You are currently viewing a new version of our website. To view the old version click .

1,848 Results Found

  • Article
  • Open Access
1 Citations
3,202 Views
29 Pages

7 February 2024

Multiple studies have demonstrated that the conventional method of learning is suboptimal when our goal is to enhance individuals’ genuine privacy behavior. This study introduces a framework for transforming privacy behavior, with the objective...

  • Article
  • Open Access
3 Citations
3,288 Views
47 Pages

Advancing Data Privacy in Cloud Storage: A Novel Multi-Layer Encoding Framework

  • Kamta Nath Mishra,
  • Rajesh Kumar Lal,
  • Paras Nath Barwal and
  • Alok Mishra

3 July 2025

Data privacy is a crucial concern for individuals using cloud storage services, and cloud service providers are increasingly focused on meeting this demand. However, privacy breaches in the ever-evolving cyber landscape remain a significant threat to...

  • Article
  • Open Access
1,451 Views
21 Pages

19 November 2024

The origin–destination (OD) matrix is a critical tool in understanding human mobility, with diverse applications. However, constructing OD matrices can pose significant privacy challenges, as sensitive information about individual mobility patt...

  • Article
  • Open Access
5 Citations
3,629 Views
25 Pages

A User-Centered Framework for Data Privacy Protection Using Large Language Models and Attention Mechanisms

  • Shutian Zhou,
  • Zizhe Zhou,
  • Chenxi Wang,
  • Yuzhe Liang,
  • Liangyu Wang,
  • Jiahe Zhang,
  • Jinming Zhang and
  • Chunli Lv

5 August 2024

This paper introduces a user-centered data privacy protection framework utilizing large language models (LLMs) and user attention mechanisms, which are tailored to address urgent privacy concerns in sensitive data processing domains like financial co...

  • Article
  • Open Access
9 Citations
3,648 Views
22 Pages

26 October 2021

Energy Transition (ET) needs actors to perform independent actions on multiple levels of governance. These actors may need to write and read their data, and at the same time they want to protect their data from unauthorized access. This is particular...

  • Article
  • Open Access
8 Citations
13,406 Views
21 Pages

19 November 2024

Interoperability has become crucial in the world of electronic health records, allowing for seamless data exchange and integration across diverse settings. It facilitates the integration of disparate systems, ensures that patient records are accessib...

  • Article
  • Open Access
2 Citations
819 Views
29 Pages

Self-Adaptive Privacy in Cloud Computing Environments: Developing an Integrated Framework and a Beta Tool for Social Media Platforms

  • Angeliki Kitsiou,
  • Michail Pantelelis,
  • Panagis-Angelos Mazarakis,
  • Aikaterini-Georgia Mavroeidi,
  • Stavros Simou,
  • Eleni Tzortzaki,
  • Stavros Stavridis,
  • Giannis Koutzamanis and
  • Christos Kalloniatis

This study addresses the growing complexity of privacy protection in cloud computing environments (CCEs) by introducing a comprehensive socio-technical framework for self-adaptive privacy, complemented by an AI-driven beta tool designed for social me...

  • Article
  • Open Access
10 Citations
3,546 Views
18 Pages

Framework for Privacy-Preserving Wearable Health Data Analysis: Proof-of-Concept Study for Atrial Fibrillation Detection

  • Anamaria Vizitiu,
  • Cosmin-Ioan Nita,
  • Radu Miron Toev,
  • Tudor Suditu,
  • Constantin Suciu and
  • Lucian Mihai Itu

28 September 2021

Medical wearable devices monitor health data and, coupled with data analytics, cloud computing, and artificial intelligence (AI), enable early detection of disease. Privacy issues arise when personal health information is sent or processed outside th...

  • Review
  • Open Access
8 Citations
9,582 Views
23 Pages

27 November 2023

This study examines the privacy protection challenges in data sharing between organisations and third-party entities, focusing on changing collaborations in the digital age. Utilising a mixed-method approach, we categorise data-sharing practices into...

  • Article
  • Open Access
15 Citations
4,133 Views
27 Pages

13 April 2022

Wearable devices and smartphones that are used to monitor the activity and the state of the driver collect a lot of sensitive data such as audio, video, location and even health data. The analysis and processing of such data require observing the str...

  • Article
  • Open Access
1,279 Views
27 Pages

Online Traffic Obfuscation Experimental Framework for the Smart Home Privacy Protection

  • Shuping Huang,
  • Jianyu Cao,
  • Ziyi Chen,
  • Qi Zhong and
  • Minghe Zhang

19 August 2025

Attackers can use Ethernet or WiFi sniffers to capture smart home device traffic and identify device events based on packet length and timing characteristics, thereby inferring users’ home behaviors. To address this issue, traffic obfuscation t...

  • Article
  • Open Access
7 Citations
3,996 Views
17 Pages

This paper proposes a novel federated recommendation framework that incorporates differential privacy to safeguard user privacy without compromising on the accuracy of recommendations. Unlike conventional recommendation systems that centralize user d...

  • Article
  • Open Access
4 Citations
1,418 Views
18 Pages

Privacy-Preserving and Interpretable Grade Prediction: A Differential Privacy Integrated TabNet Framework

  • Yuqi Zhao,
  • Jinheng Wang,
  • Xiaoqing Tan,
  • Linyan Wen,
  • Qingru Gao and
  • Wenjing Wang

The increasing digitization of educational data poses critical challenges in balancing predictive accuracy with privacy protection for sensitive student information. This study introduces DP-TabNet, a pioneering framework that integrates the interpre...

  • Article
  • Open Access
779 Views
36 Pages

Privacy Framework for the Development of IoT-Based Systems

  • Yaqin Y. Shaheen,
  • Miguel J. Hornos and
  • Carlos Rodríguez-Domínguez

Addressing privacy concerns is one of the key challenges facing the development of Internet of Things (IoT)-based systems (IoTSs). As IoT devices often collect and process personal and sensitive information, strict privacy policies must be defined an...

  • Opinion
  • Open Access
2,388 Views
13 Pages

A Framework for the Design of Privacy-Preserving Record Linkage Systems

  • Zixin Nie,
  • Benjamin Tyndall,
  • Daniel Brannock,
  • Emily Gentles,
  • Elizabeth Parish and
  • Alison Banger

Record linkage can enhance the utility of data by bringing data together from different sources, increasing the available information about data subjects and providing more holistic views. Doing so, however, can increase privacy risks. To mitigate th...

  • Article
  • Open Access
10 Citations
4,546 Views
9 Pages

With the development of the mobile Internet, location-based services are playing an important role in everyday life. As a new location-based service, Spatial Crowdsourcing (SC) involves collecting and analyzing environmental, social, and other spatio...

  • Article
  • Open Access
1 Citations
2,600 Views
18 Pages

9 July 2024

The proliferation of data across multiple domains necessitates the adoption of machine learning models that respect user privacy and data security, particularly in sensitive scenarios like surveillance and medical imaging. Federated learning (FL) off...

  • Article
  • Open Access
9 Citations
1,907 Views
24 Pages

25 September 2024

This paper introduces a new privacy-preserving transfer learning framework for the classification of kidney diseases. In the proposed framework, transfer learning is employed for feature extraction, and differential privacy is used to obtain noisy gr...

  • Article
  • Open Access
7 Citations
4,580 Views
25 Pages

Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles

  • Gianmarco Baldini,
  • José L. Hernandez-Ramos,
  • Slawomir Nowak,
  • Ricardo Neisse and
  • Mateusz Nowak

22 September 2020

It has been proven in research literature that the analysis of encrypted traffic with statistical analysis and machine learning can reveal the type of activities performed by a user accessing the network, thus leading to privacy risks. In particular,...

  • Article
  • Open Access
3 Citations
4,037 Views
34 Pages

8 October 2024

Data security and user privacy concerns are receiving increasing attention. Federated learning models based on differential privacy offer a distributed machine learning framework that protects data privacy. However, the noise introduced by the differ...

  • Article
  • Open Access
358 Views
14 Pages

Evaluating Privacy Technologies in Digital Payments: A Balanced Framework

  • Ioannis Fragkiadakis,
  • Stefanos Gritzalis and
  • Costas Lambrinoudakis

Privacy enhancement technologies are significant in the development of digital payment systems. At present, multiple innovative digital payment solutions have been introduced and may be implemented globally soon. As cyber threats continue to increase...

  • Article
  • Open Access
1 Citations
1,471 Views
22 Pages

A Randomized Response Framework to Achieve Differential Privacy in Medical Data

  • Andreas Ioannidis,
  • Antonios Litke and
  • Nikolaos K. Papadakis

In recent years, differential privacy has gained substantial traction in the medical domain, where the need to balance privacy preservation with data utility is paramount. As medical data increasingly relies on cloud platforms and distributed sharing...

  • Article
  • Open Access
53 Citations
15,343 Views
17 Pages

7 September 2023

The rapid expansion of artificial intelligence poses significant challenges in terms of data security and privacy. This article proposes a comprehensive approach to develop a framework to address these issues. First, previous research on security and...

  • Article
  • Open Access
26 Citations
6,545 Views
29 Pages

PRASH: A Framework for Privacy Risk Analysis of Smart Homes

  • Joseph Bugeja,
  • Andreas Jacobsson and
  • Paul Davidsson

25 September 2021

Smart homes promise to improve the quality of life of residents. However, they collect vasts amounts of personal and sensitive data, making privacy protection critically important. We propose a framework, called PRASH, for modeling and analyzing the...

  • Article
  • Open Access
18 Citations
5,392 Views
29 Pages

A Privacy-Preserving Framework Using Homomorphic Encryption for Smart Metering Systems

  • Weiyan Xu,
  • Jack Sun,
  • Rachel Cardell-Oliver,
  • Ajmal Mian and
  • Jin B. Hong

14 May 2023

Smart metering systems (SMSs) have been widely used by industrial users and residential customers for purposes such as real-time tracking, outage notification, quality monitoring, load forecasting, etc. However, the consumption data it generates can...

  • Article
  • Open Access
3 Citations
2,810 Views
17 Pages

Point-of-interest (POI) recommender systems (RSes) have gained significant popularity in recent years due to the prosperity of location-based social networks (LBSN). However, in the interest of personalization services, various sensitive contextual i...

  • Article
  • Open Access
4 Citations
3,533 Views
28 Pages

SecureLLM: A Unified Framework for Privacy-Focused Large Language Models

  • Konstantinos Kalodanis,
  • Sotirios Papadopoulos,
  • Georgios Feretzakis,
  • Panagiotis Rizomiliotis and
  • Dimosthenis Anagnostopoulos

10 April 2025

Large language models (LLMs) have shown remarkable skills across various activities, including text generation and code synthesis. Their widespread applicability, however, raises substantial concerns about security, privacy, and possibly misuse. Of r...

  • Article
  • Open Access
7 Citations
4,833 Views
18 Pages

Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management

  • Geeta Sandeep Nadella,
  • Santosh Reddy Addula,
  • Akhila Reddy Yadulla,
  • Guna Sekhar Sajja,
  • Mohan Meesala,
  • Mohan Harish Maturi,
  • Karthik Meduri and
  • Hari Gonaygunta

8 February 2025

This study presents a Generative AI-Enhanced Cybersecurity Framework designed to strengthen enterprise data privacy management while improving threat detection accuracy and scalability. By leveraging Generative Adversarial Networks (GANs), Variationa...

  • Article
  • Open Access
Mathematics2026, 14(1), 53;https://doi.org/10.3390/math14010053 
(registering DOI)

23 December 2025

Timely and reliable labor market intelligence is crucial for evidence-based policymaking, workforce planning, and economic forecasting. However, traditional data collection and centralized analytics raise growing concerns about privacy, scalability,...

  • Article
  • Open Access
184 Views
27 Pages

16 December 2025

Historical inference attacks pose a critical privacy threat in mobile edge computing (MEC), where adversaries exploit long-term task and location patterns to infer users’ sensitive information. To address this challenge, we propose a privacy-pr...

  • Article
  • Open Access
2 Citations
2,488 Views
38 Pages

A Verifiable, Privacy-Preserving, and Poisoning Attack-Resilient Federated Learning Framework

  • Washington Enyinna Mbonu,
  • Carsten Maple,
  • Gregory Epiphaniou and
  • Christo Panchev

Federated learning is the on-device, collaborative training of a global model that can be utilized to support the privacy preservation of participants’ local data. In federated learning, there are challenges to model training regarding privacy...

  • Article
  • Open Access
6 Citations
2,720 Views
19 Pages

As mobile phone technology evolves quickly, people could use mobile phones to conduct business, watch entertainment shows, order food, and many more. These location-based services (LBS) require users’ mobility data (trajectories) in order to provide...

  • Article
  • Open Access
2 Citations
3,599 Views
22 Pages

Privacy Ethics Alignment in AI: A Stakeholder-Centric Framework for Ethical AI

  • Ankur Barthwal,
  • Molly Campbell and
  • Ajay Kumar Shrestha

9 June 2025

The increasing integration of artificial intelligence (AI) in digital ecosystems has reshaped privacy dynamics, particularly for young digital citizens navigating data-driven environments. This study explores evolving privacy concerns across three ke...

  • Article
  • Open Access
18 Citations
3,985 Views
19 Pages

1 October 2018

Recently, the number of people who are members of multiple online social networks simultaneously has increased. However, if these people share everything with others, they risk their privacy. Users may be unaware of the privacy risks involved with sh...

  • Article
  • Open Access
2,657 Views
19 Pages

3 March 2023

Location-based services (LBS) require users to provide their current location for service delivery and customization. Location privacy protection addresses concerns associated with the potential mishandling of location information submitted to the LB...

  • Article
  • Open Access
5 Citations
3,985 Views
24 Pages

1 February 2024

The combination of collaborative deep learning and Cyber-Physical Systems (CPSs) has the potential to improve decision-making, adaptability, and efficiency in dynamic and distributed environments. However, it brings privacy, communication, and resour...

  • Article
  • Open Access
44 Citations
7,808 Views
21 Pages

24 December 2020

With the development of the Internet of Multimedia Things (IoMT), an increasing amount of image data is collected by various multimedia devices, such as smartphones, cameras, and drones. This massive number of images are widely used in each field of...

  • Article
  • Open Access
934 Views
25 Pages

12 November 2025

Stock price modeling under privacy constraints presents a unique challenge at the intersection of computational economics and machine learning. Financial institutions and brokerage firms hold valuable yet sensitive data that cannot be centrally aggre...

  • Article
  • Open Access
1,081 Views
19 Pages

4 August 2025

The advent of quantum computing poses an existential threat to the security of cloud services that handle sensitive visual data. Simultaneously, the need for computational privacy requires the ability to process data without exposing it to the cloud...

  • Article
  • Open Access
2 Citations
1,647 Views
16 Pages

DC-NFC: A Custom Deep Learning Framework for Security and Privacy in NFC-Enabled IoT

  • Abdul Rehman,
  • Omar Alharbi,
  • Yazeed Qasaymeh and
  • Amer Aljaedi

24 February 2025

NFC has emerged as a critical technology in IoET ecosystems, facilitating seamless data exchange in proximity-based systems. However, the security and privacy challenges associated with NFC-enabled IoT devices remain significant, exposing them to var...

  • Article
  • Open Access
580 Views
17 Pages

Dyn-Pri: A Dynamic Privacy Sensitivity Assessment Framework for V2G Interactive Service Scenarios

  • Tianbao Liu,
  • Jingyang Wang,
  • Nan Zhang,
  • Jing Guo,
  • Yanyan Tao,
  • Qingyao Li and
  • Zi Li

In V2G service operations, highly efficient data sharing among participants is useful in grid load balancing and renewable energy integration. However, the data quality and sharing efficiency greatly rely on entities’ willingness to share. More...

  • Article
  • Open Access
1 Citations
1,652 Views
46 Pages

14 August 2025

With the proliferation of LEO satellite constellations and increasing demands for on-orbit intelligence, satellite networks generate massive, heterogeneous, and privacy-sensitive data. Ensuring efficient model collaboration under strict privacy const...

  • Article
  • Open Access
109 Citations
12,357 Views
14 Pages

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

  • Charalampos Stamatellis,
  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis,
  • Sokratis Katsikas and
  • William J. Buchanan

18 November 2020

Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common sec...

  • Feature Paper
  • Article
  • Open Access
1,070 Views
21 Pages

28 February 2025

The widespread use of mobile devices has led to the continuous collection of vast amounts of user-generated data, supporting data-driven decisions across a variety of fields. However, the growing volume of these data raises significant privacy concer...

  • Article
  • Open Access
20 Citations
19,069 Views
20 Pages

Blockchain-Based Healthcare Records Management Framework: Enhancing Security, Privacy, and Interoperability

  • Noor Ul Ain Tahir,
  • Umer Rashid,
  • Hassan Jalil Hadi,
  • Naveed Ahmad,
  • Yue Cao,
  • Mohammed Ali Alshara and
  • Yasir Javed

This study investigated the potential of blockchain technology to transform Electronic Health Record (EHR) administration, integrity, and security. EHRs store vital health information such as medical history, diagnosis, prescriptions, and imaging fin...

  • Article
  • Open Access
8 Citations
3,222 Views
17 Pages

A WSN Framework for Privacy Aware Indoor Location

  • Aleksandar Tošić,
  • Niki Hrovatin and
  • Jernej Vičič

21 March 2022

In the past two decades, technological advancements in smart devices, IoT, and smart sensors have paved the way towards numerous implementations of indoor location systems. Indoor location has many important applications in numerous fields, including...

  • Article
  • Open Access

21 December 2025

The exponential growth in the usage of textual data across industries and data sharing across institutions underscores the critical need for frameworks that effectively balance data utility and privacy. This paper proposes an innovative agentic AI-ba...

  • Article
  • Open Access
1,548 Views
21 Pages

28 December 2023

Deep learning is widely utilized to acquire predictive models for mobile crowdsensing systems (MCSs). These models significantly improve the availability and performance of MCSs in real-world scenarios. However, training these models requires substan...

  • Article
  • Open Access
25 Citations
9,321 Views
12 Pages

Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain

  • Junhoo Park,
  • Hyekjin Kim,
  • Geunyoung Kim and
  • Jaecheol Ryou

28 December 2020

As blockchain-based applications and research such as cryptocurrency increase, an oracle problem to bring external data in the blockchain is emerging. Among the methods to solve the oracle problem, a method of configuring oracle based on TLS, an exis...

  • Article
  • Open Access
24 Citations
3,375 Views
21 Pages

A Privacy and Energy-Aware Federated Framework for Human Activity Recognition

  • Ahsan Raza Khan,
  • Habib Ullah Manzoor,
  • Fahad Ayaz,
  • Muhammad Ali Imran and
  • Ahmed Zoha

22 November 2023

Human activity recognition (HAR) using wearable sensors enables continuous monitoring for healthcare applications. However, the conventional centralised training of deep learning models on sensor data poses challenges related to privacy, communicatio...

of 37