Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
241
Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations
Published 2024-12-01“…The combination of ALO, FFO, and Q‐learning techniques offers a practical solution to evolving data privacy challenges and enhances flexibility in various use case scenarios.…”
Get full text
Article -
242
Federated intelligence for smart grids: a comprehensive review of security and privacy strategies
Published 2025-07-01“…The paper highlights critical gaps and outlines future research directions for improving smart grid resilience using federated intelligence.…”
Get full text
Article -
243
Enhancing Privacy While Preserving Context in Text Transformations by Large Language Models
Published 2025-01-01“…Despite the convenience, many users are unaware of the risks posed to their sensitive and personal data. This study addresses this issue by presenting a comprehensive solution to prevent personal data leakage using online tools. …”
Get full text
Article -
244
The method for approximate continuous Skyline query based on privacy protection in road network
Published 2025-07-01“…Abstract Existing road network continuous Skyline queries often neglect user location privacy and data privacy protection. This paper proposes a method for Approximate Continuous Skyline Query with Privacy Protection in road network (ACPP) environments to address these issues. …”
Get full text
Article -
245
Practical and ready-to-use methodology to assess the re-identification risk in anonymized datasets
Published 2025-07-01“…This paper proposes a practical and ready-to-use methodology for re-identification risk assessment, the originality of which is manifold: (1) it is the first to follow well-known risk analysis methods (e.g. …”
Get full text
Article -
246
Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption
Published 2025-05-01“…The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. …”
Get full text
Article -
247
Enhancing Data Security in Distributed Systems Using Homomorphic Encryption and Secure Computation Techniques
Published 2025-01-01“…Traditional solutions tend to use standard techniques like basic data wrapping and cryptographic 'rings'; but, due to the design properties required, they end up as lightweight mechanisms, usually not interpretation-at-all capable because of the need for protecting data during processing - leaving these applications hard to use and maintain long-term, or otherwise, limited to cloud computing and federated learning, when individual data types can be worked on within providers like AWS, Azure, etc, etc; or, even, explaining the results with near total indifference to the underlying big data tools, analytics, or neural architectures. …”
Get full text
Article -
248
-
249
Online Banking Fraud Detection Model: Decentralized Machine Learning Framework to Enhance Effectiveness and Compliance with Data Privacy Regulations
Published 2025-06-01“…This research study explores a decentralized anomaly detection framework using deep autoencoders, designed to meet the dual imperatives of fraud detection effectiveness and user data privacy. …”
Get full text
Article -
250
Social smart city research: interconnections between participatory governance, data privacy, artificial intelligence and ethical sustainable development
Published 2025-01-01“…Four interconnected thematic clusters cropped up: (1) participatory governance, (2) data privacy and security, (3) artificial intelligence and social media, and (4) ethics and sustainable development. …”
Get full text
Article -
251
Balancing Data Privacy and 5G VNFs Security Monitoring: Federated Learning with CNN + BiLSTM + LSTM Model
Published 2024-01-01“…The authorities also require data privacy enhancement in 5G deployment and there is the fact that mobile operators need to inspect data for malicious traffic detection. …”
Get full text
Article -
252
Federated Learning for Privacy-Preserving Severity Classification in Healthcare: A Secure Edge-Aggregated Approach
Published 2025-01-01“…Federated learning (FL) has emerged as a promising paradigm for privacy-preserving machine learning across decentralized healthcare systems. …”
Get full text
Article -
253
Health data sharing in Germany: individual preconditions, trust and motives
Published 2025-02-01Get full text
Article -
254
Towards practical intrusion detection system over encrypted traffic*
Published 2021-05-01“…Abstract Privacy and data confidentiality are today at the heart of many discussions. …”
Get full text
Article -
255
Privacy-preserving record linkage by a federated trusted third party (fTTP) – unlocking medical research potential in Germany
Published 2025-06-01“…In order to comply with the relevant data protection requirements, a privacy-preserving record linkage (PPRL) is required to enable cross-site merging of patient records. …”
Get full text
Article -
256
Homomorphic signcryption with public plaintext‐result checkability
Published 2021-09-01“…Two notions of message privacy are also investigated: weak message privacy and message privacy depending on whether the original signcryptions used in the evaluation are disclosed or not. …”
Get full text
Article -
257
On signal encryption at MapReduce and collaborative attribute-based access with ECAs for a preprocessed data set with ML in a privacy-preserving health 4.0
Published 2025-06-01“…To support the cost-effectiveness modeling of data security and privacy in Healthcare 4.0 scenarios, the Privacy-Preserving Health 4.0 (PPH 4.0) framework was proposed by integrating Machine Learning (ML) and Elementary Cellular Automata (ECAs). …”
Get full text
Article -
258
Risk-adaptive access control model for big data in healthcare
Published 2015-12-01“…While dealing with the big data in healthcare,it was difficult for a policy maker to foresee what information a doctor may need,even to make an accurate access control policy.To deal with it,a risk-based access control model that regulates doctors’ access rights adaptively was proposed to protect patient privacy.This model analyzed the history of access,applies the EM algorithm and the information entropy technique to quantify the risk of privacy violation.Using the quantified risk,the model can detect and control the over-accessing and exceptional accessing of patients’ data.Experimental results show that this model is effective and more accurate than other models.…”
Get full text
Article -
259
Risk-adaptive access control model for big data in healthcare
Published 2015-12-01“…While dealing with the big data in healthcare,it was difficult for a policy maker to foresee what information a doctor may need,even to make an accurate access control policy.To deal with it,a risk-based access control model that regulates doctors’ access rights adaptively was proposed to protect patient privacy.This model analyzed the history of access,applies the EM algorithm and the information entropy technique to quantify the risk of privacy violation.Using the quantified risk,the model can detect and control the over-accessing and exceptional accessing of patients’ data.Experimental results show that this model is effective and more accurate than other models.…”
Get full text
Article -
260
Algorithm of blockchain data provenance based on ABE
Published 2019-11-01“…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
Get full text
Article