Results 51 to 60 of about 2,873,813 (294)

Lightweight Privacy Protection via Adversarial Sample

open access: yesElectronics
Adversarial sample-based privacy protection has its own advantages compared to traditional privacy protections. Previous adversarial sample privacy protections have mostly been centralized or have not considered the issue of hardware device limitations ...
Guangxu Xie   +3 more
semanticscholar   +1 more source

Data Protection and Privacy of the Internet of Healthcare Things (IoHTs)

open access: yesApplied Sciences, 2022
The Internet of Things (IoT) is an emerging field consisting of Internet-based globally connected network architecture. A subset of IoT is the Internet of Healthcare Things (IoHT) that consists of smart healthcare devices having significant importance in
Jahanzeb Shahid   +5 more
semanticscholar   +1 more source

A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services

open access: yesSensors, 2022
As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy.
Shiwen Zhang   +4 more
doaj   +1 more source

Reversing Deep Face Embeddings with Probable Privacy Protection [PDF]

open access: yesarXiv, 2023
Generally, privacy-enhancing face recognition systems are designed to offer permanent protection of face embeddings. Recently, so-called soft-biometric privacy-enhancement approaches have been introduced with the aim of canceling soft-biometric attributes.
arxiv  

Using location semantics to realize personalized road network location privacy protection

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
With the rapid development of location-based services in the field of mobile network applications, users enjoy the convenience of location-based services on one side, and they are exposed to the risk of privacy disclosure on the other side. Attackers may
Li Kuang   +4 more
semanticscholar   +1 more source

Obligations of trust for privacy and confidentiality in distributed transactions [PDF]

open access: yes, 2009
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions.
Anne Anderson   +4 more
core   +1 more source

Comparative Study on the Personal Privacy Protection Policies of Open Government Data Websites

open access: yesZhishi guanli luntan, 2017
[Purpose/significance] The open government data website is the carrier of the open data, and the personal privacy protection policy of the open government data website is directly related to personal privacy protection in the process of opening ...
Zhang Jianbin   +4 more
doaj   +1 more source

Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges [PDF]

open access: yes, 2021
The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging.
arxiv   +1 more source

Examined Lives: Informational Privacy and the Subject as Object [PDF]

open access: yes, 2000
In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests.
Cohen, Julie E.
core   +2 more sources

Deniable Authentication Encryption for Privacy Protection using Blockchain

open access: yesSeptember 2021, 2021
Cloud applications that work on medical data using blockchain is used by managers and doctors in order to get the image data that is shared between various healthcare institutions.
C. Joe, J. S. Raj
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy