We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 300,928 results
  1. Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing

    In spatial crowdsourcing services, the trajectories of the workers are sent to a central server to provide more personalized services. However, for...

    Yingcong Hong, Junyi Li, ... Xiehua Li in EURASIP Journal on Information Security
    Article Open access 02 September 2024
  2. Freedom from interference: Decisional privacy as a dimension of consumer privacy online

    The introduction of AI-based technologies has dramatically altered the premises for consumer privacy, enabling the unprecedented manipulation of...

    Lena V. Bjørlo in AMS Review
    Article Open access 13 March 2024
  3. A Pragmatic Privacy-Preserving Deep Learning Framework Satisfying Differential Privacy

    With the increasing use of technology in our daily lives, data privacy has become a critical issue. It is essential to carefully design technologies...

    Tran Khanh Dang, Phat T. Tran-Truong in SN Computer Science
    Article 26 December 2023
  4. Privacy-preserving cloud-based secure digital locker with differential privacy-based deep learning technique

    Practically in this modern era, data privacy preservation is somewhat a complex technique due to the development of advanced technologies. During...

    P. Shanthi, S. Vidivelli, P. Padmakumari in Multimedia Tools and Applications
    Article 05 March 2024
  5. Thermal Imaging in Robotics as a Privacy-Enhancing or Privacy-Invasive Measure? Misconceptions of Privacy when Using Thermal Cameras in Robots

    This article examines the use of thermal imaging in human–robot interactions and its implications for privacy. Thermal imaging is used in robotics...

    Naomi Lintvedt in Digital Society
    Article Open access 06 September 2023
  6. The rise of “security and privacy”: bibliometric analysis of computer privacy research

    The study of security and computer privacy has become a significant focus in security and privacy research. To reflect a website's, service's, or...

    Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh in International Journal of Information Security
    Article 31 October 2023
  7. What is my privacy score? Measuring users’ privacy on social networking websites

    Social networking websites usage is becoming popular these days among individuals and organizations. Several organizations and researchers started...

    Amit Kumar Srivastava, Rajhans Mishra in Electronic Commerce Research
    Article 01 February 2024
  8. CAPPAD: a privacy-preservation solution for autonomous vehicles using SDN, differential privacy and data aggregation

    Autonomous Vehicles (AVs) and driverless cars which are equipped with communication capabilities, advanced sensing, and Intelligent Control Systems...

    Mehdi Gheisari, Wazir Zada Khan, ... Hemn Barzan Abdalla in Applied Intelligence
    Article 22 February 2024
  9. Research on the cognitive neural mechanism of privacy empowerment illusion cues regarding comprehensibility and interpretability for privacy disclosures

    In the era of artificial intelligence, privacy empowerment illusion has become a crucial means for digital enterprises and platforms to “manipulate”...

    Rui Sun, Qiuhua Zhu, ... Shukun Qin in Scientific Reports
    Article Open access 15 April 2024
  10. A privacy-preserving word embedding text classification model based on privacy boundary constructed by deep belief network

    To effectively extract and classify the information from reports or documents and protect the privacy of the extracted results, we propose a privacy...

    Bo Ma, Edmund Lai, ... Jinsong Wu in Multimedia Tools and Applications
    Article Open access 15 September 2023
  11. Have the cake and eat it too: Differential Privacy enables privacy and precise analytics

    Existing research in differential privacy, whose applications have exploded across functional areas in the last few years, describes an intrinsic...

    Rishabh Subramanian in Journal of Big Data
    Article Open access 14 July 2023
  12. Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design

    Privacy by Design (PbD) is a well-known concept that aims to provide a high level of protection for privacy throughout the entire life cycle of...

    Mohamed Abomhara, Livinus Obiora Nweke, ... Stéphanie de Labriolle in International Journal of Information Security
    Article Open access 03 September 2024
  13. Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger

    With the growth in Vehicular Ad Hoc Network (VANET) technology, many vehicular devices are communicating with each other and with the edge nodes,...

    Zainab Iftikhar, Adeel Anjum, ... Gwanggil Jeon in Cluster Computing
    Article 08 May 2023
  14. Enhancing correlated big data privacy using differential privacy and machine learning

    Data are often correlated in real-world datasets. Existing data privacy algorithms did not consider data correlation an inherent property of...

    Sreemoyee Biswas, Anuja Fole, ... Pragati Agrawal in Journal of Big Data
    Article Open access 07 March 2023
  15. Privacy regulation in asymmetric environments

    Around the world, strict privacy regulations are gradually being implemented, with the intended purpose of facilitating consumers to protect their...

    Article 08 May 2024
  16. Modelling user notification scenarios in privacy policies

    The processing of personal data gives a rise to many privacy concerns, and one of them is to ensure the transparency of data processing to end users....

    Mikhail Kuznetsov, Evgenia Novikova, Igor Kotenko in Cybersecurity
    Article Open access 04 September 2024
  17. Reconciling privacy and accuracy in AI for medical imaging

    Artificial intelligence (AI) models are vulnerable to information leakage of their training data, which can be highly sensitive, for example, in...

    Alexander Ziller, Tamara T. Mueller, ... Georgios Kaissis in Nature Machine Intelligence
    Article Open access 21 June 2024
  18. Exploring privacy measurement in federated learning

    Federated learning (FL) is a collaborative artificial intelligence (AI) approach that enables distributed training of AI models without data sharing,...

    Gopi Krishna Jagarlamudi, Abbas Yazdinejad, ... Seyedamin Pouriyeh in The Journal of Supercomputing
    Article 27 December 2023
  19. A Value-centered Exploration of Data Privacy and Personalized Privacy Assistants

    In the current post-GDPR landscape, privacy notices have become ever more prevalent on our phones and online. However, these notices are not well...

    Sarah E. Carter in Digital Society
    Article Open access 25 November 2022
  20. Guiding the implementation of data privacy with microservices

    Privacy by design is nowadays recognized as essential in bringing data privacy into software systems. However, developers still face many challenges...

    Pedro Antunes, Nuno Guimarães in International Journal of Information Security
    Article Open access 23 August 2024
Did you find what you were looking for? Share feedback.