Showing 761 - 780 results of 2,784 for search '(((( useddds OR useddddds) OR useddddds) privacy data\ ) OR ( used privacy data\ ))', query time: 0.21s Refine Results
  1. 761

    Using fuzzy decision support to create a positive mental health environment for preschoolers by Xinyue Li

    Published 2025-04-01
    “…To assess their mental health before starting school, preschoolers need early detection, intervention, and assessment. However, data shortages, heterogeneity, privacy issues, model interpretability, and generalization restrictions hamper the review process. …”
    Get full text
    Article
  2. 762

    Impact of Normalization Techniques on Synthetic Load Profile Generation Using Deep Generative Models by Luis H. T. Bandoria, Walquiria N. Silva, Madson C. De Almeida

    Published 2025-01-01
    “…However, the impact of data normalization on their performance remains insufficiently explored. …”
    Get full text
    Article
  3. 763
  4. 764

    Automated redaction of names in adverse event reports using transformer-based neural networks by Eva-Lisa Meldau, Shachi Bista, Carlos Melgarejo-González, G. Niklas Norén

    Published 2024-12-01
    “…Because the Yellow Card data contained few names, we used predictive models to select narratives for training. …”
    Get full text
    Article
  5. 765

    Dual verifiable cloud storage scheme based on blockchain by Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher

    Published 2021-12-01
    “…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
    Get full text
    Article
  6. 766

    Investigating Sensitive Issues in Class Through Randomized Response Polling by Christian Genest, James A. Hanley, Sahir R. Bhatnagar

    Published 2024-10-01
    “…The underpinnings of the method, which are laid out for the statistically savvy, illustrate the tradeoff between data acquisition and privacy protection. A few suitable references are also included for those who wish to dig further into the subject. …”
    Get full text
    Article
  7. 767

    Secure vehicular digital forensics system based on blockchain by Meng LI, Chengxiang SI, Liehuang ZHU

    Published 2020-06-01
    “…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
    Get full text
    Article
  8. 768

    Secure vehicular digital forensics system based on blockchain by Meng LI, Chengxiang SI, Liehuang ZHU

    Published 2020-06-01
    “…The emergence of vehicular big data has brought a great promotion to better understand characteristics of vehicular networks,grasp needs of users and improve service qualities.However,malicious users and criminals leverage vehicular networks to conduct illegal behaviors,resulting in a decline in the service quality and difficulties in determining the liability in vehicle accidents.At the same time,there are still some security and privacy issues in the vehicular digital forensics,such as the identity privacy of the data provider and the request control of the data requester.Therefore,a secure vehicular digital forensics scheme based on blockchain was proposed.Firstly,a data requester registered with a certificate authority and an anonymous certificate was obtained for the subsequent data uploading.Then,the data user obtained the public-private key pair and user key in registration,which were respectively used for the data requesting and data decryption.Only if certain attributes were held,the right plaintext could be decrypted.Next,a consortium blockchain was jointly established by several institutions with high credibility to record all data transactions.Finally,the security and privacy were experimentally analyzed,and the performance was tested based on the Ethereum platform.…”
    Get full text
    Article
  9. 769

    ‘Over Time Everyone’s Gonna Be Open to It’: User Attitudes Toward Security and Privacy in Continuous Authentication for Smart Homes by Heting Wang, Yu-Peng Chen, Dinank Bista, Rodrigo Calvo, Niriksha Regmi, Xuanpu Zhang, Tempestt Neal, Jaime Ruiz, Lisa Anthony

    Published 2025-01-01
    “…Participants also envisioned CA systems that offer more granular permission controls over personal data. Our findings indicate the contextual dependencies in balancing usability with privacy and security concerns. …”
    Get full text
    Article
  10. 770

    Trust and Privacy Concerns Among Cancer Survivors Who Did Not Visit a Research Website Offering Free Genetic Counseling Services for Families: Survey Study by James A Shepperd, Colleen M McBride, Weihua An, Jingsong Zhao, Rebecca D Pentz, Cam Escoffery, Kevin Ward, Yue Guan

    Published 2025-05-01
    “…ObjectiveWe designed a theory-based cross-sectional survey to explore the following questions: (1) To what extent did nonresponders endorse privacy concerns? (2) Were privacy concerns associated with recall of receiving the website invitation, time since diagnosis, age, and race? …”
    Get full text
    Article
  11. 771

    Internet of Things-Based Anomaly Detection Hybrid Framework Simulation Integration of Deep Learning and Blockchain by Ahmad M. Almasabi, Ahmad B. Alkhodre, Maher Khemakhem, Fathy Eassa, Adnan Ahmed Abi Sen, Ahmed Harbaoui

    Published 2025-05-01
    “…However, with new technologies and services, the issue of privacy and data security has become more urgent. …”
    Get full text
    Article
  12. 772

    A content review of COVID-19-related apps used in Vietnam by Linh Tran, Federica Cucé, Nguyen Thanh An, Kadek Agus Surya Dila, Nguyen Hai Nam, Doan Le Nguyet Cat, Lee Wei Jun, Farrukh Ansar, Fatima Abdallh, Au Vo, Nguyen Tien Huy

    Published 2025-02-01
    “…The most serious user concerns were privacy breaches during data recording and storage, technical issues, and non-user-friendly interfaces. …”
    Get full text
    Article
  13. 773

    User Centric Android Application Permission Manager by Belal Amro, Zaid Abu Znaid

    Published 2021-12-01
    “…Like other systems, mobile devices are prune to different attacks that might invade user’s privacy and lead to private data leakage. Millions of Mobile application have been developed and used Worldwide, most of them are requiring permissions to work properly. …”
    Get full text
    Article
  14. 774

    Employing Ontology-Alignment and Locality-Sensitive Hashing to Improve Attribute Interoperability in Federated eID Systems by Walter Priesnitz Filho, Carlos Ribeiro, Thomas Zefferer

    Published 2016-10-01
    “…In addition, the improvement obtained in the alignment process by combining the two assessment winners does not impact negatively the privacy of the user’s data, since no clear-text data is exchanged in the alignment process.…”
    Get full text
    Article
  15. 775

    Deconstructing Bentham’s Panopticon: The New Metaphors of Surveillance in the Web 2.0 Environment by Manuela Farinosi

    Published 2011-02-01
    “…This article reflects on the meaning of the words “control” and “privacy” in light of the intensive diffusion of user generated content on the web. …”
    Get full text
    Article
  16. 776

    Big data transfer service architecture for cloud data centers: problems, methods, applications, and future trends by Muhammad Umar Majigi, Ismaila Idris, Shafi’i Muhammad Abdulhamid, Richard A. Ikuesan

    Published 2025-08-01
    “…This article presents a systematic literature review following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to understand current trends, methods/models, and research problems on big data transfer services for cloud data centers. Future work considers the security and privacy of big data transmission in cloud environments.…”
    Get full text
    Article
  17. 777

    Federated learning-based semantic segmentation framework for sustainable development by Deepthi Godavarthi, Deepa Jose, Sachi Nandan Mohanty, Mohamed Medani, Mohamed Kallel, Sherzod Abdullaev, M. Ijaz Khan

    Published 2025-06-01
    “…Federated Learning protects user privacy by processing data locally on client devices rather than storing it centrally on a server. …”
    Get full text
    Article
  18. 778
  19. 779

    Design of an improved graph-based model for real-time anomaly detection in healthcare using hybrid CNN-LSTM and federated learning by G Muni Nagamani, Chanumolu Kiran Kumar

    Published 2024-12-01
    “…This system processes over 100,000 messages per second with less than 50 ms of inference latency to enable the prompting of clinical responses. We use Federated Learning combined with Differential Privacy to solve our data security and privacy tasks. …”
    Get full text
    Article
  20. 780

    Evaluation of Adblock Software Usage by Anna Sołtysik-Piorunkiewicz, Artur Strzelecki, Edyta Abramek

    Published 2019-12-01
    “…The study was based on data obtained by a web questionnaire. The research was focused on evaluation of adblocking software usage factors in five categories: (1) gender, age, and education; (2) use of advertising and sources of knowledge about advertising; (3) technical and social reasons for blocking online advertisements; (4) usage of an adblock-wall; and (5) type of online advertisement. …”
    Get full text
    Article