Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
usedds » useddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
usedds » useddds (Expand Search)
useddddds » usedddddds (Expand Search)
usedddddds » useddddddds (Expand Search)
use » used (Expand Search)
-
181
Mamba-fusion for privacy-preserving disease prediction
Published 2025-07-01“…Experimental results on multi-modal clinical measurements, ECG, EEG, clinical notes, and demographic data support the applied framework. We have then used Mamba-Fusion to achieve 92:4% accuracy, 0:91 F-Score, and 0:96 AUC-ROC by keeping the privacy leakage at 0:02 and communication costs to 12:5 MB, which make it superior to conventional FL techniques. …”
Get full text
Article -
182
Practical and privacy-preserving geo-social-based POI recommendation
Published 2024-03-01“…Specifically, we first utilize the quad tree to organize geographic data and the MinHash method to index social data. …”
Get full text
Article -
183
Privacy-utility tradeoff method using multi-variable source coding
Published 2015-12-01“…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
Get full text
Article -
184
Deepfake Image Forensics for Privacy Protection and Authenticity Using Deep Learning
Published 2025-03-01“…This research focuses on the detection of deepfake images and videos for forensic analysis using deep learning techniques. It highlights the importance of preserving privacy and authenticity in digital media. …”
Get full text
Article -
185
Privacy-preserving federated learning framework with dynamic weight aggregation
Published 2022-10-01“…There are two problems with the privacy-preserving federal learning framework under an unreliable central server.① A fixed weight, typically the size of each participant’s dataset, is used when aggregating distributed learning models on the central server.However, different participants have non-independent and homogeneously distributed data, then setting fixed aggregation weights would prevent the global model from achieving optimal utility.② Existing frameworks are built on the assumption that the central server is honest, and do not consider the problem of data privacy leakage of participants due to the untrustworthiness of the central server.To address the above issues, based on the popular DP-FedAvg algorithm, a privacy-preserving federated learning DP-DFL algorithm for dynamic weight aggregation under a non-trusted central server was proposed which set a dynamic model aggregation weight.The proposed algorithm learned the model aggregation weight in federated learning directly from the data of different participants, and thus it is applicable to non-independent homogeneously distributed data environment.In addition, the privacy of model parameters was protected using noise in the local model privacy protection phase, which satisfied the untrustworthy central server setting and thus reduced the risk of privacy leakage in the upload of model parameters from local participants.Experiments on dataset CIFAR-10 demonstrate that the DP-DFL algorithm not only provides local privacy guarantees, but also achieves higher accuracy rates with an average accuracy improvement of 2.09% compared to the DP-FedAvg algorithm models.…”
Get full text
Article -
186
-
187
Automated Redaction of Personally Identifiable Information on Drug Labels Using Optical Character Recognition and Large Language Models for Compliance with Thailand’s Personal Data...
Published 2025-04-01“…The rapid proliferation of artificial intelligence (AI) across various industries presents both opportunities and challenges, particularly concerning personal data privacy. With the enforcement of regulations like Thailand’s Personal Data Protection Act (PDPA), organizations face increasing pressure to protect sensitive information found in diverse data sources, including product and shipping labels. …”
Get full text
Article -
188
Using the LTO Network Level 1 Blockchain to Automate Inter-Organizational Business Processes
Published 2024-06-01“…The author explains the operation of a private event chain as an ad-hoc private blockchain that ensures the consistency of the process state between nodes. Methods of ensuring data privacy are discussed. The second part of the article is devoted to the global public blockchain LTO to confirm information from private event chains. …”
Get full text
Article -
189
(<italic>r, k, ε</italic>)-Anonymization: Privacy-Preserving Data Publishing Algorithm Based on Multi-Dimensional Outlier Detection, <italic>k</italic>-Anonymity, and <itali...
Published 2025-01-01“…The general data protection regulation (GDPR) implementation, on the other hand, has introduced extensive control over the use of individuals’ personal information and placed many limits. …”
Get full text
Article -
190
Security Data Aggregation with Recoverable Data in Heterogeneous Wireless Sensor Network
Published 2013-11-01“…The algorithm uses homomorphism encryption techniques based on elliptic curve to address data privacy protection, and uses an efficient aggregate signature scheme to ensure data integrity and authenticity. …”
Get full text
Article -
191
Navigating the EU data governance labyrinth: A business perspective on data sharing in the financial sector
Published 2024-02-01“…With policy-making (“on the books”) centred on guaranteeing data privacy and data security whilst promoting innovation, firms face complexities when implementing this framework “on the ground”. …”
Get full text
Article -
192
Exploration of Reproductive Health Apps’ Data Privacy Policies and the Risks Posed to Users: Qualitative Content Analysis
Published 2025-03-01“…A qualitative content analysis of the apps and a review of the literature on data use policies, governmental data privacy regulations, and best practices for mobile app data privacy were conducted between January 2023 and July 2023. …”
Get full text
Article -
193
Continuous location privacy protection mechanism based on differential privacy
Published 2021-08-01“…Aiming at the problem of users’ location privacy leakage caused by continuously using LBS, a road privacy level (RPL) algorithm was proposed based on road topological network, which divided the privacy level of the road sections around the sensitive locations.Then, a differential privacy location protection mechanism (DPLPM) was proposed.Privacy budget was allocated for sensitive road sections and Laplace noise was added to realize the privacy protection of location data.The experimental results show that the mechanism has high data availability while protecting the privacy of location information.…”
Get full text
Article -
194
-
195
Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design
Published 2020-05-01“…Nevertheless, the adequate implementation of these rights is not guaranteed, as services use the received data with commercial purposes. …”
Get full text
Article -
196
Navigating Data Privacy in Digital Public Services: Public Perceptions and Policy Implications. Romania Case Study
Published 2024-07-01“…However, this reliance on data has raised critical concerns about privacy, security, and ethical data use. …”
Get full text
Article -
197
A Data Protection Method for the Electricity Business Environment Based on Differential Privacy and Federal Incentive Mechanisms
Published 2025-06-01“…This paper conducts experiments using the data of Shenzhen City, Guangdong Province. …”
Get full text
Article -
198
Worldwide willingness to share health data high but privacy, consent and transparency paramount, a meta-analysis
Published 2025-08-01“…Articles were included if they quantitatively examined the primary outcome; the public’s willingness to share health data for secondary use, while secondary outcomes included demographic and perception measures associated with willingness to share. …”
Get full text
Article -
199
Membership Inference Attacks Fueled by Few-Shot Learning to Detect Privacy Leakage and Address Data Integrity
Published 2025-05-01“…Deep learning models have an intrinsic privacy issue as they memorize parts of their training data, creating a privacy leakage. …”
Get full text
Article -
200
Federated Analysis With Differential Privacy in Oncology Research: Longitudinal Observational Study Across Hospital Data Warehouses
Published 2025-07-01“…Despite some pioneering work, federated analytics is still not widely used on real-world data, and to our knowledge, no real-world study has yet combined it with other privacy-enhancing techniques such as differential privacy (DP). …”
Get full text
Article