Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 4
- Moral and ethical aspects 4
- Leadership 3
- Advertising 2
- Customer relations 2
- Customer services 2
- Economic policy 2
- Internet in public administration 2
- Law and legislation 2
- Legal ethics 2
- Online social networks 2
- Public administration 2
- Social media 2
- Aquatic plants 1
- Attitudes 1
- Authoritarianism 1
- Children 1
- Communication 1
- Consumers 1
- Criminal investigation 1
- Cultural policy 1
- Cultural property 1
- Curricula 1
- Curriculum evaluation 1
- Curriculum planning 1
- Data processing 1
- Delivery of Health Care 1
- Diversity in the workplace 1
- Economic Policy 1
- Economics 1
-
761
Privacy preserving strategies for electronic health records in the era of large language models
Published 2025-01-01Get full text
Article -
762
Enhancing Privacy While Preserving Context in Text Transformations by Large Language Models
Published 2025-01-01Get full text
Article -
763
Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining
Published 2014-01-01Get full text
Article -
764
Privacy concerns and avoidance behaviour towards data-driven online behavioural advertising
Published 2022-11-01Get full text
Article -
765
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
Published 2014-01-01Get full text
Article -
766
Research on location privacy protection of mobile terminals for maritime monitoring sensor networks
Published 2021-12-01“…Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task offloading was analyzed and quantified.The related location privacy protection model was established and a dynamic cache and spatial cloaking-based location privacy protection (DS-LPP) algorithm was proposed.Simulation results show that DS-LPP algorithm has better performance of constructing anonymous space and selecting relay node than traditional algorithms while protecting the location privacy of maritime mobile terminals.Therefore, the DS-LPP algorithm can be effectively applied to maritime monitoring sensor network with relatively scanty communication and computing resources, and ensure the continuity of location privacy protection.…”
Get full text
Article -
767
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Published 2025-12-01Get full text
Article -
768
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
Published 2016-07-01Get full text
Article -
769
-
770
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
Published 2025-01-01Get full text
Article -
771
A Variable Weight Privacy-Preserving Algorithm for the Mobile Crowd Sensing Network
Published 2017-01-01Get full text
Article -
772
Balancing Privacy and Utility in Split Learning: An Adversarial Channel Pruning-Based Approach
Published 2025-01-01Get full text
Article -
773
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
Published 2024-03-01Get full text
Article -
774
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01Get full text
Article -
775
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Published 2014-01-01Get full text
Article -
776
Stochastic gradient descent algorithm preserving differential privacy in MapReduce framework
Published 2018-01-01Get full text
Article -
777
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01Get full text
Article -
778
Unmasking privacy apprehension: A bibliometric review of mobile sharing economy applications
Published 2025-01-01Get full text
Article -
779
Patient Perspectives on Health Data Privacy and Management: “Where Is My Data and Whose Is It?”
Published 2018-01-01Get full text
Article -
780
Image privacy preservation scheme based on QR code and reversible visible watermarking
Published 2019-11-01Get full text
Article