Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
-
61
Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage
Published 2014-01-01“…As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. …”
Get full text
Article -
62
Explaining the unexplainable: data sharing and privacy in Web 3.0
Published 2025-03-01“…This study leverages explainable AI (XAI) to analyze user privacy behaviors and other privacy attributes, using data from 682 individuals in Korea within a personalized app scenario. …”
Get full text
Article -
63
Fair payments for privacy-preserving aggregation of mobile crowdsensing data
Published 2022-09-01“…To ensure the privacy of the data, privacy-preserving aggregation (PPA) has attracted much attention since it can find aggregated statistics on the encrypted data. …”
Get full text
Article -
64
Hilbert-Curve Based Data Aggregation Scheme to Enforce Data Privacy and Data Integrity for Wireless Sensor Networks
Published 2013-06-01“…To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. …”
Get full text
Article -
65
A Survey on Association Rule Hiding in Privacy Preserving Data Mining
Published 2024-02-01“…Data mining has been used as a public utility in extracting knowledge from databases during recent years. …”
Get full text
Article -
66
Meta-analysis of privacy legal framework: revising the various approaches for balancing privacy risks and usability of healthcare information systems | Meta-analisi del quadro norm...
Published 2022-01-01“…A proactive approach to managing these risks involves the use of privacy by design frameworks and conceptual tools. …”
Get full text
Article -
67
Wormhole Whispers: Reflecting User Privacy Data Boundaries Through Algorithm Visualization
Published 2025-02-01“…The primary contribution of this work is an innovative approach that uses metaphorical visual language to represent the flow of user data, algorithms, and information. …”
Get full text
Article -
68
-
69
Federated LeViT-ResUNet for Scalable and Privacy-Preserving Agricultural Monitoring Using Drone and Internet of Things Data
Published 2025-04-01“…New drone photography and IoT sensors offer quick, high-resolution, multimodal agricultural data collecting. Regional diversity, data heterogeneity, and privacy problems make it hard to conclude these data. …”
Get full text
Article -
70
-
71
Study on choosing the parameter ε in differential privacy
Published 2015-12-01Get full text
Article -
72
Security and privacy within smart cities
Published 2025-01-01“…However, the use of new technologies has raised many questions and caused concerns about the way these technologies are used and the possibilities of misuse of collected data. …”
Get full text
Article -
73
Privacy-Aware Detection for Large Language Models Using a Hybrid BiLSTM-HMM Approach
Published 2025-01-01“…However, their deployment introduces significant privacy concerns, including the memorization and unintended disclosure of sensitive data. …”
Get full text
Article -
74
Privacy-Preserving Rule Induction Using CKKS
Published 2024-01-01“…This study introduces a new approach called homomorphic encryption-based rule induction (HORI) algorithm, designed specifically for scenarios where data confidentiality is critical. This method is constructed using CKKS homomorphic encryption to make it work with encrypted data, thereby enhancing the privacy of both training data and the input for inference. …”
Get full text
Article -
75
On the fidelity versus privacy and utility trade-off of synthetic patient data
Published 2025-05-01“…Summary: The use of synthetic data is a widely discussed and promising solution for privacy-preserving medical research. …”
Get full text
Article -
76
Towards Self-Awareness Privacy Protection for Internet of Things Data Collection
Published 2014-01-01“…IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. …”
Get full text
Article -
77
A scoping review of privacy and utility metrics in medical synthetic data
Published 2025-01-01“…Abstract The use of synthetic data is a promising solution to facilitate the sharing and reuse of health-related data beyond its initial collection while addressing privacy concerns. …”
Get full text
Article -
78
Reconsidering big data security and privacy in cloud and mobile cloud systems
Published 2021-09-01“…Secondly, we explore the use of P2P Cloud System (P2PCS) for big data processing and analytics. …”
Get full text
Article -
79
A hybrid-security model for privacy-enhanced distributed data mining
Published 2022-06-01“…The accuracy obtained in classification task and clustering task using naïve Bayes and k-means technique is high when different datasets in a privacy-enhanced distributed data mining environment verify the working of the hybrid security model.…”
Get full text
Article -
80
Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data
Published 2020-01-01“…Substring searching on gene sequence data is widely used for analyzing the association between a list of gene mutations and a specific disease. …”
Get full text
Article