Search alternatives:
useddds » usedddds (Expand Search)
usedddds » useddddds (Expand Search)
use » used (Expand Search)
Showing 1,021 - 1,040 results of 2,784 for search '(((( useddds OR usedddds) OR usedddds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.16s Refine Results
  1. 1021

    HA-Med: A Blockchain-Based Solution for Sharing Medical Data with Hidden Policies and Attributes by Xiaohui Yang, Jing Liu

    Published 2024-01-01
    “…Furthermore, the scheme supports attribute revocation and forward secrecy to enhance user privacy. The security of HA-Med is rigorously verified through theoretical analysis, and its feasibility is demonstrated through experiments conducted using the Java-based JPBC library.…”
    Get full text
    Article
  2. 1022

    GABs: A Game-Based Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks by Tristan Daladier Engouang, Yun Liu, Zhenjiang Zhang

    Published 2015-03-01
    “…The content herein models homogeneous WSN environment of highly linked nodes, in a theoretical game with synchronized actions, where, in order to transmit their readings securely across the network in some level of hierarchy, using the technique of data aggregation, sensor nodes with communication and computational resources constraint should establish trusted and direct links between their neighbors for the privacy and integrity of their data against faulty nodes, while ensuring energy saving. …”
    Get full text
    Article
  3. 1023

    Security access permission authentication simulation of multi-source network big data based on blockchain by Bin LI, Hui HE, Zhongying ZHAO, Jingwei GUO

    Published 2024-02-01
    “…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
    Get full text
    Article
  4. 1024

    F-DATA: A Fugaku Workload Dataset for Job-centric Predictive Modelling in HPC Systems by Francesco Antici, Andrea Bartolini, Jens Domke, Zeynep Kiziltan, Keiji Yamamoto

    Published 2025-07-01
    “…The encoding is based on a Natural Language Processing model and retains sensitive but useful job information for prediction purposes without violating privacy concerns.…”
    Get full text
    Article
  5. 1025

    CGFL: A Robust Federated Learning Approach for Intrusion Detection Systems Based on Data Generation by Shu Feng, Luhan Gao, Leyi Shi

    Published 2025-02-01
    “…It employs a data generator that integrates artificially generated data with the existing data from local clients by employing label correction and data generation techniques. …”
    Get full text
    Article
  6. 1026

    Next Arrival and Destination Prediction via Spatiotemporal Embedding with Urban Geography and Human Mobility Data by Pengjiang Li, Zaitian Wang, Xinhao Zhang, Pengfei Wang, Kunpeng Liu

    Published 2025-02-01
    “…In this paper, we develop an embedding method to predict the next arrival using the origin–destination (O-D) pair trajectory information and point of interest (POI) data. …”
    Get full text
    Article
  7. 1027

    How machine learning on real world clinical data improves adverse event recording for endoscopy by Stefan Wittlinger, Isabella C. Wiest, Mahboubeh Jannesari Ladani, Jakob Nikolas Kather, Matthias P. Ebert, Fabian Siegel, Sebastian Belle

    Published 2025-07-01
    “…This study evaluates a machine learning-based approach for systematically detecting endoscopic adverse events from real-world clinical metadata, including structured hospital data such as ICD-codes and procedure timings. Using a random forest classifier detecting adverse events perforation, bleeding, and readmission, we analysed 2490 inpatient cases, achieving significant improvements over baseline prediction accuracy. …”
    Get full text
    Article
  8. 1028

    Evolution, topics and relevant research methodologies in business intelligence and data analysis in the academic management of higher education institutions. A literature review by M. Correa-Peralta, J. Vinueza-Martínez, L. Castillo-Heredia

    Published 2025-03-01
    “…In the digital era, Business Intelligence (BI) and data analytics have become essential for optimizing academic management in higher education institutions. …”
    Get full text
    Article
  9. 1029

    Unraveling the role of data sharing in open finance diffusion: an evolutionary game approach on complex networks by Dongqing Chen, Chaoqun Ma, Liwei Zhang, Lijie Li

    Published 2025-05-01
    “…In this study, we develop a diffusion model using evolutionary game theory on complex networks to explore how data sharing influences lenders’ micro-level decision-making and promotes the macro-level diffusion of open finance. …”
    Get full text
    Article
  10. 1030

    Making trauma ecological momentary assessment studies FAIR: review of design considerations and data procedures by Bryce Hruska, Marilyn L. Piccirillo, Lonneke I. M. Lenferink, Maria L. Pacella-LaBarbara, Ateka A. Contractor, Matthew Price, Talya Greene

    Published 2025-12-01
    “…Many challenges remain for the implementation of these practices including balancing privacy concerns and efforts to make trauma EMA data readily shareable.…”
    Get full text
    Article
  11. 1031

    Boosting EEG and ECG Classification with Synthetic Biophysical Data Generated via Generative Adversarial Networks by Archana Venugopal, Diego Resende Faria

    Published 2024-11-01
    “…By addressing the challenges of limited biophysical data, including privacy concerns and restricted volunteer availability, our model generates realistic synthetic waveforms learned from real data. …”
    Get full text
    Article
  12. 1032

    A Robust Image Encryption Protocol for Secure Data Sharing in Brain Computer Interface Applications by Sunil Prajapat, Pankaj Kumar, Kashish Chaudhary, Kranti Kumar, Gyanendra Kumar, Ali Kashif Bashir

    Published 2025-01-01
    “…However, the susceptibility of BCI data to tampering during transmission underscores the critical need for robust security and privacy measures. …”
    Get full text
    Article
  13. 1033

    The ICE–Lexis nexus: An argument against use of commercial databases in immigration enforcement by Jessica P. Needle, Alan Rubel

    Published 2025-09-01
    “…The plaintiffs allege that use of Accurint (the product Lexis sells to U.S. …”
    Get full text
    Article
  14. 1034

    Determinants of Attitude and Intention to Use Virtual Credit Cards in Indonesia by Budi Hartono, Suci Nasehati Sunaningsih, Mumpuni Wahyudiarti Sitoresmi

    Published 2025-03-01
    “…Data analysis was conducted using path analysis, revealing that all variables significantly influence trust and perceived risk, with t-statistics below 0.05 and 0.01. …”
    Get full text
    Article
  15. 1035

    An Adaptive Window Size Selection Method for Differentially Private Data Publishing over Infinite Trajectory Stream by Geonhyoung Jo, Kangsoo Jung, Seog Park

    Published 2018-01-01
    “…Differential privacy techniques are being used as a de facto standard to prevent such privacy violation caused by data analysis. …”
    Get full text
    Article
  16. 1036

    A secure and scalable blockchain-based model for electronic health record management by Kalyani Pampattiwar, Pallavi Chavan

    Published 2025-04-01
    “…Abstract In the contemporary digital era, the storage of Electronic Health Records on open platforms presents significant security and privacy challenges. Addressing these concerns requires standardizing the clinical deployment models currently in use. …”
    Get full text
    Article
  17. 1037

    The Use of Artificial Intelligence in Medical Diagnostics: Opportunities, Prospects and Risks by Nataliia Sheliemina

    Published 2024-07-01
    “…The AI integration in healthcare can revolutionise the industry by improving patient outcomes, optimising resource allocation, and reducing operational costs. However, the AI use in medicine carries certain risks related to ethics and data privacy, shortcomings in the quality of data for training algorithms, and importance of protecting against cyberthreats. …”
    Get full text
    Article
  18. 1038

    Secure federated distillation GAN for CIDS in industrial CPS by Junwei LIANG, Geng YANG, Maode MA, Sadiq Muhammad

    Published 2023-12-01
    “…Aiming at the data island problem caused by the imperativeness of confidentiality of sensitive information, a secure and collaborative intrusion detection system (CIDS) for industrial cyber physical systems (CPS) was proposed, called PFD-GAN.Specifically, a novel semi-supervised intrusion detection model was firstly developed by improving external classifier-generative adversarial network (EC-GAN) with Wasserstein distance and label condition, to strengthen the classification performance through the use of synthetic data.Furthermore, local differential privacy (LDP) technology was incorporated into the training process of developed EC-GAN to prevent sensitive information leakage and ensure privacy and security in collaboration.Moreover, a decentralized federated distillation (DFD)-based collaboration was designed, allowing multiple industrial CPS to collectively build a comprehensive intrusion detection system (IDS) to recognize the threats under the entire cyber systems without sharing a uniform template model.Experimental evaluation and theory analysis demonstrate that the proposed PFD-GAN is secure from the threats of privacy leaking and highly effective in detecting various types of attacks on industrial CPS.…”
    Get full text
    Article
  19. 1039

    Large language models generating synthetic clinical datasets: a feasibility and comparative analysis with real-world perioperative data by Austin A. Barr, Joshua Quan, Eddie Guo, Emre Sezgin, Emre Sezgin

    Published 2025-02-01
    “…Synthetic data offers a promising solution to preserve privacy while enabling broader data access. …”
    Get full text
    Article
  20. 1040

    Ethical aspects of the use of social networks during the employment process by Branislav Sančanin

    Published 2022-01-01
    “…Employers violate the privacy of potential candidates by obtaining data in this manner without making prior notification and receiving consent, which opens up a whole range of complex ethical and legal issues, especially in the light of the large number of fake profiles and pages on social networks. …”
    Get full text
    Article