Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
661
Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR) System
Published 2011-01-01“…The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. …”
Get full text
Article -
662
PLASMA-Privacy-Preserved Lightweight and Secure Multi-level Authentication scheme for IoMT-based smart healthcare
Published 2025-04-01“…PLASMA’s security and key privacy are validated through the Real-Or-Random (ROR) model and simulated using the widely accepted Scyther tool. …”
Get full text
Article -
663
Leveraging Complex-Valued Federated Learning for Accurate and Privacy-Respectful Threat Detection Based on Millimeter-Wave Imaging
Published 2025-01-01“…This approach provides a highly accurate and privacy-preserving solution for CO detection using high-resolution MMW radar. …”
Get full text
Article -
664
Smart Grid IoT Framework for Predicting Energy Consumption Using Federated Learning Homomorphic Encryption
Published 2025-06-01“…Homomorphic Encryption (HE) introduces new dimensions of security and privacy within federated learning (FL) and internet of things (IoT) frameworks that allow preservation of user privacy when handling data for FL occurring in Smart Grid (SG) technologies. …”
Get full text
Article -
665
-
666
Privacy-Preserving Federated Learning in Healthcare, E-Commerce, and Finance: A Taxonomy of Security Threats and Mitigation Strategies
Published 2025-01-01“…Federated Learning (FL) transformed decentralized machine learning by allowing joint model training without mutually sharing raw data, hence being especially useful in privacy-sensitive applications like healthcare, e-commerce, and finance. …”
Get full text
Article -
667
Investigating the Relationship between Social Skills and Social Acceptance with Academic Performance, Considering the Mediating Role of Ethical Privacy
Published 2025-05-01“…Four standard questionnaires of social skills, social acceptance, respect for moral privacy, and academic performance were used for gathering data. …”
Get full text
Article -
668
Harnessing Artificial Intelligence to Transform Education: Challenges and Opportunities
Published 2025-06-01“…These include worries about algorithmic unfairness, data privacy, and teachers’ or students’ resistance to using AI-based solutions. …”
Get full text
Article -
669
Evaluation of privacy protection methods of public service advertising visual design in the perspective of artificial intelligence internet of things.
Published 2024-01-01“…Researching the privacy protection method of public service advertising visual design is of great significance to protecting the privacy data security of public service advertising visual designers and the personal privacy of other citizens. …”
Get full text
Article -
670
Optimizing malicious website prediction: An advanced XGBoost-based machine learning model
Published 2025-05-01Get full text
Article -
671
Federated Deep Learning for Scalable and Privacy-Preserving Distributed Denial-of-Service Attack Detection in Internet of Things Networks
Published 2025-02-01“…ResNet improves feature extraction, VGGNet optimises feature refining, and Swin-Transformer captures contextual dependencies, making the model sensitive to complicated attack patterns across varied network circumstances. Using the FL framework, decentralised training protects data privacy and scales and adapts across diverse IoT contexts. …”
Get full text
Article -
672
Online fashion consumerism among women: The interplay of digital experiences and decision-making – a mediated moderated analysis
Published 2024-12-01“…However, challenges like concerns over data privacy and difficulties in verifying review authenticity negatively affect the attitude-behavior relationship, with a moderating effect of β = -0.092. …”
Get full text
Article -
673
Federated Learning for Surface Roughness
Published 2025-06-01“…This study proposes a federated learning-based real-time surface roughness prediction framework for WEDM to address issues of empirical parameter tuning and data privacy. By sharing only the model parameters, cross-machine training was enabled without exposing raw data. …”
Get full text
Article -
674
Self-monitoring of health - user viewpoints on gathering data using consumer health technologies during leisure time
Published 2025-06-01“…It focuses on attitudes toward health data collection, data sharing, privacy concerns, and the use of EEG-supported devices.ResultsFindings reveal a complex landscape of trust and concern. …”
Get full text
Article -
675
Using big data analytics to improve HIV medical care utilisation in South Carolina: A study protocol
Published 2019-07-01“…The RFA is authorised to collect and merge data from these different sources and to ensure the privacy of all PLWH. …”
Get full text
Article -
676
Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing
Published 2023-03-01“…Secondly, the user's privacy may be adequately protected with a secure authentication paradigm that employs ABS to safeguard the user's private data. …”
Get full text
Article -
677
-
678
Using Large Language Models to Automate Data Extraction From Surgical Pathology Reports: Retrospective Cohort Study
Published 2025-04-01“…However, the use of LLMs in the health care setting is limited by cost, computing power, and patient privacy concerns. …”
Get full text
Article -
679
QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles
Published 2019-07-01“…To guarantee secure data transmission in Internet of vehicles, the batch validation technique is used to address data integrity. …”
Get full text
Article -
680
Achieving local differential location privacy protection in 3D space via Hilbert encoding and optimized random response
Published 2024-07-01“…The widespread use of spatial location-based services not only provides considerable convenience, but also exposes the downsides of location privacy leakage. …”
Get full text
Article