Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
-
2181
SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation
Published 2025-07-01“…A similarity graph is built from the log data, allowing for effective anomaly detection using graph-based methods. …”
Get full text
Article -
2182
Enhancing insights in sexually transmitted infection mapping: Syphilis in Forsyth County, North Carolina, a case study.
Published 2024-10-01“…Results were assessed using latent rate theory cross validation. We show combining a moving window and a UMBME analysis with geomasked data effectively predicted the true or latent syphilis rate 5% to 26% more accurate than the traditional, geopolitical boundary method. …”
Get full text
Article -
2183
Navigating digital frontiers in UAE healthcare: A qualitative exploration of healthcare professionals' and patients' experiences with AI and telemedicine.
Published 2025-04-01“…The results highlight the need to address such limitations, adequately train healthcare professionals, and enhance data privacy. The study also lays a foundation for further research into contextual challenges hindering the effective adoption and implementation of AI and telemedicine in different healthcare settings in order to develop a generic, context-specific framework that will guide the adoption of such emerging technologies in the global healthcare industry.…”
Get full text
Article -
2184
A review of machine learning and deep learning for Parkinson’s disease detection
Published 2025-03-01“…However, challenges like the need for large and diverse datasets, data privacy concerns, and data quality in healthcare remain. …”
Get full text
Article -
2185
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01“…Finally, the potential application of the scheme in cross-departmental supervision scenarios of multi-industry and multi-source data sales data was explored, which helped the tax department to realize tax verification under the premise of protecting data privacy, and helped promote the digital transformation and healthy development of various industries.…”
Get full text
Article -
2186
Source-Free Domain Adaptation for Cross-Modality Abdominal Multi-Organ Segmentation Challenges
Published 2025-05-01“…While unsupervised domain adaptation (UDA) has shown promise in addressing these issues by transferring knowledge from a different modality (source domain), its reliance on both source and target data during training presents a practical challenge in many clinical settings due to data privacy concerns. …”
Get full text
Article -
2187
SensorsConnect Framework: World-Wide Web for Internet of Things
Published 2024-01-01“…Unlike humans, IoT devices lack a unified framework like the WWW for collaboration and data sharing. This is primarily due to 1) separate infrastructure often required for IoT security and privacy and 2) challenges of limited connectivity, device heterogeneity, and evolving technology. …”
Get full text
Article -
2188
Exploring the Frontier: Generative AI Applications in Online Consumer Behavior Analytics
Published 2025-03-01“…Furthermore, the paper discusses the challenges associated with generative AI, emphasizing the need to consider ethical issues, such as bias and data privacy. This comprehensive review contributes to a deeper understanding of generative AI’s role in OCBA, outlining its applications and functionalities from a technical perspective. …”
Get full text
Article -
2189
Federated learning-based non-intrusive load monitoring adaptive to real-world heterogeneities
Published 2025-05-01“…Recently, federated learning has enabled NILM to learn from decentralized meter data while preserving privacy. However, as real-world heterogeneities in electricity consumption data, local models, and AMI facilities cannot be eliminated in advance, federated learning-based NILM (FL-NILM) may underperform or even fail. …”
Get full text
Article -
2190
ADF-SL: An Adaptive and Fair Scheme for Smart Learning Task Distribution
Published 2025-01-01“…However, training models within SL is affected by data heterogeneity and sensitivity, and often requires more computational resources than an individual data provider can afford. …”
Get full text
Article -
2191
From Neural Networks to Emotional Networks: A Systematic Review of EEG-Based Emotion Recognition in Cognitive Neuroscience and Real-World Applications
Published 2025-02-01“…Further, related ethical issues with respect to privacy, data security, and machine learning model biases need to be much more proclaimed to responsibly apply research on emotions to areas such as healthcare, human–computer interaction, and marketing. …”
Get full text
Article -
2192
Impact of Mask-Wearing on Public Attitudes, Perceptions, and Interest in Rhinoplasty During the COVID-19 Pandemic
Published 2025-03-01“…This study aimed to investigate the influence of mask use on attitudes, perceptions, and interests in rhinoplasty during the COVID-19 pandemic in Saudi Arabia. …”
Get full text
Article -
2193
Parameter optimization of 3D convolutional neural network for dry-EEG motor imagery brain-machine interface
Published 2025-02-01“…By completing the system on the edge, the privacy of personal MI data can be ensured, and the system is ubiquitous, which improves user convenience. …”
Get full text
Article -
2194
Predicting Student Dropout Through Text and Media Content Analysis of VKontakte Profiles
Published 2025-01-01“…While this approach depends on publicly available VK data and may be limited by privacy settings, it still provides useful insights. …”
Get full text
Article -
2195
MAGMA-MICK: A state-of-the-art digital platform facilitating the programmatic implementation of whole genome sequencing for TB care and prevention
Published 2025-03-01“…Implementation of NGS into routine TB care requires technologies that communicate WGS data in a transparent, interpretable and actionable way. …”
Get full text
Article -
2196
TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security
Published 2025-07-01“…This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. …”
Get full text
Article -
2197
Advanced Applications of Artificial Intelligence in Pharmacovigilance: Current Trends and Future Perspectives
Published 2024-03-01“…The ethical and legal implications of patient privacy, data security, and regulatory compliance underscore the necessity of cautious artificial intelligence deployment in order to maintain public trust and protect patient rights. …”
Get full text
Article -
2198
Artificial Intelligence in Bronchopulmonary Dysplasia: A Review of the Literature
Published 2025-03-01“…Addressing ethical considerations, such as data privacy and demographic representation, as well as other practical considerations will be essential to ensure the proper implementation of AI clinical tools. …”
Get full text
Article -
2199
Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks
Published 2024-12-01“…To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL). …”
Get full text
Article -
2200
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…At present, encrypted data is the cornerstone of Internet communication, providing the maximum degree of privacy and security protection for all transmitted data while shielding users against potential cyber threats and attacks. …”
Get full text
Article