Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
-
1841
A Cloud User Anomaly Detection Method Based on Mouse Behavior
Published 2019-08-01“… Aiming at the problem of cloud security threat caused by illegal operation of cloud users, this paper proposes a method to detect the abnormal behavior of cloud users by analyzing the mouse operation behavior in user’s work by using deep learning technology under the premise of ensuring the privacy of cloud users. …”
Get full text
Article -
1842
Digital health tools in juvenile idiopathic arthritis: a systematic literature review
Published 2025-05-01“…Tool development and validation processes were poorly or not at all described, and data regarding regulatory compliance, security, or privacy were scarce. …”
Get full text
Article -
1843
Embracing or rejecting AI? A mixed-method study on undergraduate students’ perceptions of artificial intelligence at a private university in China
Published 2025-02-01“…The findings revealed that students demonstrated moderate familiarity with AI tools, particularly ChatGPT and willingness to use them in coursework. Positive attitudes toward AI’s value in education were evident, although concerns such as dependence and reduced independent thinking, algorithmic bias and ethical concerns, accuracy and information quality, data security, and privacy concerns were observed among students. …”
Get full text
Article -
1844
Federated Learning-Based CNN Models for Orthodontic Skeletal Classification and Diagnosis
Published 2025-04-01“…The objective is to determine whether FL can achieve competitive performance while preserving data privacy and enabling collaborative model training across multiple institutions. …”
Get full text
Article -
1845
NNG-Based Secure Approximate k-Nearest Neighbor Query for Large Language Models
Published 2025-07-01“…Large language models (LLMs) have driven transformative progress in artificial intelligence, yet critical challenges persist in data management and privacy protection during model deployment and training. …”
Get full text
Article -
1846
Enabling Secure and Scalable GDPR-Compliant Blockchain-Based e-KYC With Efficient Redaction
Published 2025-01-01“…To address these gaps, we propose a novel blockchain-based e-KYC framework that is GDPR-compliant, privacy-preserving, and highly scalable. Our solution introduces three key innovations: 1) ZK-Rollup-based authentication integrated with sharded blockchain architecture, enabling off-chain proof batching and distributed verification across shards for high-throughput, low-latency validation; 2) adaptive proxy re-encryption to support secure and dynamic customer data portability between host and requesting FIs; and 3) an optimized redactable blockchain protocol using off-chain Chameleon Hash collision generation and threshold cryptography-based key rotation to enable efficient, secure, and verifiable data updates in compliance with GDPR. …”
Get full text
Article -
1847
A cryptosystem for face recognition based on optical interference and phase truncation theory
Published 2025-07-01“…Abstract Face recognition technology is increasingly prevalent, yet securing facial image data remains a critical challenge due to privacy risks. …”
Get full text
Article -
1848
The Prevalence and Predictors of Digital Proxy Behavior in the United States: Cross-Sectional Survey Study
Published 2025-08-01“…Although most proxies used formal access when available, a significant portion have used insecure, informal methods. …”
Get full text
Article -
1849
Predictors of client satisfaction with family planning services in Ethiopia: a systematic review and meta-analysis
Published 2025-01-01“…BackgroundThe use of modern contraceptives by married Ethiopian women has increased over the past 15 years. …”
Get full text
Article -
1850
From Centralization to Decentralization: Blockchain’s Role in Transforming Social Media Platforms
Published 2025-01-01“…Conventionally, social media systems are based on central architectures that may indirectly solve the problems of data privacy and platform responsibility since there are increased threats, including identity theft and fake news spread across such systems. …”
Get full text
Article -
1851
The potential of machine learning in diagnosing neurological and psychiatric diseases: a review
Published 2025-06-01“…However, certain challenges persist, including concerns about data quality, patient privacy and the ethical implications of algorithmic decisions. …”
Get full text
Article -
1852
Generalization challenges in video deepfake detection: methods, obstacles, and technological advances
Published 2025-01-01“…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
Get full text
Article -
1853
Role of artificial intelligence in human resource management for optimizing employee productivity
Published 2024-01-01“…Recruitments can be modernized by using catboats, predictive analysis helps in offering data-driven insights that can be used to find skill gaps and people management planning. …”
Get full text
Article -
1854
The Impact of Banking Digitalization on Customer Satisfaction and Loyalty in BPRs: Systematic Literature Review
Published 2025-07-01“…Conclusion: The study highlights that the main challenge in rural areas is resistance to digitalization due to low digital literacy and concerns over data privacy. It recommends that BPRs prioritize digital literacy programs, ensure system transparency and security, and combine physical and digital services. …”
Get full text
Article -
1855
Electronic medical records sharing solution based on Hyperledger Fabric
Published 2024-10-01“…Simultaneously, parties involved in secret sharing collaborate to recover keys and decrypt the records.The document comprehensively discusses the security aspects of this solution, ensuring that EMR can withstand various attacks during storage and sharing, thus guaranteeing data integrity and privacy. Compared to other secret sharing schemes, this solution demonstrates better theoretical time complexity, providing an efficient and reliable solution for secure storage and multi-party sharing of EMR.…”
Get full text
Article -
1856
Personalized Mobile Health for Elderly Home Care: A Systematic Review of Benefits and Challenges
Published 2023-01-01“…The results indicated that 25% of the challenges were related to privacy, cybersecurity, and data ownership (10%), technology (7.5%), and implementation (7.5%). …”
Get full text
Article -
1857
E-HAILING SERVICES IN MALAYSIAâ€: A SNAPSHOT OF LEGAL ISSUES AND RISKS
Published 2024-01-01“…The data were structured using theme analysis to generate a discussion narrative regarding e-hailing services in Malaysia, taking into consideration multiple viewpoints on the regulatory framework, legal concerns, and risks of this industry. …”
Get full text
Article -
1858
Reinventing Cybersecurity Internships During the COVID-19 Pandemic
Published 2023-01-01“…The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. …”
Get full text
Article -
1859
Generalization challenges in video deepfake detection: methods, obstacles, and technological advances
Published 2025-01-01“…However, its widespread use and decreasing costs pose serious threats to personal privacy and social trust. …”
Get full text
Article -
1860
Learning Sensor Based Risk Map Augmentation for Risk Aware UAS Operation
Published 2023-05-01“…This paper presents an approach to risk map augmentation that uses learned risk identification from aerial pictures to fuse additional information with prior data into a dynamically changing risk map that allows effective re-planning of navigation strategies.…”
Get full text
Article