Results 31 to 40 of about 23,477,104 (364)
Protecting farmers' data privacy and confidentiality: Recommendations and considerations
With the increasing use of precision agriculture and technological development, the agricultural sector has been majorly transformed. Precision agriculture uses technological innovations such as sensors, drones, and data analysis tools to improve the ...
Jasminal Kaur +3 more
semanticscholar +1 more source
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang +4 more
doaj +1 more source
LLM-PBE: Assessing Data Privacy in Large Language Models [PDF]
Large Language Models (LLMs) have become integral to numerous domains, significantly advancing applications in data management, mining, and analysis.
Qinbin Li +12 more
semanticscholar +1 more source
Federated learning for preserving data privacy in collaborative healthcare research
Generalizability, external validity, and reproducibility are high priorities for artificial intelligence applications in healthcare. Traditional approaches to addressing these elements involve sharing patient data between institutions or practice ...
T. Loftus +10 more
semanticscholar +1 more source
New Program Abstractions for Privacy [PDF]
Static program analysis, once seen primarily as a tool for optimising programs, is now increasingly important as a means to provide quality guarantees about programs. One measure of quality is the extent to which programs respect the privacy of user data.
C Dwork +5 more
core +1 more source
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
The data generated in the Industrial Internet of Things (IIoT) has important research value. In the process of data sharing, data privacy, security, and data availability are important issues that cannot be ignored.
Tao Feng +4 more
semanticscholar +1 more source
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source
Privacy in (mobile) telecommunications services [PDF]
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den +4 more
core +1 more source
Régimen Jurídico de la acción de acceso a la información pública en el Uruguay
En este artículo se pretende mostrar la importancia del acceso a la información pública, que es un derecho humano fundamental. El estudio se basa en los pilares fundamentales del derecho y las recientes medidas adoptadas por el Estado.
Pablo Schiavi
doaj +1 more source
Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server.
Mohammad Ali +2 more
doaj +1 more source

