Results 41 to 50 of about 225,999 (330)

Detection and Labeling of Personal Identifiable Information in E-mails [PDF]

open access: yes, 2014
The protection of personal identifiable information (PII) is increasingly demanded by customers and data protection regulation. To safeguard PII a organization has to find out which incoming communication actually contains it. Only then PII can be labeled, tracked, and protected. E-mails are one of the main means of communication.
Bier, C., Prior, J.
openaire   +3 more sources

Privacy-preserving scoring of tree ensembles : a novel framework for AI in healthcare [PDF]

open access: yes, 2018
Machine Learning (ML) techniques now impact a wide variety of domains. Highly regulated industries such as healthcare and finance have stringent compliance and data governance policies around data sharing.
De Cock, Martine   +6 more
core   +1 more source

AI-Driven Big Data Transformation And Personally Identifiable Information Security In Financial Data: A Systematic Review

open access: greenNon human journal
This systematic review explores the impact of adopting artificial intelligence (AI) to analyze and transform big data in financial and economic contexts, with a specific focus on the privacy and security of personally identifiable information (PII).
Razia Sultana, Ali M. Emran
openalex   +2 more sources

Privacy-aware blockchain for personal data sharing and tracking

open access: yesOpen Computer Science, 2019
Secure data distribution is critical for data accountability. Surveillance caused privacy breaching incidents have already questioned existing personal data collection techniques.
Onik Md Mehedi Hassan   +3 more
doaj   +1 more source

A Real-Time Query Log Protection Method for Web Search Engines

open access: yesIEEE Access, 2020
Web search engines (e.g., Google, Bing, Qwant, and DuckDuckGo) may process a myriad of search queries per second. According to Internet Live Stats, Google handles more than two hundred million queries per hour, i.e., about two trillion queries per year ...
David Pamies-Estrems   +2 more
doaj   +1 more source

A Privacy Preserving Generative Adversarial Network for Image Data [PDF]

open access: yesITM Web of Conferences, 2023
The extensive usage of online applications and social media has raised serious concerns from the public regarding the exposure of their personal information. So, there is a strong need for data anonymization to prevent privacy breaches and leakages.
Nallamolu Sathish, Padmanabhuni Srinivas
doaj   +1 more source

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

open access: yesIEEE Access, 2023
Phishing represents a cybersecurity attack strategy commonly employed by cybercriminals to unlawfully acquire sensitive user information, including passwords, account details, credit card data, and other personally identifiable information.
Wenhao Li   +3 more
doaj   +1 more source

Cancer Risk in Patients With Systemic Sclerosis: A Nationwide Cohort Study in South Korea 2004 to 2021

open access: yesArthritis Care &Research, EarlyView.
Objective Systemic sclerosis (SSc) is a rare autoimmune disease characterized by tissue fibrosis, vasculopathy, and immune dysregulation. Our objectives were to quantify the overall and site‐specific cancer risks in patients with SSc compared to the general population, examine temporal trends in cancer incidence following SSc diagnosis, and explore ...
Jihyun Na   +4 more
wiley   +1 more source

WiFi-Based Detection of Human Subtle Motion for Health Applications

open access: yesBioengineering, 2023
Neurodegenerative diseases such as Parkinson’s disease affect motor symptoms with abnormally increased or reduced movements. Symptoms such as tremor and hand movement disorders can be subtle and vary daily such that the actual condition of the disease ...
Hui-Hsin Chen   +2 more
doaj   +1 more source

THE TRADE-OFF BETWEEN PRIVACY AND GEOGRAPHIC DATA RESOLUTION. A CASE OF GPS TRAJECTORIES COMBINED WITH THE SOCIAL SURVEY RESULTS [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2016
Trajectory datasets are being generated in great volumes due to high levels of Global Positioning System (GPS) and Location-Based Services (LBS) use.
K. Sila-Nowicka, P. Thakuriah
doaj   +1 more source

Home - About - Disclaimer - Privacy