Results 41 to 50 of about 703,137 (389)

Analysis of Factors in Technological Development to Accelerate the Customer Interaction: Based on Patent Data from Xiaomi in China

open access: yesAAOS Transactions, 2022
The purpose of this report is to identify distinctive efforts in Xiaomi's technology development based on an analysis of patent data from Xiaomi in China.
Sachiko MIYAGAWA
doaj   +1 more source

Experimentation with Personal Identifiable Information

open access: yesIntelligent Information Management, 2012
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that
Sabah Al-Fedaghi   +1 more
openaire   +3 more sources

A Privacy Preserving Generative Adversarial Network for Image Data [PDF]

open access: yesITM Web of Conferences, 2023
The extensive usage of online applications and social media has raised serious concerns from the public regarding the exposure of their personal information. So, there is a strong need for data anonymization to prevent privacy breaches and leakages.
Nallamolu Sathish, Padmanabhuni Srinivas
doaj   +1 more source

Joint Optimization in Edge-Cloud Continuum for Federated Unsupervised Person Re-identification [PDF]

open access: yes, 2021
Person re-identification (ReID) aims to re-identify a person from non-overlapping camera views. Since person ReID data contains sensitive personal information, researchers have adopted federated learning, an emerging distributed training method, to mitigate the privacy leakage risks.
arxiv   +1 more source

A Real-Time Query Log Protection Method for Web Search Engines

open access: yesIEEE Access, 2020
Web search engines (e.g., Google, Bing, Qwant, and DuckDuckGo) may process a myriad of search queries per second. According to Internet Live Stats, Google handles more than two hundred million queries per hour, i.e., about two trillion queries per year ...
David Pamies-Estrems   +2 more
doaj   +1 more source

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

open access: yesIEEE Access, 2023
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li   +3 more
doaj   +1 more source

Make personal information security great again: A case of users’ perspectives on personal identifiable information in South Africa

open access: yesSA Journal of Information Management, 2022
Background: There is concern that information technology (IT) users are not taking cognisance of personal information security (PIS), with many keen to disclose personal identifiable information (PII) across connected and integrated IT systems that use the Internet.
Rajkumar, Kavish, Njenga, Kennedy
openaire   +3 more sources

Privacy-aware blockchain for personal data sharing and tracking

open access: yesOpen Computer Science, 2019
Secure data distribution is critical for data accountability. Surveillance caused privacy breaching incidents have already questioned existing personal data collection techniques.
Onik Md Mehedi Hassan   +3 more
doaj   +1 more source

WiFi-Based Detection of Human Subtle Motion for Health Applications

open access: yesBioengineering, 2023
Neurodegenerative diseases such as Parkinson’s disease affect motor symptoms with abnormally increased or reduced movements. Symptoms such as tremor and hand movement disorders can be subtle and vary daily such that the actual condition of the disease ...
Hui-Hsin Chen   +2 more
doaj   +1 more source

THE TRADE-OFF BETWEEN PRIVACY AND GEOGRAPHIC DATA RESOLUTION. A CASE OF GPS TRAJECTORIES COMBINED WITH THE SOCIAL SURVEY RESULTS [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2016
Trajectory datasets are being generated in great volumes due to high levels of Global Positioning System (GPS) and Location-Based Services (LBS) use.
K. Sila-Nowicka, P. Thakuriah
doaj   +1 more source

Home - About - Disclaimer - Privacy