Results 31 to 40 of about 187,926 (331)
A Privacy Preserving Generative Adversarial Network for Image Data [PDF]
The extensive usage of online applications and social media has raised serious concerns from the public regarding the exposure of their personal information. So, there is a strong need for data anonymization to prevent privacy breaches and leakages.
Nallamolu Sathish, Padmanabhuni Srinivas
doaj +1 more source
Background: There is concern that information technology (IT) users are not taking cognisance of personal information security (PIS), with many keen to disclose personal identifiable information (PII) across connected and integrated IT systems that use the Internet.
Rajkumar, Kavish, Njenga, Kennedy
openaire +3 more sources
A Real-Time Query Log Protection Method for Web Search Engines
Web search engines (e.g., Google, Bing, Qwant, and DuckDuckGo) may process a myriad of search queries per second. According to Internet Live Stats, Google handles more than two hundred million queries per hour, i.e., about two trillion queries per year ...
David Pamies-Estrems+2 more
doaj +1 more source
Privacy-aware blockchain for personal data sharing and tracking
Secure data distribution is critical for data accountability. Surveillance caused privacy breaching incidents have already questioned existing personal data collection techniques.
Onik Md Mehedi Hassan+3 more
doaj +1 more source
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li+3 more
doaj +1 more source
WiFi-Based Detection of Human Subtle Motion for Health Applications
Neurodegenerative diseases such as Parkinson’s disease affect motor symptoms with abnormally increased or reduced movements. Symptoms such as tremor and hand movement disorders can be subtle and vary daily such that the actual condition of the disease ...
Hui-Hsin Chen+2 more
doaj +1 more source
THE TRADE-OFF BETWEEN PRIVACY AND GEOGRAPHIC DATA RESOLUTION. A CASE OF GPS TRAJECTORIES COMBINED WITH THE SOCIAL SURVEY RESULTS [PDF]
Trajectory datasets are being generated in great volumes due to high levels of Global Positioning System (GPS) and Location-Based Services (LBS) use.
K. Sila-Nowicka, P. Thakuriah
doaj +1 more source
Artificial Intelligences: A Bridge Toward Diverse Intelligence and Humanity's Future
Many discussions of artificial intelligence fail to address deeper questions being raised by advances in developmental biology, neuroscience, bioengineering, and philosophy of mind. Novel beings, including technologically and biologically augmented humans, engineered life forms, hybrots, and others, require tools of the emerging field of diverse ...
Michael Levin
wiley +1 more source
Personal review record, as a form of personally identifiable information, refers to the past review information of a reviewer. The disclosure of reviewers’ personal information on electronic commerce websites has been found to substantially impact ...
Jianhua Liu+5 more
doaj +1 more source
ABSTRACT Non‐syndromic Retinitis Pigmentosa (NsRP) was well known as one of the causes of visual impairment already in the 19th century. Giuseppe Albertotti, Professor of Ophthalmology at the University of Modena (Italy) in 1893, described a high prevalence of NsRP in a geographic isolate, the small village of Colloro, in northwestern Italy.
Andrea Guala+8 more
wiley +1 more source