding access policy and ensuring identity privacy, which also protects data sharing against corrupt authorities. …”
Get full text
Article -
27
Combining observational and experimental data for causal inference considering data privacy
Published 2025-03-01“…However, many observational datasets cannot be released due to data privacy considerations, so one researcher may not have access to both experimental and observational data. …”
Get full text
Article -
28
Exploring the association between cultural values and the intention to use digital data wallets
Published 2025-12-01“…We developed a model to examine the intention to use digital data wallets – new privacy-enhancing tools based on the privacy calculus theory and Hofstede's cultural values. …”
Get full text
Article -
29
Enhancing privacy in IoT-based healthcare using provable partitioned secure blockchain principle and encryption
Published 2025-08-01“…Data sharing is a significant concern in healthcare because of privacy leakage and security issues. …”
Get full text
Article -
30
Perturbation based privacy preservation and classification using Jaya Algorithm and Dragonfly Inspired Algorithm
Published 2025-06-01“…That is why, privacy preservation of data for healthcare dataset is a significant consideration. …”
Get full text
Article -
31
Privacy in the Internet: Myth or reality
Published 2016-01-01“…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
Get full text
Article -
32
Doubly Structured Data Synthesis for Time-Series Energy-Use Data
Published 2024-12-01Subjects: Get full text
Article -
33
Synthetic data for privacy-preserving clinical risk prediction
Published 2024-10-01“…Compared with other privacy-enhancing approaches—such as federated learning—analyses performed on synthetic data can be applied downstream without modification, such that synthetic data can act in place of real data for a wide range of use cases. …”
Get full text
Article -
34
DPLQ: Location‐based service privacy protection scheme based on differential privacy
Published 2021-11-01Get full text
Article -
35
Privacy protection method on time-series data publication
Published 2015-11-01“…A differential privacy model was proposed based on the sampling filtering and the mechanism of evaluation.Firstly,fixed sampling method was used to sample the original data and the non-sampling data be published directly.Secondly,for the sampling date,utilize the differential privacy mechanism to add the noise.Then,use Kalman to correct the sampling date.Finally,use the mutual information to evaluate data under different sampling intervals.Through the experiment,it is proved that the mechanism can achieve a good balance between the practicality and protective.…”
Get full text
Article -
36
Research on data integration privacy preservation mechanism for DaaS
Published 2016-04-01“…In addition, the corres ding fake data set was used to assure the balanced distribution of data in each part, which realized privacy protection of data integration. …”
Get full text
Article -
37
Survey of artificial intelligence data security and privacy protection
Published 2021-02-01“…Artificial intelligence and deep learning algorithms are developing rapidly.These emerging techniques have been widely used in audio and video recognition, natural language processing and other fields.However, in recent years, researchers have found that there are many security risks in the current mainstream artificial intelligence model, and these problems will limit the development of AI.Therefore, the data security and privacy protection was studied in AI.For data and privacy leakage, the model output based and model update based problem of data leakage were studied.In the model output based problem of data leakage, the principles and research status of model extraction attack, model inversion attack and membership inference attack were discussed.In the model update based problem of data leakage, how attackers steal private data in the process of distributed training was discussed.For data and privacy protection, three kinds of defense methods, namely model structure defense, information confusion defense and query control defense were studied.In summarize, the theoretical foundations, classic algorithms of data inference attack techniques were introduced.A few research efforts on the defense techniques were described in order to provoke further research efforts in this critical area.…”
Get full text
Article -
38
Privacy guarantees for personal mobility data in humanitarian response
Published 2024-11-01“…Specifically, we (1) introduce an algorithm for constructing differentially private mobility matrices and derive privacy and accuracy bounds on this algorithm; (2) use real-world data from mobile phone operators in Afghanistan and Rwanda to show how this algorithm can enable the use of private mobility data in two high-stakes policy decisions: pandemic response and the distribution of humanitarian aid; and (3) discuss practical decisions that need to be made when implementing this approach, such as how to optimally balance privacy and accuracy. …”
Get full text
Article -
39
Secure data sharing technology of medical privacy data in the Web 3.0
Published 2024-12-01“…Finally, data users apply to multiple parties for joint secure computing to obtain the use of private data. …”
Get full text
Article -
40
A Review of Differential Privacy in Individual Data Release
Published 2015-10-01“…The rapid development of mobile technology has improved users' quality of treatment, and tremendous amounts of medical information are readily available and widely used in data analysis and application, which bring on serious threats to users' privacy. …”
Get full text
Article