Showing 561 - 580 results of 2,784 for search '(((( usedds OR useddddds) OR used) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.29s Refine Results
  1. 561

    BFG: privacy protection framework for internet of medical things based on blockchain and federated learning by Wenkang Liu, Yuxuan He, Xiaoliang Wang, Ziming Duan, Wei Liang, Yuzhen Liu

    Published 2023-12-01
    “…The deep integration of Internet of Medical Things (IoMT) and Artificial intelligence makes the further development of intelligent medical services possible, but privacy leakage and data security problems hinder its wide application. …”
    Get full text
    Article
  2. 562

    Federated Learning-Based Trust Evaluation With Fuzzy Logic for Privacy and Robustness in Fog Computing by Thinh Le Vinh, Huan Thien Tran, Huyen Trang Phan, Samia Le

    Published 2025-01-01
    “…This paper introduces a Federated Learning Trust Model (FLTM) to assess trustworthiness across 2000 resources while preserving data privacy. FLTM incorporates six critical metrics: Availability, Reliability, Data Integrity, Identity, Computational Capability, and Throughput. …”
    Get full text
    Article
  3. 563
  4. 564
  5. 565
  6. 566

    Navigating ethics in HIV data and biomaterial management within Black, African, and Caribbean communities in Canada by Rusty Souleymanov, Bolaji Akinyele-Akanbi, Chinyere Njeze, Patricia Ukoli, Paula Migliardi, Linda Larcombe, Gayle Restall, Laurie Ringaert, Michael Payne, John Kim, Wangari Tharao, Ayn Wilcox

    Published 2025-01-01
    “…Abstract Background This study explored the ethical issues associated with community-based HIV testing among African, Caribbean, and Black (ACB) populations in Canada, focusing on their perceptions of consent, privacy, and the management of HIV-related data and bio-samples. …”
    Get full text
    Article
  7. 567
  8. 568
  9. 569

    Dataset of worker perceptions of workforce robotics regarding safety, independence, job security, and privacyGitHub by Yu (Andrew) Liu, Gurpreet Kaur, Natasha Kholgade Banerjee, Sean Banerjee

    Published 2025-08-01
    “…The questions range from worker demographics (7 questions), perceptions toward physical safety in the workplace (8 questions), perceptions toward working with human coworkers in the workplace (6 questions), perceptions toward working with robots (16 questions), and perceptions toward data privacy on robots (3 questions). The dataset will enable research on understanding worker concerns with sensing systems and data privacy in workforce robots and enable data informed recommendations on privacy and security preserving sensing systems on existing and future robots. …”
    Get full text
    Article
  10. 570

    Time Series Classification Using Federated Convolutional Neural Networks and Image-Based Representations by Felipe A. R. Silva, Omid Orang, Fabricio Javier Erazo-Costa, Petronio C. L. Silva, Pedro H. Barros, Ricardo P. M. Ferreira, Frederico Gadelha Guimaraes

    Published 2025-01-01
    “…Federated Learning (FL) enables collaborative training across distributed clients while ensuring data privacy. The method’s effectiveness is evaluated using 40 datasets from the UCR Archive. …”
    Get full text
    Article
  11. 571

    Exploring the Use of AI in Qualitative Data Analysis: Comparing Manual Processing with Avidnote for Theme Generation by S. M. Akramul Kabir, Fareeha Ali, Rana Lotfy Ahmed, Ruqayya Sulaiman-Hill

    Published 2025-04-01
    “…However, fundamental concerns persist regarding the robustness, generalisability, credibility, reliability and trustworthiness of qualitative research when using AI technologies. Ethical considerations, such as data security and privacy, also need to be addressed in research settings. …”
    Get full text
    Article
  12. 572

    Federated target trial emulation using distributed observational data for treatment effect estimation by Haoyang Li, Chengxi Zang, Zhenxing Xu, Weishen Pan, Suraj Rajendran, Yong Chen, Fei Wang

    Published 2025-07-01
    “…Abstract Target trial emulation (TTE) aims to estimate treatment effects by simulating randomized controlled trials using real-world observational data. Applying TTE across distributed datasets shows great promise in improving generalizability and power but is always infeasible due to privacy and data-sharing constraints. …”
    Get full text
    Article
  13. 573

    A review of quantum communication and information networks with advanced cryptographic applications using machine learning, deep learning techniques by R. Ramya, P. Kumar, D. Dhanasekaran, R. Satheesh Kumar, S. Amithesh Sharavan

    Published 2025-03-01
    “…Quantum-secured networks enhance urban security, smart management, and infrastructure protection by providing data privacy and facilitating secure data transmission, thereby facilitating robust infrastructure and technological development.…”
    Get full text
    Article
  14. 574

    Generating unseen diseases patient data using ontology enhanced generative adversarial networks by Chang Sun, Michel Dumontier

    Published 2025-01-01
    “…Abstract Generating realistic synthetic health data (e.g., electronic health records), holds promise for fundamental research, AI model development, and enhancing data privacy safeguards. …”
    Get full text
    Article
  15. 575

    Predicting financial default risks: A machine learning approach using smartphone data by Shinta Palupi, Gunawan, Ririn Kusdyawati, Richki Hardi, Rana Zabrina

    Published 2024-11-01
    “…This study leverages machine learning (ML) techniques to predict financial default risks using smartphone data, providing a novel approach to financial risk assessment. …”
    Get full text
    Article
  16. 576

    Sample selection using multi-task autoencoders in federated learning with non-IID data by Emre Ardıç, Yakup Genç

    Published 2025-01-01
    “…Federated learning is a machine learning paradigm in which multiple devices collaboratively train a model under the supervision of a central server while ensuring data privacy. However, its performance is often hindered by redundant, malicious, or abnormal samples, leading to model degradation and inefficiency. …”
    Get full text
    Article
  17. 577

    How to use relevant data for maximal benefit with minimal risk: digital health data governance to protect vulnerable populations in low-income and middle-income countries by Nicki Tiffin, Asha George, Amnesty Elizabeth LeFevre

    Published 2019-03-01
    “…Globally, the volume of private and personal digital data has massively increased, accompanied by rapid expansion in the generation and use of digital health data. …”
    Get full text
    Article
  18. 578
  19. 579
  20. 580

    Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing by Paromita Goswami, Neetu Faujdar, Ghanshyam Singh, Kanta Prasad Sharma, Ajoy Kumar Khan, Somen Debnath

    Published 2024-01-01
    “…To address these issues, we suggest proposing a partial signature-based data auditing system so that both privacy and accuracy can be fortified while reducing the computational cost associated with auditing processes significantly. …”
    Get full text
    Article