Suggested Topics within your search.
Suggested Topics within your search.
-
481
Tabular Data Augmentation Using Artificial Intelligence: A Systematic Review and Taxonomic Framework
Published 2025-01-01Get full text
Article -
482
Impact of perceived privacy and security in the TAM model: The perceived trust as the mediated factors
Published 2024-11-01Get full text
Article -
483
Blockchain oracles for decentralized agricultural insurance using trusted IoT data
Published 2025-01-01“…Initially, a method for computing the direct reputation score of IoT devices based on behavioral and data reputation is illustrated. Next, a privacy preserved decentralized oracle mechanism is designed and implemented using a masked secret sharing and secure aggregation scheme. …”
Get full text
Article -
484
THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS
Published 2023-04-01“…This article studies the impact of data security on consumer intentions to use e-wallets in the rapidly growing economy of Vietnam. …”
Get full text
Article -
485
Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions
Published 2025-01-01“…After that, these local models are aggregated towards a common, global model using secure aggregation methods, which makes sure that there is nozza of data privacy and hence, in the process making sure that more accurate models can be obtained due to diversified data sets. …”
Get full text
Article -
486
A Qualitative Study of Researchers Perspective on the Use and Risks of Open Government Data
Published 2025-06-01“…This study aims to review the potential risks of data openness on government data portals from the perspective of researchers as one of the important actors who use data. …”
Get full text
Article -
487
Data Security Model Using (AES-LEA) Algorithms for WoT Environment
Published 2025-06-01“…Therefore, ensuring data privacy and protection is a major challenge for organizations and individuals. …”
Get full text
Article -
488
Social Engineering Threat Analysis Using Large-Scale Synthetic Data
Published 2025-02-01“…Our model achieved an accuracy of 0.8984 and an F1 score of 0.9253, demonstrating its effectiveness in detecting social engineering attacks. The use of synthetic data overcomes the problem of lack of availability of real-world data due to privacy issues, and is demonstrated in this work to be safe, scalable, ethics friendly and effective.…”
Get full text
Article -
489
Criminalisation of the illegal use of personal data: comparative approaches and the Chinese choice
Published 2025-06-01“…According to policy analysis, in jurisdictions where information technology such as big data and AI is widely available, for example, China, the illegal use of personal data particularly disrupts the community’s sense of security. …”
Get full text
Article -
490
-
491
Mobile Phone Network Data in the COVID-19 era: A systematic review of applications, socioeconomic factors affecting compliance to non-pharmaceutical interventions, privacy implicat...
Published 2025-01-01“…<h4>Background</h4>The use of traditional mobility datasets, such as travel surveys and census data, has significantly impacted various disciplines, including transportation, urban sensing, criminology, and healthcare. …”
Get full text
Article -
492
Artificial intelligence in neuroimaging: Opportunities and ethical challenges
Published 2024-01-01“…Issues such as algorithmic bias, data privacy, and the interpretability of AI-driven insights must be addressed to ensure that these technologies are used responsibly and equitably. …”
Get full text
Article -
493
Federated learning with LSTM for intrusion detection in IoT-based wireless sensor networks: a multi-dataset analysis
Published 2025-03-01“…Using an FL approach, multiple IoT nodes collaboratively train a global LSTM model without exchanging raw data, thereby addressing privacy concerns and improving detection capabilities. …”
Get full text
Article -
494
Verticox+: vertically distributed Cox proportional hazards model with improved privacy guarantees
Published 2025-07-01“…Abstract Federated learning allows us to run machine learning algorithms on decentralized data when data sharing is not permitted due to privacy concerns. …”
Get full text
Article -
495
Improved SpaceTwist privacy protection method based on anchor optimization algorithm
Published 2017-10-01“…With location-based services worldwide used,private location data appealed easily in query process which caused serious security problems.So the introduction of SpaceTwist incremental nearest neighbor query algorithm,proposes protection of privacy method combined with improved SpaceTwist location optimization algorithm.The anchor point authentication server added to distributed system structure,user generate a k anonymous area according to their privacy preference and actual environment,using optimization algorithm to generate the anchor point.Forwarding users use the incremental nearest neighbor query throught the anchor point and accurate.Experiments in road network environment with different data sets show that the privacy protection works well in the algorithm,and own high work efficiency.…”
Get full text
Article -
496
A robust and personalized privacy-preserving approach for adaptive clustered federated distillation
Published 2025-04-01“…Meta-learning is used in each cluster to enhance the personalization of the local models and the classification accuracy of the non-independent and Identically distributed (non-IID) data distributions. …”
Get full text
Article -
497
Risk assessment of data protection in the maritime industry using system-theoretic process analysis
Published 2025-06-01“…Data protection assessment is a significant issue to security and privacy enhancement. …”
Get full text
Article -
498
Federated meta learning: a review
Published 2023-03-01“…With the popularity of mobile devices, massive amounts of data are constantly produced.The data privacy policies are becoming more and more specified, the flow and use of data are strictly regulated.Federated learning can break data barriers and use client data for modeling.Because users have different habits, there are significant differences between different client data.How to solve the statistical challenge caused by the data imbalance becomes an important topic in federated learning research.Using the fast learning ability of meta learning, it becomes an important way to train different personalized models for different clients to solve the problem of data imbalance in federated learning.The definition and classification of federated learning, as well as the main problems of federated learning were introduced systematically based on the background of federated learning.The main problems included privacy protection, data heterogeneity and limited communication.The research work of federated metalearning in solving the heterogeneous data, the limited communication environment, and improving the robustness against malicious attacks were introduced systematically starting from the background of federated meta learning.Finally, the summary and prospect of federated meta learning were proposed.…”
Get full text
Article -
499
Federated learning in food research
Published 2025-10-01“…The use of machine learning in food research is sometimes limited due to data sharing obstacles such as data ownership and privacy requirements. …”
Get full text
Article -
500
Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey
Published 2024-12-01“…The results show that privacy and heterogeneity issues are the most common open problems in FL, comprising 38% of the selected articles, while data poisoning emerges as the most common attack, constituting 25% of all attacks identified in the study. …”
Get full text
Article