Search alternatives:
usedds » useddds (Expand Search)
useddddds » usedddddds (Expand Search)
use » used (Expand Search)
Showing 681 - 700 results of 2,784 for search '(((( usedds OR useddddds) OR usedds) privacy data\ ) OR (\ use privacy data\ ))', query time: 0.20s Refine Results
  1. 681

    Factors influencing patients’ willingness to share their digital health data for primary and secondary use: A theory- and evidence-based overview of reviews by Sabrina Fesl, Caroline Lang, Jochen Schmitt, Stefanie Brückner, Stephen Gilbert, Stefanie Deckert, Madlen Scheibe

    Published 2025-06-01
    “…SRs underwent a multistage screening process using the inclusion and exclusion criteria based on the Population, Concept/Construct, and Context (PCC) framework, followed by data extraction and quality assessment using revised measurement tool to assess systematic reviews (R-AMSTAR2). …”
    Get full text
    Article
  2. 682

    Ethical and privacy challenges of integrating generative AI into EHR systems in Tanzania: A scoping review with a policy perspective by Augustino Mwogosi

    Published 2025-05-01
    “…Results The review identified six key ethical and privacy challenges associated with generative AI in EHR systems: data privacy and security risks, algorithmic bias and fairness concerns, transparency and accountability issues, consent and autonomy challenges, human oversight gaps and risks of data re-identification. …”
    Get full text
    Article
  3. 683

    Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities by Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, Rania Aboalela, Naif Alsaadi, Louai A. Maghrabi, Khalid H. Allehaibi

    Published 2025-02-01
    “…Federated Learning (FL) offers an encouraging solution to address these challenges by providing a privacy-preserving solution for investigating and detecting cyberattacks in IoT systems without negotiating data privacy. …”
    Get full text
    Article
  4. 684

    NN-QuPiD Attack: Neural Network-Based Privacy Quantification Model for Private Information Retrieval Protocols by Rafiullah Khan, Mohib Ullah, Atif Khan, Muhammad Irfan Uddin, Maha Al-Yahya

    Published 2021-01-01
    “…Numerous techniques are available to address privacy infringement, including Private Information Retrieval (PIR) protocols that use peer nodes to preserve privacy. …”
    Get full text
    Article
  5. 685

    Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration by Pedamallu Sai Mrudula, Rayappa David Amar Raj, Archana Pallakonda, Yanamala Rama Muni Reddy, K. Krishna Prakasha, V. Anandkumar

    Published 2025-01-01
    “…Furthermore, the proposed framework includes a federated learning-based scheme that utilizes differential privacy and homomorphic encryption to ensure the privacy and integrity of the data to enhance model interpretability and efficiency with feature ranking to provide insights into attack patterns and anomaly characteristics. …”
    Get full text
    Article
  6. 686

    Patient and clinician opinions on internet search data use in therapy: Insights, considerations, and guidelines for integrating a new digital phenotyping measure by Alex Dhima, Soumya Choudhary, Keris Myrick, John Torous

    Published 2025-06-01
    “…More granular search data in visualizations was considered more useful when compared to vague search frequencies. …”
    Get full text
    Article
  7. 687

    Effect of Workshop Training on Nursing Students’ Knowledge and Attitude Regarding Children’s Privacy Protection: A Quasi-experimental Study by Fatemeh Azimi, Fariba Asgari, Yasaman Yaghobi, Saman Maroufizadeh, Morteza Rahbar Taramsari

    Published 2024-09-01
    “…Data analysis was performed by using descriptive (Mean±SD, frequency, percentage) and inferential statistics (Pearson correlation test and analysis of covariance). …”
    Get full text
    Article
  8. 688
  9. 689

    Privacy-Preserving Glycemic Management in Type 1 Diabetes: Development and Validation of a Multiobjective Federated Reinforcement Learning Framework by Fatemeh Sarani Rad, Juan Li

    Published 2025-07-01
    “…Furthermore, these approaches typically rely on centralized data processing, which raises privacy concerns due to the sensitive nature of health care data. …”
    Get full text
    Article
  10. 690

    A federated learning-based privacy-preserving image processing framework for brain tumor detection from CT scans by Abdullah Al-Saleh, Ghanshyam G. Tejani, Shailendra Mishra, Sunil Kumar Sharma, Seyed Jalaleddin Mousavirad

    Published 2025-07-01
    “…Because traditional deep learning models store all their data together, they raise questions about privacy, complying with regulations and the different types of data used by various institutions. …”
    Get full text
    Article
  11. 691
  12. 692

    A novel end-to-end privacy preserving deep Aquila feed forward networks on healthcare 4.0 environment by Ponugoti Kalpana, Sunitha Tappari, L. Smitha, Dasari Madhavi, K. Naresh, Maddala Vijayalakshmi

    Published 2025-06-01
    “…Though sensor-driven devices have largely eased everyday lives, these healthcare systems have been suffering from various security breaches and data privacy problems. This evokes a need for designing intelligent systems to eradicate data breaches and privacy problems. …”
    Get full text
    Article
  13. 693
  14. 694

    A Decision Cloud Ranking Approach Based on Privacy and Security in Blockchain E-Health Industry 4.0 Systems by Sarah Qahtan, Khaironi Yatim, Mohd Hafeez Osman, Hazura Zulzalil, Muhammad Luqman Mahamad Zakaria

    Published 2023-12-01
    “…Second, the weights of each privacy and security property are calculated using the SFS-FWZIC method. …”
    Get full text
    Article
  15. 695

    How Social Scene Characteristics Affect Customers’ Purchase Intention: The Role of Trust and Privacy Concerns in Live Streaming Commerce by Wenjian Li, Steiner Cujilema, Lisong Hu, Gang Xie

    Published 2025-04-01
    “…The research employs Structural Equation Modeling (SEM) to test the hypothesis using data from 504 valid responses. (3) The results demonstrate that the characteristics of social scenes proposed in this study enhance consumer trust and positively impact purchase intention. …”
    Get full text
    Article
  16. 696

    Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning by Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore, Imran Baig

    Published 2024-12-01
    “…However, more connected and engaged nodes also increase the system’s vulnerability to cybersecurity and privacy breaches. Various security and privacy challenges in vehicular cloud computing and its variants (VEC, VFC) can be efficiently tackled using machine learning (ML). …”
    Get full text
    Article
  17. 697
  18. 698
  19. 699

    Deep Learning-Based Real Time Human Detection System Using LiDAR Data for Smart Healthcare Monitoring by Kalashtari Niloofar, Huhs Niklas, Kraitl Jens, Hornberger Christoph, Simanski Olaf

    Published 2024-12-01
    “…By training a YOLOv5 deep learning model using transfer learning, a method for accurate human detection and tracking within rooms using data collected from a digital LiDAR sensor was used. …”
    Get full text
    Article
  20. 700

    The Impact of Artificial Intelligence on the Future Business World by Hebah Y. AlQato

    Published 2024-02-01
    “…In order to assist businesses better understand their consumers' requirements and preferences, AI is being used to examine customer data and generate insights. …”
    Get full text
    Article