Showing 961 - 980 results of 2,784 for search '(((( useddds OR useddds) OR uses) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.24s Refine Results
  1. 961

    Blockchain-enabled federated learning with edge analytics for secure and efficient electronic health records management by Munusamy S, Jothi K R

    Published 2025-07-01
    “…Abstract The rapid adoption of Federated Learning (FL) in privacy-sensitive domains such as healthcare, IoT, and smart cities underscores its potential to enable collaborative machine learning without compromising data ownership. …”
    Get full text
    Article
  2. 962

    Federated learning with tensor networks: a quantum AI framework for healthcare by Amandeep Singh Bhatia, David E Bernal Neira

    Published 2024-01-01
    “…The healthcare industry frequently handles sensitive and proprietary data, and due to strict privacy regulations, it is often reluctant to share it directly. …”
    Get full text
    Article
  3. 963

    Legal Implications of Consumer Personal Data Misuse by OJK Licensed Fintech Lending Operators by Rahmadi Indra Tektona

    Published 2024-04-01
    “…The Investment Alert Task Force has taken firm action against illegal fintech lending that has the potential to break the law, along with the Indonesian National Police and the Ministry of Communication and Information. Privacy is violated when personal data are collected and shared. …”
    Get full text
    Article
  4. 964

    Hierarchical Swin Transformer Ensemble with Explainable AI for Robust and Decentralized Breast Cancer Diagnosis by Md. Redwan Ahmed, Hamdadur Rahman, Zishad Hossain Limon, Md Ismail Hossain Siddiqui, Mahbub Alam Khan, Al Shahriar Uddin Khondakar Pranta, Rezaul Haque, S M Masfequier Rahman Swapno, Young-Im Cho, Mohamed S. Abdallah

    Published 2025-06-01
    “…However, deep learning (DL) models used in healthcare face significant challenges, including concerns about data privacy, domain-specific overfitting, and limited interpretability. …”
    Get full text
    Article
  5. 965

    Pursuit of Digital Innovation in Psychiatric Data Handling Practices in Ireland: Comprehensive Case Study by Rana Zeeshan, John Bogue, Amna Gill, Mamoona Naveed Asghar

    Published 2025-06-01
    “…ObjectiveThis study’s objective involves examining the state of data handling practices in the Irish Mental Health Services (MHS), identifying the shortcomings regarding privacy, security, and usability of psychiatric case notes, and proposing an innovative technological solution that addresses most of the surfaced challenges. …”
    Get full text
    Article
  6. 966

    COMPUTATIONAL THINKING IN THE PROBLEM OF RELIABLE AND SECURE DATA TRANSMISSION OVER A COMMUNICATION CHANNEL by Kirill V. Agievets, Andarbek Z. Ahmadov, Grigory A. Ivanenko, Mikhail A. Ivanov, Mikael A. Kondakhchan, Andrey V. Starikovsky

    Published 2025-05-01
    “…There are three problems that have to be solved when transmitting data over communication channels: detection and correction of errors caused by interference in communication channels; ensuring of transmitted data privacy; protection against injection of false data. …”
    Get full text
    Article
  7. 967

    Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding by Haiyong WANG, Mengning JI

    Published 2023-12-01
    “…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
    Get full text
    Article
  8. 968

    Data-Centric Fine-Tuning of Small Language Models for Automatic Extraction of Technical Requirements by Leopold Muller, Nina Schwarz, Lars Bocking, Andreas Bereczuk, Hanno Stagge, Wolfgang Kratsch, Niklas Kuhl

    Published 2025-01-01
    “…These results underscore the potential of data-centric fine-tuning for adapting small language models to high-stakes, privacy-sensitive tasks, offering a scalable alternative to LLMs enabling their applications to real-world use cases.…”
    Get full text
    Article
  9. 969

    Enhancing tourism management through big data: Design and implementation of an integrated information system by Lulu Wang

    Published 2024-10-01
    “…The system combines data from several sources, including booking systems, social media platforms, and tracking devices, and addresses issues related to data privacy, quality, and integration. …”
    Get full text
    Article
  10. 970
  11. 971

    Knowledge abstraction and filtering based federated learning over heterogeneous data views in healthcare by Anshul Thakur, Soheila Molaei, Pafue Christy Nganjimi, Fenglin Liu, Andrew Soltan, Patrick Schwab, Kim Branson, David A. Clifton

    Published 2024-10-01
    “…Abstract Robust data privacy regulations hinder the exchange of healthcare data among institutions, crucial for global insights and developing generalised clinical models. …”
    Get full text
    Article
  12. 972

    Legal Reform of Artificial Intelligence's Liability to Personal Data Perspectives of Progressive Legal Theory by Junaidi Junaidi, Pujiono Pujiono, Rozlinda Mohamed Fadzil

    Published 2024-04-01
    “…The research found that the use of Artificial Intelligence in collecting and analysing personal data can threaten individual privacy. …”
    Get full text
    Article
  13. 973

    Traffic concealed data detection method based on contrastive learning and pre-trained Transformer by HE Shuai, ZHANG Jingchao, XU Di, JIANG Shuai, GUO Xiaowei, FU Cai

    Published 2025-03-01
    “…To solve the problems of characterizing representing massive encrypted traffic, perceiving malicious behaviors, and identifying the ownership of privacy data, a traffic concealed data detection method was proposed based on contrastive learning and pre-trained Transformer. …”
    Get full text
    Article
  14. 974

    Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing by Ruizhong DU, Tianhe ZHANG, Pengliang SHI

    Published 2022-06-01
    “…Objectives: Although the traditional attribute-based encryption scheme achieves one-to-many access control,there are still challenges such as single point of failure,low efficiency,no support for data sharing,and privacy leakage.To solve these problems,a ciphertext policy hidden access control scheme based on blockchain and supporting data sharing is proposed. …”
    Get full text
    Article
  15. 975

    The impact of big data analytics on digital marketing decision-making: A comprehensive analysis by Roberta Bajrami, Adelina Gashi, Kaltrina Bajraktari, Etleva Namligjiu

    Published 2025-08-01
    “…An online questionnaire, delivered through SurveyMonkey, achieved a 92% response rate (n = 230), capturing data on tool usage, benefits, and problems. Data pre-processing includes duplicate removal and mean imputation, followed by K-means clustering and logistic regression analysis using Python (scikit-learn, pandas). …”
    Get full text
    Article
  16. 976

    Sense (and) the city: From Internet of Things sensors and open data platforms to urban observatories by Vijay Kumar, Sam Gunner, Maria Pregnolato, Patrick Tully, Nektarios Georgalas, George Oikonomou, Stylianos Karatzas, Theo Tryfonas

    Published 2024-12-01
    “…Anyone can monitor from their fitness to the air quality of their immediate environment using everyday technologies. With caveats around privacy and accuracy, such data could even complement those collected by authorities at city‐scale, for validating or improving policies. …”
    Get full text
    Article
  17. 977

    Optimising Data Analytics to Enhance Postgraduate Student Academic Achievement: A Systematic Review by Mthokozisi Masumbika Ncube, Patrick Ngulube

    Published 2024-11-01
    “…As such, this review aimed to identify data analytics approaches used by HEIs and explore challenges and best practices in their application. …”
    Get full text
    Article
  18. 978

    Substation Inspection Safety Risk Identification Based on Synthetic Data and Spatiotemporal Action Detection by Chengcheng Liu, Weihua Zhang, Weijin Xu, Bo Lu, Weijie Li, Xuefeng Zhao

    Published 2025-04-01
    “…Model training is conducted using three datasets: a real dataset, a synthetic dataset generated via a VWP, and a mixed dataset comprising both real and synthetic data. …”
    Get full text
    Article
  19. 979

    SQUiD: ultra-secure storage and analysis of genetic data for the advancement of precision medicine by Jacob Blindenbach, Jiayi Kang, Seungwan Hong, Caline Karam, Thomas Lehner, Gamze Gürsoy

    Published 2024-12-01
    “…Due to the sensitive nature of this data and varied laws and regulations, additional security measures are needed to ensure data privacy. …”
    Get full text
    Article
  20. 980

    Data Sovereignty and Open Sharing: Reconceiving Benefit-Sharing and Governance of Digital Sequence Information by Masanori Arita

    Published 2025-02-01
    “…Using the example of the COVID-19 pandemic, the tension between open science principles and data control rights is explained. …”
    Get full text
    Article