Suggested Topics within your search.
Suggested Topics within your search.
-
1021
An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
Published 2020-05-01“…With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. …”
Get full text
Article -
1022
F-DATA: A Fugaku Workload Dataset for Job-centric Predictive Modelling in HPC Systems
Published 2025-07-01“…The encoding is based on a Natural Language Processing model and retains sensitive but useful job information for prediction purposes without violating privacy concerns.…”
Get full text
Article -
1023
CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data Generation
Published 2025-02-01“…It employs a data generator that integrates artificially generated data with the existing data from local clients by employing label correction and data generation techniques. …”
Get full text
Article -
1024
Next Arrival and Destination Prediction via Spatiotemporal Embedding with Urban Geography and Human Mobility Data
Published 2025-02-01“…However, trajectory data are often mutilated because of personal privacy and hardware limitations, i.e., we usually can only obtain partial trajectory information. …”
Get full text
Article -
1025
Harnessing multi-source data for AI-driven oncology insights: Productivity, trend, and sentiment analysis
Published 2025-03-01“…The most prominent article emphasized the Explainability of AI methods (XAI) with a profound discussion of their potential implications and privacy in data fusion contexts. Current trends involve the utilization of supervised learning methods such as CNN, Bayesian networks, and extreme learning machines for various cancers, particularly breast, lung, brain, and skin cancer. …”
Get full text
Article -
1026
Mapping the landscape of government data breaches: A bibliometric analysis of literature from 2006 to 2023
Published 2025-01-01“…Data breaches in the government sector are severe threats to cybersecurity and illegal acts that flagrantly violate security and privacy laws. …”
Get full text
Article -
1027
How machine learning on real world clinical data improves adverse event recording for endoscopy
Published 2025-07-01“…This study evaluates a machine learning-based approach for systematically detecting endoscopic adverse events from real-world clinical metadata, including structured hospital data such as ICD-codes and procedure timings. Using a random forest classifier detecting adverse events perforation, bleeding, and readmission, we analysed 2490 inpatient cases, achieving significant improvements over baseline prediction accuracy. …”
Get full text
Article -
1028
Evolution, topics and relevant research methodologies in business intelligence and data analysis in the academic management of higher education institutions. A literature review
Published 2025-03-01“…In the digital era, Business Intelligence (BI) and data analytics have become essential for optimizing academic management in higher education institutions. …”
Get full text
Article -
1029
Unraveling the role of data sharing in open finance diffusion: an evolutionary game approach on complex networks
Published 2025-05-01“…In this study, we develop a diffusion model using evolutionary game theory on complex networks to explore how data sharing influences lenders’ micro-level decision-making and promotes the macro-level diffusion of open finance. …”
Get full text
Article -
1030
Boosting EEG and ECG Classification with Synthetic Biophysical Data Generated via Generative Adversarial Networks
Published 2024-11-01“…By addressing the challenges of limited biophysical data, including privacy concerns and restricted volunteer availability, our model generates realistic synthetic waveforms learned from real data. …”
Get full text
Article -
1031
A Robust Image Encryption Protocol for Secure Data Sharing in Brain Computer Interface Applications
Published 2025-01-01“…However, the susceptibility of BCI data to tampering during transmission underscores the critical need for robust security and privacy measures. …”
Get full text
Article -
1032
An Adaptive Window Size Selection Method for Differentially Private Data Publishing over Infinite Trajectory Stream
Published 2018-01-01“…Differential privacy techniques are being used as a de facto standard to prevent such privacy violation caused by data analysis. …”
Get full text
Article -
1033
Sustainability of the Digital Economy in Indonesia: Opportunities, Challenges and Future Development
Published 2023-01-01Get full text
Article -
1034
Cybersecurity Anomaly Detection: AI and Ethereum Blockchain for a Secure and Tamperproof IoHT Data Management
Published 2024-01-01“…Since medical Information Technology (IT) is evolving and data privacy is a major concern with sensors generally, in healthcare IoT. …”
Get full text
Article -
1035
Factors Affecting Personal Information Sharing: Small-Scale Sample Analysis on Social Media
Published 2024-08-01“…These findings indicated that users’ trust, awareness, privacy concerns, and behavioral intentions significantly and positively influence the tendency to share personal data on social media platforms. …”
Get full text
Article -
1036
Challenges and strategies in building a foundational digital health data integration ecosystem: a systematic review and thematic synthesis
Published 2025-06-01“…A thematic synthesis approach was used to categorize findings into three primary themes: interoperability, PCC, and genomic data integration.ResultsA total of 161 studies were included. …”
Get full text
Article -
1037
Blockchain-Based Modified AES with Chaotic Random Key Generation for Secured E-Medical Data Sharing
Published 2025-04-01“…Besides, a Modified Digest hashing algorithm is also used with M-AES for feeding the encrypted text and hash into data blocks. …”
Get full text
Article -
1038
Large language models generating synthetic clinical datasets: a feasibility and comparative analysis with real-world perioperative data
Published 2025-02-01“…Synthetic data offers a promising solution to preserve privacy while enabling broader data access. …”
Get full text
Article -
1039
Edge-FLGuard: A Federated Learning Framework for Real-Time Anomaly Detection in 5G-Enabled IoT Ecosystems
Published 2025-06-01“…The rapid convergence of 5G networks and Internet of Things (IoT) technologies has unlocked unprecedented connectivity and responsiveness across smart environments—but has also amplified cybersecurity risks due to device heterogeneity, data privacy concerns, and distributed attack surfaces. …”
Get full text
Article -
1040
Secure federated distillation GAN for CIDS in industrial CPS
Published 2023-12-01“…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
Get full text
Article