Suggested Topics within your search.
Suggested Topics within your search.
-
601
A Blockchain-Based Privacy Protection Model Under Quality Consideration in Spatial Crowdsourcing Platforms
Published 2024-01-01“…This innovative model combines the strengths of centralized efficiency and decentralized privacy, and introduces a unique mechanism that significantly enhances privacy protection and ensures data integrity. …”
Get full text
Article -
602
A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis
Published 2025-03-01“…Federated learning (FL) is a machine learning technique where clients exchange only local model updates with a central server that combines them to create a global model after local training. While FL offers privacy benefits through local training, privacy-preserving strategies are needed since model updates can leak training data information due to various attacks. …”
Get full text
Article -
603
Differential Private POI Queries via Johnson-Lindenstrauss Transform
Published 2018-01-01“…In addition, the proposed perturbation method based on the Johnson Lindenstrauss transform satisfies the differential privacy. Two popular point of interest queries, <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>-NN and Range, are used to evaluate the method on two real-world data sets. …”
Get full text
Article -
604
A Novel Information Security Framework for Securing Big Data in Healthcare Environment Using Blockchain
Published 2023-12-01“…The framework is based on the principles of confidentiality and immutability to ensure the security and privacy of health care data. The framework is designed to support a wide range of information sources and use cases including patient records, clinical research, medical imaging, genomic data, and pharmaceutical trials. …”
Get full text
Article -
605
A federated LSTM network for load forecasting using multi-source data with homomorphic encryption
Published 2025-03-01“…These challenges drive the adoption of federated learning (FL) to address issues related to data silos and privacy. In this paper, a novel framework for short-term load forecasting was proposed using historical data from industries such as power, meteorology, and finance. …”
Get full text
Article -
606
Analysis of Service Quality in Smart Running Applications Using Big Data Text Mining Techniques
Published 2024-11-01Get full text
Article -
607
How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries
Published 2019-03-01“…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
Get full text
Article -
608
Predictive Model to Analyse Real and Synthetic Data for Learners' Performance Prediction Using Regression Techniques
Published 2025-03-01“…Real-world data availability is often hampered by privacy concerns, prompting a shift towards synthetic data generation. …”
Get full text
Article -
609
Exploring the Use of AI in Qualitative Data Analysis: Comparing Manual Processing with Avidnote for Theme Generation
Published 2025-04-01“…However, fundamental concerns persist regarding the robustness, generalisability, credibility, reliability and trustworthiness of qualitative research when using AI technologies. Ethical considerations, such as data security and privacy, also need to be addressed in research settings. …”
Get full text
Article -
610
Behavioural Economics and Consumer Decision-Making in the Age of Artificial Intelligence (AI), Data Science, Business Analytics, and Internet of Things (IoT)
Published 2024-05-01“…However, while AI and IoT facilitate more efficient and engaging consumer experiences, they introduce complex ethical and practical concerns, particularly around data privacy, algorithmic fairness, and maintenance of consumer trust. …”
Get full text
Article -
611
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
Published 2023-12-01“… Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. …”
Get full text
Article -
612
Secure healthcare data sharing and attack detection framework using radial basis neural network
Published 2025-05-01“…The proposed authenticate access control mechanism (PA2C) safeguards data integrity as well as the security and dependability of EHR data sharing are improved by the use of smart contracts, encryption, and secure key management. …”
Get full text
Article -
613
Face-to-Face Interactions Estimated Using Mobile Phone Data to Support Contact Tracing Operations
Published 2024-12-01Get full text
Article -
614
Respiratory Rate Estimation from Thermal Video Data Using Spatio-Temporal Deep Learning
Published 2024-10-01“…Thermal videos provide a privacy-preserving yet information-rich data source for remote health monitoring, especially for respiration rate (RR) estimation. …”
Get full text
Article -
615
-
616
Comments on “Exploring Secure V2X Communication Networks for Human-Centric Security and Privacy in Smart Cities”—Privacy-Preserving Certificate in V2X Communic...
Published 2025-01-01“…The proposed framework validates vehicle legitimacy using individual certificates and subsequently transmits data collected and integrated by intermediate entities to the blockchain, thereby avoiding direct exposure of vehicle privacy. …”
Get full text
Article -
617
Enhanced Fall Detection Using YOLOv7-W6-Pose for Real-Time Elderly Monitoring
Published 2024-12-01“…Furthermore, the approach ensures data privacy by processing only skeletal points derived from pose estimation, with no personal data stored. …”
Get full text
Article -
618
Losing control: The effects of social media fatigue, privacy concerns and psychological reactance on social media advertising
Published 2022-12-01“…This caused users to feel negatively after using SMP. Ad avoidance is caused by significant privacy concerns when encountering personalized ads, such as suspicion as to how data is used, the feeling of being watched and listened to, as well as annoyance at the irrelevance and repetitiveness of SMA. …”
Get full text
Article -
619
Mediating role of trust and privacy concerns between web assurance mechanism and purchase intention of online products
Published 2024-12-01“…A conceptual model has been framed to investigate the direct and indirect relationship between web assurance mechanism and purchase intention of online products via trust and privacy concern. This study uses data collected from 342 respondents. …”
Get full text
Article -
620
Trust-aware privacy-preserving QoS prediction with graph neural collaborative filtering for internet of things services
Published 2025-02-01“…However, issues related to information credibility, user data privacy, and prediction accuracy in QoS prediction for IoT services have become significant challenges in current research. …”
Get full text
Article