Search alternatives:
useddds » usedddds (Expand Search)
usedds » useddds (Expand Search)
use » used (Expand Search)
Showing 1,061 - 1,080 results of 2,784 for search '(((( useddds OR useddds) OR usedds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.17s Refine Results
  1. 1061

    Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks by Amarudin Daulay, Kalamullah Ramli, Ruki Harwahyu, Taufik Hidayat, Bernardi Pranggono

    Published 2025-07-01
    “…By preserving patient data privacy at the edge, FedGCL enhances system resilience without sacrificing model performance. …”
    Get full text
    Article
  2. 1062

    Quantitative and Spatially Explicit Clustering of Urban Grocery Shoppers in Montreal: Integrating Loyalty Data with Synthetic Population by Duo Zhang, Laurette Dubé, Antonia Gieschen, Catherine Paquet, Raja Sengupta

    Published 2025-04-01
    “…While integrating loyalty data with synthetic populations mitigates privacy concerns, challenges remain regarding data sparsity and demographic inconsistencies. …”
    Get full text
    Article
  3. 1063

    Inferring Travel Modes from Cellular Signaling Data Based on the Gated Recurrent Unit Neural Network by Yanchen Wang, Fei Yang, Li He, Haode Liu, Li Tan, Cheng Wang

    Published 2023-01-01
    “…Moreover, in cooperation with the operator, we organized an experiment collecting cellular signaling data, as well as the corresponding GPS data. Using the collected dataset as ground-truth data, the performance of the method presented in this paper and other popular methods is verified and compared. …”
    Get full text
    Article
  4. 1064

    Integrating human biomonitoring exposure data into a primary care morbidity database: a feasibility study by Pieter Jansen, Elly Den Hond, Katleen De Brouwere, Endale Alemayehu Ali, Hamid Yimam Hassen, Ilona Gabaret, Gijs Van Pottelbergh

    Published 2025-01-01
    “…This feasibility study uses exposure data from one of the completed PFAS HBM studies, which included 796 individuals. …”
    Get full text
    Article
  5. 1065

    Integrating patient metadata and pathogen genomic data: advancing pandemic preparedness with a multi-parametric simulator by Bonjean Maxime, Ambroise Jérôme, Orchard Francisco, Sentis Alexis, Hurel Julie, Hayes Jessica S., Connolly Máire A., Jean-Luc Gala

    Published 2025-04-01
    “…However, data sharing between EU member states faces challenges due to disparities in data collection practices, standardisation, legal frameworks, privacy, security regulations, and resource allocation. …”
    Get full text
    Article
  6. 1066

    A review on the impact of big data analytics in transforming agricultural practices, food processing, and preservation strategies by Jelili Babatunde Hussein, Tilahun Seyoum Workneh, Alaika Kassim, Khuthadzo Ntsowe, Sileshi F. Melesse, Hany S. El-Mesery

    Published 2025-12-01
    “…Big data is used a lot in food distribution and retail, but not enough in production, making decisions, and making things last. …”
    Get full text
    Article
  7. 1067

    Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data by Mehwish Naseer, Farhan Ullah, Samia Ijaz, Hamad Naeem, Amjad Alsirhani, Ghadah Naif Alwakid, Abdullah Alomari

    Published 2025-01-01
    “…The first step involves generating synthetic TCP malware traffic data with malicious content using GPT-2. These data are then preprocessed and used in the second step, which focuses on malware classification. …”
    Get full text
    Article
  8. 1068

    Public Perception of the Brain-Computer Interface Based on a Decade of Data on X: Mixed Methods Study by Mohammed A Almanna, Lior M Elkaim, Mohammed A Alvi, Jordan J Levett, Ben Li, Muhammad Mamdani, Mohammed Al‑Omran, Naif M Alotaibi

    Published 2025-06-01
    “…The presence of fear underscores the need to address ethical concerns, particularly around data privacy, safety, and transparency. Transparent communication and ethical considerations are essential for building public trust and reducing apprehension. …”
    Get full text
    Article
  9. 1069
  10. 1070

    Leveraging Open-Source Large Language Models for Data Augmentation in Hospital Staff Surveys: Mixed Methods Study by Carl Ehrett, Sudeep Hegde, Kwame Andre, Dixizi Liu, Timothy Wilson

    Published 2024-11-01
    “…ConclusionsThe study demonstrates the value of data augmentation with open-source LLMs, highlights the importance of privacy and ethical considerations when using LLMs, and suggests future directions for research in this field.…”
    Get full text
    Article
  11. 1071

    Reversible Adversarial Examples with Minimalist Evolution for Recognition Control in Computer Vision by Shilong Yang, Lu Leng, Ching-Chun Chang, Chin-Chen Chang

    Published 2025-01-01
    “…As artificial intelligence increasingly automates the recognition and analysis of visual content, it poses significant risks to privacy, security, and autonomy. Computer vision systems can surveil and exploit data without consent. …”
    Get full text
    Article
  12. 1072

    AI-based treatment of psychological conditions: the potential use, benefits and drawbacks by Michael Baber, Barbara Baker

    Published 2025-04-01
    “…This suggests that translating small-scale, short-term trials into effective large-scale, longer-term real-world applications may be a particular challenge. While the use of AI in mental healthcare appears to have potential, its use also raises important ethical and privacy concerns, potential risk of bias, and the risk of unintended consequences such as over-diagnosis or unnecessary treatment of normal emotional experiences. …”
    Get full text
    Article
  13. 1073

    Horizontal federated learning and assessment of Cox models by Frank Westers, Sam Leder, Lucia Tealdi

    Published 2025-06-01
    “…However, training an accurate model requires access to a sufficiently large dataset, which is often challenging due to data fragmentation. A potential solution is to combine data from multiple medical institutions, but privacy constraints typically prevent direct data sharing. …”
    Get full text
    Article
  14. 1074

    Overcoming Data Scarcity in Roadside Thermal Imagery: A New Dataset and Weakly Supervised Incremental Learning Framework by Arnd Pettirsch, Alvaro Garcia-Hernandez

    Published 2025-04-01
    “…Roadside camera systems are commonly used for traffic data collection, yet conventional optical systems are limited by poor performance in varying weather and light conditions and are often restricted by data privacy regulations. …”
    Get full text
    Article
  15. 1075
  16. 1076

    A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare by Mamta Kumari, Mahendra Gaikwad, Salim A. Chavan

    Published 2025-05-01
    “…Abstract The latest developments in the Internet of Medical Things (IoMT) have transformed healthcare, allowing for the easy transmission of sensitive data across networked medical equipment. However, this interconnection has produced a fertile environment for cybersecurity threats, necessitating the use of sophisticated intrusion detection systems. …”
    Get full text
    Article
  17. 1077

    Federated two-stage transformer-based network for intrusion detection in non-IID data of controller area networks by Yuan Zhang, Jiaru Song, Yongxiong Sun, Zhanheng Gao, Zhe Hu, Minghui Sun

    Published 2025-05-01
    “…At the same time, the data from individual providers often exhibit imbalance and a scarcity of anomalous samples, leading to suboptimal model performance when using a single dataset. …”
    Get full text
    Article
  18. 1078

    Building and Sustaining Public Trust in Health Data Sharing for Musculoskeletal Research: Semistructured Interview and Focus Group Study by Zainab K Yusuf, William G Dixon, Charlotte Sharp, Louise Cook, Søren Holm, Caroline Sanders

    Published 2024-10-01
    “… BackgroundAlthough many people are supportive of their deidentified health care data being used for research, concerns about privacy, safety, and security of health care data remain. …”
    Get full text
    Article
  19. 1079

    DIGITAL DATA-DRIVEN APPROACHES TO MONITOR AND FOSTER WELL-BEING AMONG EXCHANGE STUDENTS DURING DISRUPTIVE EVENTS by Anastasiia Volkova, Nadiia Dets, Olshevska Olga, Yulia Tsarynna, Liudmyla Fihurska

    Published 2025-07-01
    “…Special attention is given to ethical data use, privacy protection, and accessibility of technologies within educational contexts. …”
    Get full text
    Article
  20. 1080

    The Use of AI in Elementary School Learning: A Systematic Literature Review by Natalina Purba, Desti Pujiati, Partohap Saut Raja Sihombing, Hendra Simanjuntak, Desi Sijabat

    Published 2025-03-01
    “…However, the study also highlights challenges such as inadequate infrastructure, teacher competence, and ethical concerns regarding data privacy and algorithmic bias. Addressing these challenges requires investment in infrastructure, ongoing teacher training, and clear ethical guidelines to ensure equitable access to AI-driven learning. …”
    Get full text
    Article