Results 21 to 30 of about 703,137 (389)
Deep Learning Application – Identifying PII (Personally Identifiable Information) to Protect
This paper presents application of deep learning and machine learning models in detecting personally identifiable information (PII) in unstructured text (emails).
Anil K. Makhija
semanticscholar +3 more sources
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many potential sources for privacy leaks. Information extraction methods have been applied to detect private information in text files.
Geng, L.+5 more
openaire +5 more sources
Enhancing the De-identification of Personally Identifiable Information in Educational Data [PDF]
Protecting Personally Identifiable Information (PII), such as names, is a critical requirement in learning technologies to safeguard student and teacher privacy and maintain trust. Accurate PII detection is an essential step toward anonymizing sensitive information while preserving the utility of educational data.
Shen, Y.+3 more
openaire +3 more sources
Detection and Classification of Personally Identifiable Information in Images Using Artificial Intelligence [PDF]
Personally Identifiable Information (PII) is any content that is sensitive that needs to be treated as secure and private. When data pieces such as a person’s name, address, Social Security number, phone number, email address, and so on may be used to identify a specific individual, they are deemed PII.
Owais Shaikh
openaire +2 more sources
Burnable Pseudo-Identity: A Non-Binding Anonymous Identity Method for Ethereum
The concept of identity has become one common research topic in security and privacy where the real identity of users must be preserved, usually covered by pseudonym identifiers.
Ivan Gutierrez-Aguero+4 more
doaj +1 more source
Abstract State‐sanctioned violence (SSV) has resounding effects on entire populations, and marginalized communities have long persisted in the work toward liberation despite continued SSV. This paper aims to bridge the gap between the vast scholarship on resilience and the practical challenge of sustaining and thriving in communities targeted by SSV ...
Kris T. Gebhard+4 more
wiley +1 more source
Abstract This randomized controlled trial examined the impact of The Connection Project, an experiential, relationship‐focused intervention designed to improve school belongingness and decrease symptoms of depression and loneliness among new college students.
Meghan A. Costello+6 more
wiley +1 more source
Identifying Personal Information in Internet Traffic [PDF]
Users today access a multitude of online services---among the most popular of which are online social networks (OSNs)---via both web sites and dedicated mobile applications (apps), using a range of devices (traditional PCs, tablets, and smartphones) that are connected via a variety of networks.
Liu, Y.+5 more
openaire +3 more sources