Suggested Topics within your search.
Suggested Topics within your search.
-
521
Self-Disclosure on Professional Social Networking Sites: A Privacy Calculus Perspective
Published 2023-01-01“…A model contextualizing privacy calculus theory combined with the trust factor was developed and evaluated using 661 quantitative data collected through a questionnaire. …”
Get full text
Article -
522
Privacy preserving strategies for electronic health records in the era of large language models
Published 2025-01-01“…Risks can be reduced by using strategies like privacy-preserving locally deployed LLMs, synthetic data generation, differential privacy, and deidentification. …”
Get full text
Article -
523
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
Published 2025-01-01“…Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. …”
Get full text
Article -
524
EXPLORING USER PERSPECTIVES ON THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN FINANCIAL TECHNOLOGY
Published 2024-12-01“…Structural equation modeling was employed to study the relationships between the adoption of fintech AI and its predictors, namely Perceived Usefulness, Perceived Privacy and Security, Perceived Ease of Use, and Satisfaction of Fintech AI. …”
Get full text
Article -
525
PK-Judge: Enhancing IP Protection of Neural Network Models Using an Asymmetric Approach
Published 2025-03-01Get full text
Article -
526
CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions
Published 2025-02-01“…The integration of a differential privacy algorithm into our CropsDisNet model could establish the benefits of automated crop disease classification without compromising on-farm data privacy by reducing training data leakage. …”
Get full text
Article -
527
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The proposed auditing scheme in this paper can be used to guarantee the correctness and the completeness of the stored data in 5G-enabled software-defined edge computing. …”
Get full text
Article -
528
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01“…Abstract In future applications of UAVs, the frequent transmission of image data raises significant security concerns, particularly regarding the privacy of facial information. …”
Get full text
Article -
529
A clustering-based approach for classifying data streams using graph matching
Published 2025-02-01“…Abstract In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach.In response to challenges such as data encryption, uneven distribution, and user privacy concerns in network traffic classification, this paper presents a clustering-based approach. …”
Get full text
Article -
530
Synthetic healthcare data utility with biometric pattern recognition using adversarial networks
Published 2025-03-01Get full text
Article -
531
Secure and trusted data sharing in smart healthcare using blockchain and IoT integration
Published 2025-08-01“…A device proxy monitors potentially vulnerable IoT devices and uses cryptography to ensure that data remains private. …”
Get full text
Article -
532
Effective deep learning aided vehicle classification approach using Seismic Data
Published 2025-07-01“…Our approach achieves an impressive accuracy of 99.8%, underscoring its potential for robust and precise VC in ITSs using seismic data, particularly in data-scarce scenarios. …”
Get full text
Article -
533
ECDSA-based tamper detection in medical data using a watermarking technique
Published 2024-01-01“…Telemedicine is a form of healthcare delivery that employs communication technology to provide medical care to patients remotely. The use of telemedicine has seen a significant increase in recent years, presenting challenges such as patient privacy, data security, the need for reliable communication technology, and the potential for misdiagnosis without a physical examination. …”
Get full text
Article -
534
A Telehealth Privacy and Security Self-Assessment Questionnaire for Telehealth Providers: Development and Validation
Published 2019-06-01“…It is necessary for telehealth care providers to demonstrate that they have taken sufficient actions to protect their patients’ data security and privacy. The government provided a HIPAA audit protocol that is highly useful for internal security and privacy auditing on health care systems, however, this protocol includes extensive details that are not always specific to telehealth and therefore is difficult to be used by telehealth practitioners. …”
Get full text
Article -
535
A Systematic-Narrative Review of Online Proctoring Systems and a Case for Open Standards
Published 2025-08-01“…However, concerns about data privacy and security, transparency in data processing and decision-making, and the ethical use of online proctoring systems have been raised. …”
Get full text
Article -
536
Prompts, privacy, and personalized learning: integrating AI into nursing education—a qualitative study
Published 2025-04-01“…However, questions remain regarding the ethical use of AI-generated outputs, data privacy concerns, and limitations in recognizing emotional nuances. …”
Get full text
Article -
537
A Survey on Privacy and Security in Distributed Cloud Computing: Exploring Federated Learning and Beyond
Published 2025-01-01“…Particular attention is given to progress in federated learning, which trains a model across multiple devices without sharing the actual data, keeping data private and secure. The survey also highlights federated learning techniques, including secure federated learning, by detecting malicious updates and privacy-preserving federated learning via data encryption, data perturbation, and anonymization, as new paradigms for building responsible computing systems. …”
Get full text
Article -
538
-
539
Privacy Policy Pop-up: A Genre Analysis of Journal Websites’ HTTP Cookies
Published 2023-07-01“… Online users are made to believe that they have control over their data privacy through the selection of website cookie options. …”
Get full text
Article -
540
Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security
Published 2024-12-01“…The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches. …”
Get full text
Article