Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
-
901
SHARE: An ethical framework for equitable data sharing in Caribbean health research
Published 2024-12-01“…Using the SHARE framework can support regionally relevant and culturally responsive work already underway in the region and further develop capacity for intentional sharing and (re)use of Caribbean health data.…”
Get full text
Article -
902
Generating and evaluating synthetic data in digital pathology through diffusion models
Published 2024-11-01“…Abstract Synthetic data is becoming a valuable tool for computational pathologists, aiding in tasks like data augmentation and addressing data scarcity and privacy. …”
Get full text
Article -
903
Establishing A Personal Data Protection Agency for E-Commerce in Indonesia
Published 2024-12-01“… The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
Get full text
Article -
904
A Data-Driven Approach for Generating Synthetic Load Profiles with GANs
Published 2025-07-01“…The generation of realistic electrical load profiles is essential for advancing smart grid analytics, demand forecasting, and privacy-preserving data sharing. Traditional approaches often rely on large, high-resolution datasets and complex recurrent neural architectures, which can be unstable or ineffective when training data are limited. …”
Get full text
Article -
905
Dynamic Ensemble Selection for EEG Signal Classification in Distributed Data Environments
Published 2025-05-01“…This study presents a novel approach to EEG signal classification in distributed environments using dynamic ensemble selection. In scenarios where data dispersion arises due to privacy constraints or decentralized data collection, traditional global modelling is impractical. …”
Get full text
Article -
906
Comprehensive testing of large language models for extraction of structured data in pathology
Published 2025-03-01“…While recent studies show promise in using advanced language models for structuring pathology data, they primarily rely on proprietary models, raising cost and privacy concerns. …”
Get full text
Article -
907
A Web-Based Application for Smart City Data Analysis and Visualization
Published 2025-05-01“…Smart cities are urban areas that use contemporary technology to improve citizens’ overall quality of life. …”
Get full text
Article -
908
Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges
Published 2017-01-01“…However, such data are not useful without analytic power. Numerous big data, IoT, and analytics solutions have enabled people to obtain valuable insight into large data generated by IoT devices. …”
Get full text
Article -
909
Blockchain and NFT-Based Solution for Genomic Data Management, Sharing, and Monetization
Published 2025-01-01“…In this paper, we propose a blockchain and NFT-based solution that addresses the challenges of managing, sharing, and monetizing genomic data while preserving privacy using Threshold Cryptography and Fully Homomorphic Encryption (FHE). …”
Get full text
Article -
910
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. …”
Get full text
Article -
911
Efficient unpaired data validation and aggregation protocol in industrial Internet of things
Published 2024-10-01“…Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. …”
Get full text
Article -
912
A COMPREHENSIVE REVIEW OF GENERATIVE ARTIFICIAL INTELLIGENCE APPLICATIONS IN DATA VISUALIZATION
Published 2025-06-01“…Using natural language to generate visual representations of data (NL2VIS) is emerging as a promising research direction, driven by the rapid development of Generative AI (GenAI). …”
Get full text
Article -
913
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
Published 2021-05-01“…Mobile Cloud Computing (MCC) allows users more possibilities to access services conveniently. But data security and privacy issues still act as barriers for adoption to cloud technology when dealing with confidential data. …”
Get full text
Article -
914
A Remedy for Heterogeneous Data: Clustered Federated Learning with Gradient Trajectory
Published 2024-12-01“…Federated Learning (FL) has recently attracted a lot of attention due to its ability to train a machine learning model using data from multiple clients without divulging their privacy. …”
Get full text
Article -
915
Trusted access control mechanism for data with blockchain-assisted attribute encryption
Published 2025-06-01“…Ciphertext policy attribute-based encryption (CP-ABE) model is widely used in cloud data sharing scenarios, but there are problems such as privacy leakage of access policy, irrevocability of user or attribute, key escrow, and trust bottleneck. …”
Get full text
Article -
916
An Artificial Intelligence Pipeline for Hepatocellular Carcinoma: From Data to Treatment Recommendations
Published 2025-07-01“…However, challenges such as data quality, standardization, and privacy remain. …”
Get full text
Article -
917
Critical Factors in Young People’s Use and Non-Use of AI Technology for Emotion Regulation: A Pilot Study
Published 2025-07-01“…Data were collected through semi-structured face-to-face interviews and were analysed using NVivo 11 software. …”
Get full text
Article -
918
Securing the metaverse: Machine learning–based perspectives on risk, trust, and governance
Published 2025-12-01“…The rapid expansion of the metaverse presents significant cybersecurity and privacy challenges, requiring structured, data-driven analysis. …”
Get full text
Article -
919
New frontiers in migration statistics: a narrative review on big data’s role
Published 2025-08-01“…However, its use remains largely experimental, with key concerns around data access, representativeness, privacy, and the integration with official statistics. …”
Get full text
Article -
920
The impact of zero-knowledge proofs on data minimisation compliance of digital identity wallets
Published 2025-07-01“…Technically, these attestations involve auxiliary information to ensure their verifiability, leading to the generation, processing, and storage of more than just personal data. In particular, this auxiliary information contains globally unique information that can be misused as personal identifiers and poses risks to the privacy of individuals engaging in transactions using a European Digital Identity Wallet. …”
Get full text
Article