Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 921 - 940 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.24s Refine Results
  1. 921

    A Continuous Authentication Approach for Mobile Crowdsourcing Based on Federated Learning by Mohamad Wazzeh, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Mohsen Guizani

    Published 2024-01-01
    “…With the widespread use of smartphones and wearable devices, Mobile Crowdsourcing (MCS) has become a powerful method for gathering and processing data from various users. …”
    Get full text
    Article
  2. 922

    Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm by Hao Wu, Jiulun Fan, Jianhua Liu, Junsheng Zhang

    Published 2014-11-01
    “…Cloud storage is an effective solution to the storage performance bottleneck, but it also gives rise to problems of data security and privacy protection. In order to solve this problem, a cloud storage data protection mechanism based on a fingerprint cube algorithm was developed. …”
    Get full text
    Article
  3. 923

    Full Data-Processing Power Load Forecasting Based on Vertical Federated Learning by Zhengxiong Mao, Hui Li, Zuyuan Huang, Yuan Tian, Peng Zhao, Yanan Li

    Published 2023-01-01
    “…To address it, according to the procedure in a practical scenario, we propose a vertical FL XGBoost-based PLF, where multiparty secure computation is used to enhance the privacy protection of FL. Concretely, we design a full data-processing PLF, including data cleaning, private set intersection, feature selection, federated XGBoost training, and inference. …”
    Get full text
    Article
  4. 924

    Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm by Hao Wu, Jiulun Fan, Jianhua Liu, Junsheng Zhang

    Published 2014-11-01
    “…Cloud storage is an effective solution to the storage performance bottleneck, but it also gives rise to problems of data security and privacy protection. In order to solve this problem, a cloud storage data protection mechanism based on a fingerprint cube algorithm was developed. …”
    Get full text
    Article
  5. 925

    Insights into gender-equity in healthcare accessibility in northern Nigeria: descriptive and predictive approaches by Chika Yinka-Banjo, Olasupo Ajayi, Mary Akinyemi, David Tresner-Kirsch, Adekemi Omotubora

    Published 2025-07-01
    “…All respondents were required to accept these terms and conditions before being allowed to participate in the data collection exercise. • Data were collected using askNivi, an app specifically designed for healthcare related data collection. …”
    Get full text
    Article
  6. 926

    C-mixture and multi-constraints based genetic algorithm for collaborative data publishing by Yogesh R. Kulkarni, T. Senthil Murugan

    Published 2018-04-01
    “…In order to apply the proposed privacy measure to privacy preserving data publishing, a new algorithm called, CPGEN is developed using genetic algorithm and multi-objective constraints. …”
    Get full text
    Article
  7. 927

    Passive Indoor People Counting by Bluetooth Signal Deformation Analysis with Deep Learning by Giancarlo Iannizzotto, Lucia Lo Bello, Andrea Nucita

    Published 2025-05-01
    “…Notably, in the regression setup, the model can generalize to occupancy values not present in the fine-tuning dataset, requiring only a few minutes of calibration data to adapt to a new environment. We believe that this approach offers a valuable solution for real-time people counting in critical environments such as laboratories, clinics, or hospitals, where preserving privacy may limit the use of camera-based systems. …”
    Get full text
    Article
  8. 928

    A novel ε-sensitive correlation indistinguishable scheme for publishing location data. by Wang Bin, Zhang Lei, Zhang Guoyin

    Published 2019-01-01
    “…So the published data had to be disposed to protect the privacy. In order to cope with this problem, a number of algorithms based on the strategy of k-anonymity were proposed, but this is not enough for the privacy protection, as the correlation between the sensitive region and the background knowledge can be used to infer the real location. …”
    Get full text
    Article
  9. 929

    To be or not to be, when synthetic data meet clinical pharmacology: A focused study on pharmacogenetics by Jean‐Baptiste Woillard, Clément Benoist, Alexandre Destere, Marc Labriffe, Giulia Marchello, Julie Josse, Pierre Marquet

    Published 2025-01-01
    “…Abstract The use of synthetic data in pharmacology research has gained significant attention due to its potential to address privacy concerns and promote open science. …”
    Get full text
    Article
  10. 930

    The issue of credibility between customers’ perceptions and the attitude toward Facebook advertising by Jassim Al-Gasawneh, Abdullah AlSokkar, Mahmoud Alghizzawi, Tahreer Abu Hmeidan, Deemah Alarabiat, Ahmed Alamro

    Published 2025-08-01
    “…Type of the article: Research Article AbstractAmong marketing professionals, the use of Social Networking Sites (SNSs) as a platform for advertising is on the rise, despite ongoing concerns regarding credibility and trust in privacy related to advertising on these sites. …”
    Get full text
    Article
  11. 931

    Research on the security of national secret algorithm based compute first networking by Jie PAN, Lan YE, Pengfei ZHANG, Zhonggui BU

    Published 2023-08-01
    “…With the promotion of national secret algorithm, in-depth research on the arithmetic network was carried out, a more efficient and reasonable security scheme for the arithmetic network was proposed, ensuring the data security and privacy of the arithmetic network with the help of the state secret algorithm.The main elements of the design program included: Supporting arithmetic demand and cryptographic invocation through the underlying resources, the arithmetic orchestration layer provided the ability to orchestrate data arithmetic, meanwhile, the arithmetic scheduling layer intelligently discerned the optimal nodes for arithmetic resource scheduling and allocation; the cryptographic reinforcement layer used the national secret algorithm based on hardware support with the help of public key cryptosystem, hash function, digital envelope, homomorphic encryption, blockchain and other technologies.Focusing on arithmetic network access security, transmission security, data security and privacy protection aspects of security implementation.An architecture and application form was innovatively proposed to guarantee the data security of the arithmetic network, which could meet the needs of the application layer arithmetic in the scenarios of big data, intelligent technology, etc..The security of the arithmetic network is enhanced by empowering the arithmetic network through the state-secret algorithm.…”
    Get full text
    Article
  12. 932

    Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing by Thinh Le Vinh, Huan Thien Tran, Samia Bouzefrane

    Published 2025-01-01
    “…Consequently, PTA-HE provides a highly effective and practical solution for secure mobile computing applications requiring stringent assurances of data privacy and integrity.…”
    Get full text
    Article
  13. 933

    Sharing traumatic stress research data: assessing and reducing the risk of re-identification by Nancy Kassam-Adams, Kristi Thompson, Marit Sijbrandij, Grete Dyb

    Published 2025-12-01
    “…Background: FAIR Data practices support data sharing and re-use and are essential for advancing science and practice to benefit individuals, families, and communities affected by trauma. …”
    Get full text
    Article
  14. 934
  15. 935

    CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain by Jiahui Jiang, Tingrui Pei, Jiahao Chen, Zhiwen Hou

    Published 2025-05-01
    “…This method simplifies device resource access by minimizing middleware confirmation, double-checking device access rights, and preventing redundant requests caused by illegal access attempts. Finally, in terms of data privacy and security, IPFS is used to store confidential data. …”
    Get full text
    Article
  16. 936

    The application of distributed autonomous organization governance mechanisms to civic medical data management by James Cunningham, Nigel Davies, Sarah Devaney, Søren Holm, Mike Harding, Victoria Neumann, John Ainsworth

    Published 2024-12-01
    “…The mechanisms employed by DAOs has the potential to be generalized beyond their core financial domain to a wide range of use cases. In the medical field the use of blockchain and DAOs can provide secure and transparent access to medical data, while ensuring patient privacy. …”
    Get full text
    Article
  17. 937

    Membership inference attack and defense method in federated learning based on GAN by Jiale ZHANG, Chengcheng ZHU, Xiaobing SUN, Bing CHEN

    Published 2023-05-01
    “…Aiming at the problem that the federated learning system was extremely vulnerable to membership inference attacks initiated by malicious parties in the prediction stage, and the existing defense methods were difficult to achieve a balance between privacy protection and model loss.Membership inference attacks and their defense methods were explored in the context of federated learning.Firstly, two membership inference attack methods called class-level attack and user-level attack based on generative adversarial network (GAN) were proposed, where the former was aimed at leaking the training data privacy of all participants, while the latter could specify a specific participant.In addition, a membership inference defense method in federated learning based on adversarial sample (DefMIA) was further proposed, which could effectively defend against membership inference attacks by designing adversarial sample noise addition methods for global model parameters while ensuring the accuracy of federated learning.The experimental results show that class-level and user-level membership inference attack can achieve over 90% attack accuracy in federated learning, while after using the DefMIA method, their attack accuracy is significantly reduced, approaching random guessing (50%).…”
    Get full text
    Article
  18. 938

    Islam, Big Data, and Digital Ethics: Challenges in Religious Life in the Digital Age by Agung Saputra, Erni Asneli Asbi

    Published 2025-08-01
    “…These technologies offer opportunities to enhance the efficiency of religious practices, such as prayer reminders, Quran recitation, and zakat distribution, but they also present ethical challenges related to privacy, data misuse, and the erosion of deep spiritual experiences. …”
    Get full text
    Article
  19. 939

    PCGOD: Enhancing Object Detection With Synthetic Data for Scarce and Sensitive Computer Vision Tasks by Walid Remmas, Martin Lints, Jaak Joonas Uudmae

    Published 2025-01-01
    “…Object detection models rely on large-scale, high-quality annotated datasets, which are often expensive, scarce, or restricted due to privacy concerns. Synthetic data generation has emerged as an alternative, yet existing approaches have limitations: generative models lack structured annotations and precise spatial control, while game-engine-based datasets suffer from inaccuracies due to 3D bounding box projections, limited scene diversity, and poor handling of articulated objects. …”
    Get full text
    Article
  20. 940

    Examining the impact of environmental product innovation on perceived brand value considering the mediating role of ethical- aspects in the home appliance industry by Hamidreza Talaie

    Published 2025-02-01
    “…In this study, a convenience sampling method was used. To collect data, a standardized questionnaire was used, whose validity was confirmed by calculating content, convergent, and divergent validity, and its reliability was confirmed through the Cronbach's alpha index. …”
    Get full text
    Article