Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
useds » used (Expand Search), uses (Expand Search), usedds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
521
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01“…The ViT (vision transformer) inference framework, which was widely used in image processing, was found to have a risk of leaking user privacy data. …”
Get full text
Article -
522
Sharing images of children on social media: British motherhood influencers and the privacy paradox.
Published 2025-01-01“…This study examines the extent to which popular British motherhood influencers infringe on their children's privacy by posting images of them online. We conducted a content analysis of 5,253 Instagram posts from ten UK-based influencers, supplemented by self-reported data from these influencers. …”
Get full text
Article -
523
Privacy Issues, Attacks, Countermeasures and Open Problems in Federated Learning: A Survey
Published 2024-12-01“…Aim This study presents a cutting-edge survey on privacy issues, security attacks, countermeasures and open problems in FL.Methodology The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach was used to determine the research domain, establish a search query, and analyze all retrieved articles from the selected scientific databases (i.e. …”
Get full text
Article -
524
PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach
Published 2025-03-01Get full text
Article -
525
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
Published 2025-01-01“…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
Get full text
Article -
526
CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions
Published 2025-02-01“…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
Get full text
Article -
527
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01“…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
Get full text
Article -
528
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The proposed auditing scheme in this paper can be used to guarantee the correctness and the completeness of the stored data in 5G-enabled software-defined edge computing. …”
Get full text
Article -
529
A clustering-based approach for classifying data streams using graph matching
Published 2025-02-01“…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
Get full text
Article -
530
Synthetic healthcare data utility with biometric pattern recognition using adversarial networks
Published 2025-03-01Get full text
Article -
531
Secure and trusted data sharing in smart healthcare using blockchain and IoT integration
Published 2025-08-01“…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
Get full text
Article -
532
Effective deep learning aided vehicle classification approach using Seismic Data
Published 2025-07-01“…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
Get full text
Article -
533
ECDSA-based tamper detection in medical data using a watermarking technique
Published 2024-01-01“…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
Get full text
Article -
534
A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards
Published 2025-08-01“…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
Get full text
Article -
535
A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond
Published 2025-01-01“…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
Get full text
Article -
536
Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies
Published 2023-07-01“… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
Get full text
Article -
537
A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation
Published 2019-06-01“…It is necessary for telehealth care providers to demonstrate that they have taken sufficient actions to protect their patients’ data security and privacy. The government provided a HIPAA audit protocol that is highly useful for internal security and privacy auditing on health care systems, however, this protocol includes extensive details that are not always specific to telehealth and therefore is difficult to be used by telehealth practitioners. …”
Get full text
Article -
538
Artificial Intelligence–Enabled Facial Privacy Protection for Ocular Diagnosis: Development and Validation Study
Published 2025-07-01“… Abstract BackgroundFacial biometric data, while valuable for clinical applications, poses substantial privacy and security risks. …”
Get full text
Article -
539
Prompts, privacy, and personalized learning: integrating AI into nursing education—a qualitative study
Published 2025-04-01“…However, questions remain regarding the ethical use of AI-generated outputs, data privacy concerns, and limitations in recognizing emotional nuances. …”
Get full text
Article -
540
PrivItem2Vec: A privacy-preserving algorithm for top-N recommendation
Published 2021-12-01“…To significantly protect the user’s privacy and prevent the user’s preference disclosure from leading to malicious entrapment, we present a combination of the recommendation algorithm and the privacy protection mechanism. …”
Get full text
Article