Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
Showing 61 - 80 results of 2,784 for search '(((( useddds OR usedddds) OR usedddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.20s Refine Results
  1. 61

    Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage by Feng Tian, Xiaolin Gui, Jian An, Pan Yang, Jianqiang Zhao, Xuejun Zhang

    Published 2014-01-01
    “…As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. …”
    Get full text
    Article
  2. 62

    Explaining the unexplainable: data sharing and privacy in Web 3.0 by Shim Jieun, Kim Jieun

    Published 2025-03-01
    “…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
    Get full text
    Article
  3. 63

    Fair payments for privacy-preserving aggregation of mobile crowdsensing data by Mallikarjun Reddy Dorsala, V.N. Sastry, Sudhakar Chapram

    Published 2022-09-01
    “…To ensure the privacy of the data, privacy-preserving aggregation (PPA) has attracted much attention since it can find aggregated statistics on the encrypted data. …”
    Get full text
    Article
  4. 64

    Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks by Yong-Ki Kim, Hyunjo Lee, Min Yoon, Jae-Woo Chang

    Published 2013-06-01
    “…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
    Get full text
    Article
  5. 65

    A Survey on Association Rule Hiding in Privacy Preserving Data Mining by Arezoo Hekmatyar, Naser Nematbakhsh, Mohammad Naderi Dehkordi

    Published 2024-02-01
    “…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
    Get full text
    Article
  6. 66
  7. 67

    Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization by Xiaoxiao Wang, Jingjing Zhang, Huize Wan, Yuan Yao

    Published 2025-02-01
    “…The primary contribution of this work is an innovative approach that uses metaphorical visual language to represent the flow of user data, algorithms, and information. …”
    Get full text
    Article
  8. 68
  9. 69

    Federated LeViT-ResUNet for Scalable and Privacy-Preserving Agricultural Monitoring Using Drone and Internet of Things Data by Mohammad Aldossary, Jaber Almutairi, Ibrahim Alzamil

    Published 2025-04-01
    “…New drone photography and IoT sensors offer quick, high-resolution, multimodal agricultural data collecting. Regional diversity, data heterogeneity, and privacy problems make it hard to conclude these data. …”
    Get full text
    Article
  10. 70
  11. 71
  12. 72

    Security and privacy within smart cities by Putnik Nenad R., Marković Jana M.

    Published 2025-01-01
    “…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
    Get full text
    Article
  13. 73

    Privacy-Aware Detection for Large Language Models Using a Hybrid BiLSTM-HMM Approach by Maryam Abbasalizadeh, Sashank Narain

    Published 2025-01-01
    “…However, their deployment introduces significant privacy concerns, including the memorization and unintended disclosure of sensitive data. …”
    Get full text
    Article
  14. 74

    Privacy-Preserving Rule Induction Using CKKS by Jihyeon Choi, Jina Choi, Younho Lee, Jung-Sik Hong

    Published 2024-01-01
    “…This study introduces a new approach called homomorphic encryption-based rule induction (HORI) algorithm, designed specifically for scenarios where data confidentiality is critical. This method is constructed using CKKS homomorphic encryption to make it work with encrypted data, thereby enhancing the privacy of both training data and the input for inference. …”
    Get full text
    Article
  15. 75

    On the fidelity versus privacy and utility trade-off of synthetic patient data by Tim Adams, Colin Birkenbihl, Karen Otte, Hwei Geok Ng, Jonas Adrian Rieling, Anatol-Fiete Näher, Ulrich Sax, Fabian Prasser, Holger Fröhlich

    Published 2025-05-01
    “…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
    Get full text
    Article
  16. 76

    Towards Self-Awareness Privacy Protection for Internet of Things Data Collection by Kok-Seng Wong, Myung Ho Kim

    Published 2014-01-01
    “…IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. …”
    Get full text
    Article
  17. 77

    A scoping review of privacy and utility metrics in medical synthetic data by Bayrem Kaabachi, Jérémie Despraz, Thierry Meurers, Karen Otte, Mehmed Halilovic, Bogdan Kulynych, Fabian Prasser, Jean Louis Raisaro

    Published 2025-01-01
    “…Abstract The use of synthetic data is a promising solution to facilitate the sharing and reuse of health-related data beyond its initial collection while addressing privacy concerns. …”
    Get full text
    Article
  18. 78

    Reconsidering big data security and privacy in cloud and mobile cloud systems by Lo'ai A. Tawalbeh, Gokay Saldamli

    Published 2021-09-01
    “…Secondly, we explore the use of P2P Cloud System (P2PCS) for big data processing and analytics. …”
    Get full text
    Article
  19. 79

    A hybrid-security model for privacy-enhanced distributed data mining by Tanzeela Javid, Manoj Kumar Gupta, Abhishek Gupta

    Published 2022-06-01
    “…The accuracy obtained in classification task and clustering task using naïve Bayes and k-means technique is high when different datasets in a privacy-enhanced distributed data mining environment verify the working of the hybrid security model.…”
    Get full text
    Article
  20. 80

    Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data by Shiyue Qin, Fucai Zhou, Zongye Zhang, Zifeng Xu

    Published 2020-01-01
    “…Substring searching on gene sequence data is widely used for analyzing the association between a list of gene mutations and a specific disease. …”
    Get full text
    Article