Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
uses » used (Expand Search), useds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
uses » used (Expand Search), useds (Expand Search)
useddds » usedddds (Expand Search)
use » used (Expand Search)
-
881
Real-Time Tracking of Diagnostic Discrepancies in Electronic Health Records for Improved Predictive Modeling
Published 2025-01-01“…This paper highlights the critical role of diagnostic discrepancy statistics in overcoming these challenges and proposes a standardized data schema that ensures interoperable, real-time, and historical data without compromising patient privacy. …”
Get full text
Article -
882
Facebook as a Surveillance Tool: From the Perspective of the User
Published 2012-09-01“…With the increasing use of online social networks such as Facebook in recent years, a lot of research has been focussing on the privacy issue of the network. …”
Get full text
Article -
883
Patient and clinician experiences with the implementation of telemedicine and related adaptations in office-based buprenorphine treatment during the COVID-19 pandemic: a qualitativ...
Published 2025-03-01“…We coded all interview data and used a thematic analysis approach to understand how telemedicine impacted treatment quality and engagement in care, as well as preferences for using telemedicine moving forward. …”
Get full text
Article -
884
Data Confidentiality in Artificial Intelligence-Assisted Medicine: The Main Ethical Issue
Published 2025-05-01“…Although there are many potential advantages of using AI to enhance medical care, they must be weighed against potential risks to patient privacy and data security. …”
Get full text
Article -
885
Securing gait recognition with homomorphic encryption
Published 2025-08-01“…At the same time, they raise significant privacy concerns because compromised biometric data cannot be revoked. …”
Get full text
Article -
886
Balancing public safety and civil rights: Successes and challenges of AI-based video surveillance systems
Published 2025-05-01“…AI-powered video analytics has had a profound impact on the right to privacy, particularly due to the mass collection of biometric data and automated profiling, sparking debate over compliance with international standards such as the General Data Protection Regulation and the Convention for the Protection of Human Rights. …”
Get full text
Article -
887
-
888
A Digital Twin Comprehensive Monitoring System for Ship Equipment
Published 2024-12-01“…In this study, a comprehensive digital twin monitoring system for ship equipment was designed and implemented, including the system architecture, key technologies, and applications. Through data-driven models and operational monitoring system analysis, our PSO-SVM-based time series prediction method demonstrated excellent predictive capabilities for catamaran equipment, achieving efficient fault warnings using a threshold method. …”
Get full text
Article -
889
Political Factors in Global Communication Platforms: Pavel Durov’s Case
Published 2025-06-01“…The French authorities applied institutional pressure by using institutional advantages to achieve control over the private data of Telegram users. …”
Get full text
Article -
890
HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework
Published 2025-06-01“…Abstract Protecting user privacy is essential in machine learning research, especially in the context of data collection. …”
Get full text
Article -
891
Live research dialogue on the benefits, costs and utility of synthetic data for researchers
Published 2024-11-01“… • To discuss governance frameworks essential for the routine creation, dissemination, and use of synthetic data. • Drawing on the experience of international participants, explore measures to mitigate risks to data privacy and public perception relating to synthetic data creation and use whilst maximising its utility. …”
Get full text
Article -
892
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01“…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
Get full text
Article -
893
Efficient IoT User Authentication Protocol with Semi-Trusted Servers
Published 2025-03-01Get full text
Article -
894
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01“…In applications of public-key encryption schemes, anonymity(key-privacy) as well as security(data-privacy) is useful and widely desired.Recently Canetti-Halevi-Katz proposed a generic and elegant IBE-based construction for(tra-ditional) public-key encryption, whose performance was improved by another construction proposed by Boneh-Katz.To analyze such two constructions’ anonymity, two new and generic concepts in IBE scheme,"master-key anonymity"and"relevant master-key anonymity"were proposed and two different sufficient conditions for chosen-ciphertext anonymity were proved for Canetti-Halevi-Katz and Boneh-Katz constructions.…”
Get full text
Article -
895
Artificial Intelligence in Retail: Benefits and Risks Associated With Mobile Shopping Applications
Published 2021-02-01“…The objective of the study is to examine the practical implications of using artificial intelligence (AI) based solutions in the case of retail mobile applications, to enhance the online shopping experience and improve the engagement by also having in mind the privacy of the users. …”
Get full text
Article -
896
-
897
Telemedicine data secure sharing scheme based on heterogeneous federated learning
Published 2024-10-01“…However, the reuse process of telemedicine user privacy data based on federated learning also faces significant challenges. …”
Get full text
Article -
898
Promises and Pitfalls of Internet Search Data in Mental Health: Critical Review
Published 2025-02-01“…In this paper, we discuss the various problems related to the use of these data in research and clinical practice, including privacy concerns, integration with clinical information, and technical limitations. …”
Get full text
Article -
899
Establishing A Personal Data Protection Agency for E-Commerce in Indonesia
Published 2024-12-01“… The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. …”
Get full text
Article -
900
A Data-Driven Approach for Generating Synthetic Load Profiles with GANs
Published 2025-07-01“…The generation of realistic electrical load profiles is essential for advancing smart grid analytics, demand forecasting, and privacy-preserving data sharing. Traditional approaches often rely on large, high-resolution datasets and complex recurrent neural architectures, which can be unstable or ineffective when training data are limited. …”
Get full text
Article