Showing 2,261 - 2,280 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.14s Refine Results
  1. 2261

    FedArtML: A Tool to Facilitate the Generation of Non-IID Datasets in a Controlled Way to Support Federated Learning Research by Daniel Mauricio Jimenez Gutierrez, Aris Anagnostopoulos, Ioannis Chatzigiannakis, Andrea Vitaletti

    Published 2024-01-01
    “…Federated Learning (FL) enables collaborative training of Machine Learning (ML) models across decentralized clients while preserving data privacy. One of the challenges that FL faces is when the clients’ data is not independent and identically distributed (non-IID). …”
    Get full text
    Article
  2. 2262

    The Impact of Artificial Intelligence (AI) on Students’ Academic Development by Aniella Mihaela Vieriu, Gabriel Petrea

    Published 2025-03-01
    “…However, challenges such as over-reliance on AI, diminished critical thinking skills, data privacy risks, and academic dishonesty were also identified. …”
    Get full text
    Article
  3. 2263

    An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs by T. Sudhakar, R. Praveen, V. Natarajan

    Published 2025-03-01
    “…Ensuring integrity and privacy of data while transmitting it from sensors to the data analytics servers is crucial in open network. …”
    Get full text
    Article
  4. 2264

    Efficient Elliptic-Curve-Cryptography-Based Anonymous Authentication for Internet of Things: Tailored Protocols for Periodic and Remote Control Traffic Patterns by Shunfang Hu, Yuanyuan Zhang, Yanru Guo, Yanru Chen, Liangyin Chen

    Published 2025-02-01
    “…IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. …”
    Get full text
    Article
  5. 2265

    Ethical Challenges of Applying Advanced Technologies in Medical Education: A Scoping Review by Shayan Khaje Hosaini, Mahdi Khayatan, Hossein Sadeghi, Feze Ebrahimi

    Published 2025-02-01
    “…The results showed that the most important common ethical challenges in modern technologies such as artificial intelligence, simulators, big data, information technology, and digital social media included privacy protection, bias, and lack of accountability. …”
    Get full text
    Article
  6. 2266

    Trusted execution environments for quantum computers by Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer, Jakub Szefer

    Published 2025-06-01
    “…The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both. …”
    Get full text
    Article
  7. 2267

    Integrating artificial intelligence in drug discovery and early drug development: a transformative approach by Alberto Ocana, Atanasio Pandiella, Cristian Privat, Iván Bravo, Miguel Luengo-Oroz, Eitan Amir, Balazs Gyorffy

    Published 2025-03-01
    “…Ethical and regulatory issues, such as data privacy, also challenge the implementation of AI. …”
    Get full text
    Article
  8. 2268

    Advancing Pediatric Growth Assessment with Machine Learning: Overcoming Challenges in Early Diagnosis and Monitoring by Mauro Rodriguez-Marin, Luis Gustavo Orozco-Alatorre

    Published 2025-02-01
    “…Despite these advancements, challenges remain regarding data quality, clinical integration, and privacy concerns. …”
    Get full text
    Article
  9. 2269

    Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach by Jian Yang, Shaoxian Zhu, Zhongyi Wen, Qiang Li

    Published 2025-07-01
    “…We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. …”
    Get full text
    Article
  10. 2270

    Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications by MD. Abdur Rahman, M. Shamim Hossain, George Loukas, Elham Hassanain, Syed Sadiqur Rahman, Mohammed F. Alhamid, Mohsen Guizani

    Published 2018-01-01
    “…For security, the framework uses blockchain–Tor-based distributed transactions to preserve the therapeutic data privacy, ownership, generation, storage, and sharing. …”
    Get full text
    Article
  11. 2271

    Gathering requirements for IoT-assisted wellbeing in elementary school—a multi-stakeholder perspective by Karin Brodén, Jonas Andersson, Agnieszka Kitkowska, Awais Ahmad, Peter Mozelius

    Published 2025-06-01
    “…We analyzed the data in an inductively and deductively way, using the Konu and Rimpelä’s wellbeing framework.ResultsOur novel findings reveal alignment between staff and student perspectives across the framework’s categories: having, loving, being and health. …”
    Get full text
    Article
  12. 2272

    A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023 by Shalini Kumari, Chander Prabha, Asif Karim, Md. Mehedi Hassan, Sami Azam

    Published 2024-01-01
    “…FL provides a collaborative way to improve AD using distributed data sources and data privacy.…”
    Get full text
    Article
  13. 2273

    The Potential for Large Language Models to Transform Cardiovascular Medicine (Russian Translation) by Quer, G., Topol, E.J.

    Published 2025-02-01
    “…Potential risks, such as loss of data privacy or potential diagnostic errors, should be addressed before use in clinical practice. …”
    Get full text
    Article
  14. 2274

    Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions by Tehseen Mazhar, Sunawar khan, Tariq Shahzad, Muhammad Amir khan, Mamoon M. Saeed, Joseph Bamidele Awotunde, Habib Hamam

    Published 2025-01-01
    “…Abstract This article discusses Blockchain and Generative AI in healthcare, including their uses, difficulties, and solutions. Blockchain technology improves EHR security, privacy, and interoperability, while smart contracts streamline supply chain management and administrative procedures. …”
    Get full text
    Article
  15. 2275

    The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs): by Mugisha, Justin, Francis Adyanga, Akena, Ocan, Johnson

    Published 2025
    “…Also, it was found that building workforce capacity through collaborations and customized training programs can help close the skills gap, while improving cybersecurity and implementing efficient data management frameworks can help with privacy issues. …”
    Get full text
    Article
  16. 2276

    Criminal Law Challenged by Crossing into Virtual Reality by Mahdi Karimi

    Published 2025-03-01
    “…Due to its interactive and immersive nature virtual reality can collect and record large volumes of users' personal and sensitive information during use. This information includes behavioral patterns, interests, preferences, biometric and physiological data such as heart rate, body energy consumption, etc., which are comprehensively collected to create a complete and accurate user profile, potentially resulting in severe violations of users' mental privacy. …”
    Get full text
    Article
  17. 2277
  18. 2278

    Exploring mHealth app utilization for diabetes self-management: survey insights from a northern district in Malaysia by Premaa Supramaniam, Ying-Shan Beh, Suria Junus, Philip Rajan Devesahayam

    Published 2024-12-01
    “…Users perceived the mHealth app as useful (97.5%), yet faced challenges over the app initiation, charges and data security. …”
    Get full text
    Article
  19. 2279

    Understanding acceptance and resistance toward generative AI technologies: a multi-theoretical framework integrating functional, risk, and sociolegal factors by Priyanka Shrivastava

    Published 2025-04-01
    “…This study explores the factors influencing college students’ acceptance and resistance toward generative AI technologies by integrating three theoretical frameworks: the Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Social Exchange Theory (SET). Using data from 407 respondents collected through a structured survey, the study employed Structural Equation Modeling (SEM) to examine how functional factors (perceived usefulness, ease of use, and reliability), risk factors (privacy concerns, data security, and ethical issues), and sociolegal factors (trust in governance and regulatory frameworks) impact user attitudes. …”
    Get full text
    Article
  20. 2280

    Modern Trends in the Digitalization of Higher Physical Education in China by Chen RUI

    Published 2025-03-01
    “…Additionally, the study emphasizes the need for educator training and professional development, as many physical education teachers lack digital literacy or are resistant to new technologies. Data privacy and security issues are another significant challenge, particularly with the collection and use of personal and health data from wearable devices and online platforms. …”
    Get full text
    Article