Suggested Topics within your search.
Suggested Topics within your search.
-
881
Literature data-based de novo candidates for drug repurposing
Published 2025-08-01Get full text
Article -
882
Recognition of Human Activities Based on Ambient Audio and Vibration Data
Published 2024-01-01“…The data obtained by the AMSNs is classified using two distinct neural networks. …”
Get full text
Article -
883
From data to nutrition: the impact of computing infrastructure and artificial intelligence
Published 2024-12-01“…However, challenges such as data privacy, model interoperability, and ethical considerations remain key obstacles. …”
Get full text
Article -
884
Deep Learning for Medical Image Analysis Applications in Disease Detection and Diagnosis
Published 2025-01-01“…Its potential applications are indeed great, but realising its potential has been slow owing to a host of challenges such as implementing it in a real-life scenario, data privacy challenges, ethical concerns, AI models being biased, operating system structures needing to be interoperable with existing systems, and their compliance with regulating standards. …”
Get full text
Article -
885
Health Unchained Podcast on New Decentralized Industry Coalition
Published 2025-04-01“…Concepts explored during the conversation include: • Financial systems interacting with health • AI agents interacting with AI agents, exchanging value and micro payments • Building frameworks that make it easy to consume for CIOs around globe • Blockchain transaction framework • AI analytical framework • Privacy preservation data complying with HIPAA and HL7 • Coming together to solve industry problems • Real world implementations, use cases - including reporting, health data, and DeSci, clinical innovations and research, tokenization, ethical AI, and verifiable intelligence • Stable coins for cross border payments • Full access to data, and payments around globe • Supply chain ecosystem, pharmacy, pharma, insurance/payors, clinics, doctors, and patients • Who will new intermediaries be to move data, bill, and secure the data? …”
Get full text
Article -
886
Real-Time Tracking of Diagnostic Discrepancies in Electronic Health Records for Improved Predictive Modeling
Published 2025-01-01“…This paper highlights the critical role of diagnostic discrepancy statistics in overcoming these challenges and proposes a standardized data schema that ensures interoperable, real-time, and historical data without compromising patient privacy. …”
Get full text
Article -
887
-
888
-
889
Securing gait recognition with homomorphic encryption
Published 2025-08-01“…At the same time, they raise significant privacy concerns because compromised biometric data cannot be revoked. …”
Get full text
Article -
890
A Digital Twin Comprehensive Monitoring System for Ship Equipment
Published 2024-12-01“…In addition, the system optimises the user experience through multi-round feedback testing, and ensures data security and privacy protection through multi-layer encryption, identity verification, and role-based access control. …”
Get full text
Article -
891
Balancing public safety and civil rights: Successes and challenges of AI-based video surveillance systems
Published 2025-05-01“…AI-powered video analytics has had a profound impact on the right to privacy, particularly due to the mass collection of biometric data and automated profiling, sparking debate over compliance with international standards such as the General Data Protection Regulation and the Convention for the Protection of Human Rights. …”
Get full text
Article -
892
Data Confidentiality in Artificial Intelligence-Assisted Medicine: The Main Ethical Issue
Published 2025-05-01“…Although there are many potential advantages of using AI to enhance medical care, they must be weighed against potential risks to patient privacy and data security. …”
Get full text
Article -
893
Political Factors in Global Communication Platforms: Pavel Durov’s Case
Published 2025-06-01“…The French authorities applied institutional pressure by using institutional advantages to achieve control over the private data of Telegram users. …”
Get full text
Article -
894
HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework
Published 2025-06-01“…Abstract Protecting user privacy is essential in machine learning research, especially in the context of data collection. …”
Get full text
Article -
895
Facebook as a Surveillance Tool: From the Perspective of the User
Published 2012-09-01“…With the increasing use of online social networks such as Facebook in recent years, a lot of research has been focussing on the privacy issue of the network. …”
Get full text
Article -
896
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01“…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
Get full text
Article -
897
Efficient IoT User Authentication Protocol with Semi-Trusted Servers
Published 2025-03-01Get full text
Article -
898
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01“…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
Get full text
Article -
899
Artificial Intelligence in Retail: Benefits and Risks Associated With Mobile Shopping Applications
Published 2021-02-01“…The objective of the study is to examine the practical implications of using artificial intelligence (AI) based solutions in the case of retail mobile applications, to enhance the online shopping experience and improve the engagement by also having in mind the privacy of the users. …”
Get full text
Article -
900
Comprehensive testing of large language models for extraction of structured data in pathology
Published 2025-03-01“…While recent studies show promise in using advanced language models for structuring pathology data, they primarily rely on proprietary models, raising cost and privacy concerns. …”
Get full text
Article