Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 1,841 - 1,860 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.19s Refine Results
  1. 1841

    A Cloud User Anomaly Detection Method Based on Mouse Behavior by XU Hong-jun, ZHANG Hong, HE Wei

    Published 2019-08-01
    “… Aiming at the problem of cloud security threat caused by illegal operation of cloud users, this paper proposes a method to detect the abnormal behavior of cloud users by analyzing the mouse operation behavior in user’s work by using deep learning technology under the premise of ensuring the privacy of cloud users. …”
    Get full text
    Article
  2. 1842

    Digital health tools in juvenile idiopathic arthritis: a systematic literature review by Jordi Anton, María Montoro, Estíbaliz Loza, Teresa Otón, Susan Ramirez, Diego Benavent

    Published 2025-05-01
    “…Tool development and validation processes were poorly or not at all described, and data regarding regulatory compliance, security, or privacy were scarce. …”
    Get full text
    Article
  3. 1843

    Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China by Yifu Li, Nilo Jayoma Castulo, Xiaoyuan Xu, Xiaoyuan Xu

    Published 2025-02-01
    “…The findings revealed that students demonstrated moderate familiarity with AI tools, particularly ChatGPT and willingness to use them in coursework. Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
    Get full text
    Article
  4. 1844

    Federated Learning-Based CNN Models for Orthodontic Skeletal Classification and Diagnosis by Demet Süer Tümen, Mehmet Nergiz

    Published 2025-04-01
    “…The objective is to determine whether FL can achieve competitive performance while preserving data privacy and enabling collaborative model training across multiple institutions. …”
    Get full text
    Article
  5. 1845

    NNG-Based Secure Approximate k-Nearest Neighbor Query for Large Language Models by Heng Zhou, Yuchao Wang, Yi Qiao, Jin Huang

    Published 2025-07-01
    “…Large language models (LLMs) have driven transformative progress in artificial intelligence, yet critical challenges persist in data management and privacy protection during model deployment and training. …”
    Get full text
    Article
  6. 1846

    Enabling Secure and Scalable GDPR-Compliant Blockchain-Based e-KYC With Efficient Redaction by Somchart Fugkeaw, Surabordin Sungchai, Supawit Nakprame, Piphattra Sreekongpan

    Published 2025-01-01
    “…To address these gaps, we propose a novel blockchain-based e-KYC framework that is GDPR-compliant, privacy-preserving, and highly scalable. Our solution introduces three key innovations: 1) ZK-Rollup-based authentication integrated with sharded blockchain architecture, enabling off-chain proof batching and distributed verification across shards for high-throughput, low-latency validation; 2) adaptive proxy re-encryption to support secure and dynamic customer data portability between host and requesting FIs; and 3) an optimized redactable blockchain protocol using off-chain Chameleon Hash collision generation and threshold cryptography-based key rotation to enable efficient, secure, and verifiable data updates in compliance with GDPR. …”
    Get full text
    Article
  7. 1847

    A cryptosystem for face recognition based on optical interference and phase truncation theory by Yuan Guo, Ping Zhai, Debao Jia, Wenpeng Li

    Published 2025-07-01
    “…Abstract Face recognition technology is increasingly prevalent, yet securing facial image data remains a critical challenge due to privacy risks. …”
    Get full text
    Article
  8. 1848

    The Prevalence and Predictors of Digital Proxy Behavior in the United States: Cross-Sectional Survey Study by Pin Sym Foong, Camellia Zakaria, Pavithren Pakianathan, Andrew Ian-Hong Phua, Gerald CH Koh

    Published 2025-08-01
    “…Although most proxies used formal access when available, a significant portion have used insecure, informal methods. …”
    Get full text
    Article
  9. 1849

    Predictors of client satisfaction with family planning services in Ethiopia: a systematic review and meta-analysis by Yeshiwas Ayale Ferede, Worku Chekol Tassew, Agerie Mengistie Zeleke

    Published 2025-01-01
    “…BackgroundThe use of modern contraceptives by married Ethiopian women has increased over the past 15 years. …”
    Get full text
    Article
  10. 1850

    From Centralization to Decentralization: Blockchain’s Role in Transforming Social Media Platforms by Bidita Sarkar Diba, Jayonto Dutta Plabon, Nishat Tasnim, Mehjabin Hossain, Durjoy Mistry, Sourav Sarker, M. F. Mridha, Yuichi Okuyama, Jungpil Shin

    Published 2025-01-01
    “…Conventionally, social media systems are based on central architectures that may indirectly solve the problems of data privacy and platform responsibility since there are increased threats, including identity theft and fake news spread across such systems. …”
    Get full text
    Article
  11. 1851

    The potential of machine learning in diagnosing neurological and psychiatric diseases: a review by Claudia Ricetti, Luca Carrara, Davide La Torre

    Published 2025-06-01
    “…However, certain challenges persist, including concerns about data quality, patient privacy and the ethical implications of algorithmic decisions. …”
    Get full text
    Article
  12. 1852

    Generalization challenges in video deepfake detection: methods, obstacles, and technological advances by LI Junjie, WANG Jianzong, ZHANG Xulong, QU Xiaoyang

    Published 2025-01-01
    “…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
    Get full text
    Article
  13. 1853

    Role of artificial intelligence in human resource management for optimizing employee productivity by Veshne Nupur, Jamnani Jyoti

    Published 2024-01-01
    “…Recruitments can be modernized by using catboats, predictive analysis helps in offering data-driven insights that can be used to find skill gaps and people management planning. …”
    Get full text
    Article
  14. 1854

    The Impact of Banking Digitalization on Customer Satisfaction and Loyalty in BPRs: Systematic Literature Review by Maulana Yusup

    Published 2025-07-01
    “…Conclusion: The study highlights that the main challenge in rural areas is resistance to digitalization due to low digital literacy and concerns over data privacy. It recommends that BPRs prioritize digital literacy programs, ensure system transparency and security, and combine physical and digital services. …”
    Get full text
    Article
  15. 1855

    Electronic medical records sharing solution based on Hyperledger Fabric by CHEN Jiali, MA Ziqiang, MIAO Li, LI Bingyu, YUE Xiaolin

    Published 2024-10-01
    “…Simultaneously, parties involved in secret sharing collaborate to recover keys and decrypt the records.The document comprehensively discusses the security aspects of this solution, ensuring that EMR can withstand various attacks during storage and sharing, thus guaranteeing data integrity and privacy. Compared to other secret sharing schemes, this solution demonstrates better theoretical time complexity, providing an efficient and reliable solution for secure storage and multi-party sharing of EMR.…”
    Get full text
    Article
  16. 1856

    Personalized Mobile Health for Elderly Home Care: A Systematic Review of Benefits and Challenges by Shahrbanoo Pahlevanynejad, Sharareh R. Niakan Kalhori, Meysam Rahmani Katigari, Rahil Hosseini Eshpala

    Published 2023-01-01
    “…The results indicated that 25% of the challenges were related to privacy, cybersecurity, and data ownership (10%), technology (7.5%), and implementation (7.5%). …”
    Get full text
    Article
  17. 1857

    E-HAILING SERVICES IN MALAYSIAâ€: A SNAPSHOT OF LEGAL ISSUES AND RISKS

    Published 2024-01-01
    “…The data were structured using theme analysis to generate a discussion narrative regarding e-hailing services in Malaysia, taking into consideration multiple viewpoints on the regulatory framework, legal concerns, and risks of this industry. …”
    Get full text
    Article
  18. 1858

    Reinventing Cybersecurity Internships During the COVID-19 Pandemic by Lori L. Sussman

    Published 2023-01-01
    “…The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. …”
    Get full text
    Article
  19. 1859

    Generalization challenges in video deepfake detection: methods, obstacles, and technological advances by LI Junjie, WANG Jianzong, ZHANG Xulong, QU Xiaoyang

    Published 2025-01-01
    “…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
    Get full text
    Article
  20. 1860

    Learning Sensor Based Risk Map Augmentation for Risk Aware UAS Operation by Bhaskar Trivedi, Manfred Huber

    Published 2023-05-01
    “…This paper presents an approach to risk map augmentation that uses learned risk identification from aerial pictures to fuse additional information with prior data into a dynamically changing risk map that allows effective re-planning of navigation strategies.…”
    Get full text
    Article