Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
Showing 501 - 520 results of 2,784 for search '(((( useddds OR usedddds) OR usedddddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.26s Refine Results
  1. 501

    Learning-augmented sketching offers improved performance for privacy preserving and secure GWAS by Junyan Xu, Kaiyuan Zhu, Jieling Cai, Can Kockan, Natnatee Dokmai, Hyunghoon Cho, David P. Woodruff, S. Cenk Sahinalp

    Published 2025-03-01
    “…To address this, methods like SkSES use sketching for genome-wide association studies (GWAS) across distributed datasets while maintaining privacy. …”
    Get full text
    Article
  2. 502

    Online medical privacy protection strategy under information value-added mechanism by Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG

    Published 2022-12-01
    “…China’s economic level and people’s living standards have developed rapidly in recent years, and the medical level and medical technology have made breakthroughs continuously.With the promotion and deepening of“Internet Plus” to business model innovation in various fields, the development of “Internet Plus” medical has been rapidly developed.Due to the continuous development of data processing technologies such as machine learning and data mining, the risk of users’ personal medical data disclosure in the process of online medical treatment has also attracted the attention of researchers.Considering the deductibility of information, the discount mechanism was adopted to describe the change of user’s private information value in different stages of the game.Combined with the current research status in the field of online medical privacy protection motivation, how to mobilize the enthusiasm of both players from the level of privacy protection motivation was explored with game analysis.In view of the game characteristics of users’ strong willingness to continually use the online medical platform and intermittently provide privacy, the repeated game method was adopted to better describe the game process between users and the online medical platform.The tendency change law of the players on both sides of the game was obtained.Moreover, the Nash equilibrium of the game model was analyzed under different model parameters and the change trend of the game strategy of both sides with the progress of the game stage.When the parameters were met 2(c<sub>p</sub>-c<sub>n</sub>)≥l<sub>p</sub>(p<sub>n</sub>-p<sub>p</sub>), the user started to choose from “agree to share private data” to “refuse to share private data”.The above conclusion was verified by simulation experiments.Based on the above conclusions, from the perspective of online medical platform and users, policy suggestions on how to realize privacy protection from the level of privacy protection motivation in the process of online medical treatment were given.…”
    Get full text
    Article
  3. 503

    Verticox+: vertically distributed Cox proportional hazards model with improved privacy guarantees by Florian van Daalen, Djura Smits, Lianne Ippel, Andre Dekker, Inigo Bermejo

    Published 2025-07-01
    “…Abstract Federated learning allows us to run machine learning algorithms on decentralized data when data sharing is not permitted due to privacy concerns. …”
    Get full text
    Article
  4. 504
  5. 505

    Risk assessment of data protection in the maritime industry using system-theoretic process analysis by Sutthipong Yungratog, Hyungju Kim, Wonsiri Punurai, Sotarat Thammaboosadee

    Published 2025-06-01
    “…Data protection assessment is a significant issue to security and privacy enhancement. …”
    Get full text
    Article
  6. 506

    A Communication-Efficient Distributed Matrix Multiplication Scheme with Privacy, Security, and Resiliency by Tao Wang, Zhiping Shi, Juan Yang, Sha Liu

    Published 2024-08-01
    “…Inspired by the application of repairing Reed–Solomon (RS) codes in distributed storage and secret sharing, we propose SDMM schemes with reduced communication overhead through the use of trace polynomials. Specifically, these schemes are designed to address three critical concerns: (i) ensuring information-theoretic privacy against collusion among servers; (ii) providing security against Byzantine servers; and (iii) offering resiliency against stragglers to mitigate computing delays. …”
    Get full text
    Article
  7. 507

    Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing by Hui LIN, Mengyang YU, Youliang TIAN, Yijie HUANG

    Published 2018-05-01
    “…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
    Get full text
    Article
  8. 508

    Artificial intelligence in neuroimaging: Opportunities and ethical challenges by Neha Brahma, S. Vimal

    Published 2024-01-01
    “…Issues such as algorithmic bias, data privacy, and the interpretability of AI-driven insights must be addressed to ensure that these technologies are used responsibly and equitably. …”
    Get full text
    Article
  9. 509

    Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability by Yong Zhou, Hong Lei, Zijian Bao

    Published 2024-01-01
    “…However, traditional donation systems, typically centralized, are prone to issues such as data redundancy, vulnerability to single-point failures, and a deficiency in transparency and traceability. …”
    Get full text
    Article
  10. 510

    Privacy challenges of automated vehicles: Merging contextual integrity and responsible innovation frameworks by Dasom Lee, Le Anh Nguyen Long

    Published 2025-07-01
    “…MCI considers contextual integrity (CI) in tandem with societal preferences and individual level preferences, which is captured using demographic data. Therefore, it captures the individual-level, group-level, and societal-level factors that drive peoples’ preferences regarding AV privacy. …”
    Get full text
    Article
  11. 511

    Balancing Privacy and Utility in Split Learning: An Adversarial Channel Pruning-Based Approach by Afnan Alhindi, Saad Al-Ahmadi, Mohamed Maher Ben Ismail

    Published 2025-01-01
    “…Moreover, training such models using private data is prone to serious privacy risks resulting from inadvertent disclosure of sensitive information. …”
    Get full text
    Article
  12. 512

    FairRAG: A Privacy-Preserving Framework for Fair Financial Decision-Making by Rashmi Nagpal, Unyimeabasi Usua, Rafael Palacios, Amar Gupta

    Published 2025-07-01
    “…These improvements were maintained when using differentially private synthetic data, thus indicating robust privacy and accuracy trade-offs.…”
    Get full text
    Article
  13. 513

    Synergistic Disruption: Harnessing AI and Blockchain for Enhanced Privacy and Security in Federated Learning by Sandi Rahmadika, Winda Agustiarmi, Ryan Fikri, Bruno Joachim Kweka

    Published 2025-04-01
    “…Additionally, there is a lot of potential for improving machine learning and data interchange in terms of privacy, security, and transparency through the integration of blockchain with federated learning. …”
    Get full text
    Article
  14. 514

    A lightweight and secure authentication and privacy protection scheme for internet of medical things by Sanjay Kumar, Kumar Abhishek, Shitharth Selvarajan

    Published 2025-07-01
    “…However, transmitting sensitive patient data through IoMT devices raises significant security and privacy concerns. …”
    Get full text
    Article
  15. 515

    A robust and personalized privacy-preserving approach for adaptive clustered federated distillation by Mai Shawkat, Zainab H. Ali, Mofreh Salem, Ali El-desoky

    Published 2025-04-01
    “…Meta-learning is used in each cluster to enhance the personalization of the local models and the classification accuracy of the non-independent and Identically distributed (non-IID) data distributions. …”
    Get full text
    Article
  16. 516

    The Looming Privacy Challenges Posed by Commercial Satellite Imaging: Remedies and Research Directions by Nathanael Denis, Roberto Di Pietro

    Published 2025-01-01
    “…While these technologies benefit applications such as natural disaster monitoring and precision agriculture, they also introduce novel privacy risks. This perspective paper provides several contributions: we start by analyzing privacy risks using the LINDDUN privacy framework, categorizing threats like linking, identification, and data disclosure. …”
    Get full text
    Article
  17. 517

    Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments by Mohammed A. Aleisa

    Published 2025-01-01
    “…This architecture entails data privacy and confidentiality, auditability and traceability, and withstanding evolving threats, including potential threats in terms of quantum attacks. …”
    Get full text
    Article
  18. 518

    Self-Disclosure on Professional Social Networking Sites: A Privacy Calculus Perspective by Imairi Eitiveni, Achmad Nizar Hidayanto, Yuvitri Annisa Dwityafani, Larastri Kumaralalita

    Published 2023-01-01
    “…A model contextualizing privacy calculus theory combined with the trust factor was developed and evaluated using 661 quantitative data collected through a questionnaire. …”
    Get full text
    Article
  19. 519

    Privacy preserving strategies for electronic health records in the era of large language models by Jitendra Jonnagaddala, Zoie Shui-Yee Wong

    Published 2025-01-01
    “…Risks can be reduced by using strategies like privacy-preserving locally deployed LLMs, synthetic data generation, differential privacy, and deidentification. …”
    Get full text
    Article
  20. 520

    EXPLORING USER PERSPECTIVES ON THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN FINANCIAL TECHNOLOGY by Sadhana Tiwari, Mohammad Asif, Amar Johri, Mohammad Wasiq, Mohd Imran

    Published 2024-12-01
    “…Structural equation modeling was employed to study the relationships between the adoption of fintech AI and its predictors, namely Perceived Usefulness, Perceived Privacy and Security, Perceived Ease of Use, and Satisfaction of Fintech AI. …”
    Get full text
    Article