Skip to Content

231 Results Found

  • Communication
  • Open Access
2,834 Views
7 Pages

This study analyzed how Korea’s quarantine policy manages personal information to prevent and control COVID-19. Korea effectively halted the spread of COVID-19 through epidemiological investigations and cell-broadcast systems. In this process,...

  • Perspective
  • Open Access
6 Citations
7,454 Views
20 Pages

With the advent of the pandemic (e.g., novel corona virus disease 2019 (COVID-19)), a tremendous amount of data about individuals are collected by the health authorities on daily basis for curbing the disease’s spread. The individuals’ data collectio...

  • Article
  • Open Access
573 Views
22 Pages

Privacy-Aware Continual Self-Supervised Learning on Multi-Window Chest Computed Tomography for Domain-Shift Robustness

  • Ren Tasai,
  • Guang Li,
  • Ren Togo,
  • Takahiro Ogawa,
  • Kenji Hirata,
  • Minghui Tang,
  • Takaaki Yoshimura,
  • Hiroyuki Sugimori,
  • Noriko Nishioka and
  • Miki Haseyama
  • + 2 authors

We propose a novel continual self-supervised learning (CSSL) framework for simultaneously learning diverse features from multi-window-obtained chest computed tomography (CT) images and ensuring data privacy. Achieving a robust and highly generalizabl...

  • Article
  • Open Access
7 Citations
3,530 Views
26 Pages

12 November 2021

During medical treatment, personal privacy is involved and must be protected. Healthcare institutions have to keep medical images or health information secret unless they have permission from the data owner to disclose them. Reversible data hiding (R...

  • Article
  • Open Access
7 Citations
10,384 Views
25 Pages

This study examines how Chinese and Western news media covered artificial intelligence (AI) privacy issues in higher education from 2019 to 2024. News articles were retrieved from Nexis Uni. First, non-negative matrix factorization (NMF) was employed...

  • Article
  • Open Access
1 Citations
6,622 Views
24 Pages

29 May 2021

There has been a paradigm shift in global communications since the death many years ago of prominent Canadians Marshall McLuhan and Pierre Elliott Trudeau. The correspondence between the two friends, from 1968 to 1980, presciently touched on our cont...

  • Article
  • Open Access
20 Citations
6,144 Views
19 Pages

The Role of Attitude, Travel-Related, and Socioeconomic Characteristics in Modal Shift to Shared Autonomous Vehicles with Ride Sharing

  • Mahsa Aboutorabi Kashani,
  • Mohammadhossein Abbasi,
  • Amir Reza Mamdoohi and
  • Grzegorz Sierpiński

The integration of automation and shared mobility services would significantly affect transportation demand, especially mode choice. However, little is known about how attitudes, travel attributes, and demographic factors affect the modal shift to sh...

  • Article
  • Open Access
349 Views
21 Pages

Satellite image recognition increasingly relies on data collected by geographically distributed institutions, but centralizing geospatial imagery is often infeasible due to policy and privacy constraints. Federated learning enables collaborative trai...

  • Article
  • Open Access
2,531 Views
20 Pages

A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs

  • Haitham Y. Adarbah,
  • Mehmet Sabir Kiraz,
  • Suleyman Kardas,
  • Ali H. Al-Bayatti and
  • Hilal M. Y. Al-Bayatti

9 September 2024

This work proposes a new architectural approach to enhance the security, privacy, and scalability of VANETs through threshold key management and Privacy Enhancing Technologies (PETs), such as homomorphic encryption and secure multiparty computation,...

  • Article
  • Open Access
1 Citations
4,539 Views
27 Pages

Rethinking Data Democratization: Holistic Approaches Versus Universal Frameworks

  • Ena Džanko,
  • Katarina Kozina,
  • Lamia Cero,
  • Antonijo Marijić and
  • Marko Horvat

24 October 2024

Data democratization (DD) is a new concept rapidly becoming a game-changer, enabling companies to innovate and maintain a competitive edge in a data-driven world. This paper explores the evolution of data accessibility, from the early days of manual...

  • Feature Paper
  • Article
  • Open Access
4 Citations
2,777 Views
16 Pages

6 April 2023

The paradigm-shifting developments of cryptography and information theory have focused on the privacy of data-sharing systems, such as epidemiological studies, where agencies are collecting far more personal data than they need, causing intrusions on...

  • Article
  • Open Access
12 Citations
3,607 Views
18 Pages

Privacy-Preserving Data Mining on Blockchain-Based WSNs

  • Niki Hrovatin,
  • Aleksandar Tošić,
  • Michael Mrissa and
  • Branko Kavšek

2 June 2022

Currently, the computational power present in the sensors forming a wireless sensor network (WSN) allows for implementing most of the data processing and analysis directly on the sensors in a decentralized way. This shift in paradigm introduces a shi...

  • Article
  • Open Access
183 Views
47 Pages

16 March 2026

With the development of 6G communication technology, Space–Air–Ground Integrated Networks (SAGINs) have become critical infrastructure for global intelligent collaborative computing. However, federated learning deployment in SAGINs faces...

  • Article
  • Open Access
1 Citations
1,720 Views
13 Pages

Deep learning techniques for medical image analysis often encounter domain shifts between source and target data. Most existing approaches focus on unsupervised domain adaptation (UDA). However, in practical applications, many source domain data are...

  • Review
  • Open Access
19 Citations
10,526 Views
41 Pages

9 November 2024

Federated learning (FL) is creating a paradigm shift in machine learning by directing the focus of model training to where the data actually exist. Instead of drawing all data into a central location, which raises concerns about privacy, costs, and d...

  • Article
  • Open Access
4 Citations
2,681 Views
17 Pages

High-Payload Data-Hiding Scheme Based on Interpolation and Histogram Shifting

  • Chi-Yao Weng,
  • Hao-Yu Weng,
  • Njabulo Sinethemba Shongwe and
  • Cheng-Ta Huang

12 February 2024

The whole world is quickly transforming into an information world with the setup of smart cities, among other things. Information and other forms of privacy are therefore at risk due to the growing intelligence of hackers. Therefore, to enhance the s...

  • Review
  • Open Access
370 Citations
99,781 Views
47 Pages

12 January 2024

Integrating Artificial Intelligence (AI) in healthcare represents a transformative shift with substantial potential for enhancing patient care. This paper critically examines this integration, confronting significant ethical, legal, and technological...

  • Review
  • Open Access
1,473 Views
25 Pages

Governing Healthcare AI in the Real World: How Fairness, Transparency, and Human Oversight Can Coexist: A Narrative Review

  • Paolo Bailo,
  • Giulio Nittari,
  • Giuliano Pesel,
  • Emerenziana Basello,
  • Tommaso Spasari and
  • Giovanna Ricci

6 February 2026

Artificial intelligence (AI) is rapidly shifting from experimental pilots to mainstream clinical infrastructure, redefining how evidence, accountability, and ethics intersect in healthcare. This narrative review integrates insights from peer-reviewed...

  • Article
  • Open Access
10 Citations
5,726 Views
26 Pages

With the growing popularity of cloud computing, it is convenient for data owners to outsource their data to a cloud server. By utilizing the massive storage and computational resources in cloud, data owners can also provide a platform for users to ma...

  • Article
  • Open Access
674 Views
20 Pages

Privacy Beyond the Face: Assessing Gait Privacy Through Realistic Anonymization in Industrial Monitoring

  • Sarah Weiß,
  • Christopher Bonenberger,
  • Tobias Niedermaier,
  • Maik Knof and
  • Markus Schneider

27 December 2025

In modern industrial environments, camera-based monitoring is essential for workflow optimization, safety, and process control, yet it raises significant privacy concerns when people are recorded. Realistic full-body anonymization offers a potential...

  • Article
  • Open Access
1,129 Views
30 Pages

15 August 2025

Mobility-as-a-Service (MaaS) represents a transformative shift in transportation, enabling users to plan, book, and pay for diverse mobility services via a unified digital platform. While previous research has explored factors influencing MaaS adopti...

  • Article
  • Open Access
9 Citations
5,716 Views
21 Pages

10 October 2019

The EU’s General Data Protection Regulation (GDPR) has recently come into effect and insofar as Internet of Things (IoT) applications touch EU citizens or their data, developers are obliged to exercise due diligence and ensure they undertake Da...

  • Article
  • Open Access
7 Citations
5,345 Views
27 Pages

A Comprehensive and Privacy-Aware Approach for Remote Qualified Electronic Signatures

  • Iulian Aciobăniței,
  • Ștefan-Ciprian Arseni,
  • Emil Bureacă and
  • Mihai Togan

14 February 2024

The current shift towards digital transactions emphasizes the need for robust Qualified Electronic Signature (QES) frameworks that safeguard integrity and privacy. Having the potential to become the leading type of adopted QES, the main challenge tha...

  • Entry
  • Open Access
4 Citations
15,662 Views
15 Pages

Political Communication in the Age of Platforms

  • Stylianos Papathanassopoulos and
  • Iliana Giannouli

Political communication has been extensively studied through both the broader context of societal and political systems, as well as through the lens of mediatization, which emphasizes the intersection of political and media logics. Within this framew...

  • Article
  • Open Access
12 Citations
4,607 Views
13 Pages

Privacy amplification is an indispensable procedure for key generation in the quantum key distribution system and the physical layer key distribution system. In this paper, we propose a high-speed privacy amplification algorithm that saves hardware m...

  • Article
  • Open Access
62 Citations
7,837 Views
14 Pages

Security and privacy of patients’ data is a major concern in the healthcare industry. In this paper, we propose a system that activates robust security and privacy of patients’ medical records as well as enables interoperability and data exchange bet...

  • Article
  • Open Access
2,551 Views
20 Pages

15 September 2025

Medical image segmentation faces significant challenges due to domain shift between different clinical centers and data privacy restrictions. Current source-free domain adaptation methods for medical images suffer from three critical limitations, inc...

  • Article
  • Open Access
1,412 Views
18 Pages

6 October 2025

Background: Neuroimaging-based diagnostic approaches are of critical importance for the accurate diagnosis and treatment of major depressive disorder (MDD). However, multisite neuroimaging data often exhibit substantial heterogeneity in terms of scan...

  • Article
  • Open Access
527 Views
19 Pages

Mobile payment platforms not only streamline users’ financial transactions but also encourage their participation in investment activities and additional services. To deliver personalized financial services, it is essential to collect users&rsq...

  • Systematic Review
  • Open Access
143 Views
35 Pages

Affective Intelligent Systems in Healthcare: A Systematic Review

  • Analúcia Schiaffino Morales,
  • Thiago de Luca Reis,
  • Alison R. Panisson,
  • Fabrício Ourique and
  • Iwens G. Sene

Objectives: To investigate the current state of affective computing in healthcare, focusing on its application contexts, algorithmic trends, and the technical–ethical duality involving data privacy and security. Methods and Results: A systemati...

  • Feature Paper
  • Review
  • Open Access
3 Citations
4,496 Views
26 Pages

Anonymous credential (AC) systems are privacy-preserving authentication mech-anisms that allow users to prove that they have valid credentials anonymously. These systems provide a powerful tool for several practical applications, such as anonymous pa...

  • Article
  • Open Access
621 Views
30 Pages

20 December 2025

Current object detection methods deployed in closed-circuit television (CCTV) systems experience substantial performance degradation due to domain gaps between training datasets and real-world environments. At the same time, increasing privacy concer...

  • Article
  • Open Access
18 Citations
5,330 Views
17 Pages

23 February 2022

This paper presents a qualitative study of the experience of students of the shift from face-to-face learning to online learning during the COVID-19 lockdown in Norway. Detailed inputs were collected from 200 university students enrolled in a bachelo...

  • Review
  • Open Access
14 Citations
4,132 Views
19 Pages

This paper examines the evolution of urban vitality measurement, emphasizing the transformative impact of big data and Internet of Things (IoT) technologies. Traditionally assessed through direct observations and surveys, urban vitality measurement h...

  • Article
  • Open Access
5 Citations
5,143 Views
17 Pages

16 November 2024

In today’s volatile supply chain (SC) environment, competition has shifted beyond individual companies to the entire SC ecosystem. Reducing overall SC costs is crucial for success and benefits all participants. One effective approach to achieve...

  • Article
  • Open Access
1,051 Views
12 Pages

With the rapid development of vehicular network technology, data sharing and collaborative training among vehicles have become key to enhancing the efficiency of intelligent transportation systems. However, the heterogeneity of data and potential Byz...

  • Review
  • Open Access
15 Citations
4,196 Views
48 Pages

Navigating Challenges and Harnessing Opportunities: Deep Learning Applications in Internet of Medical Things

  • John Mulo,
  • Hengshuo Liang,
  • Mian Qian,
  • Milon Biswas,
  • Bharat Rawal,
  • Yifan Guo and
  • Wei Yu

Integrating deep learning (DL) with the Internet of Medical Things (IoMT) is a paradigm shift in modern healthcare, offering enormous opportunities for patient care, diagnostics, and treatment. Implementing DL with IoMT has the potential to deliver b...

  • Article
  • Open Access
5 Citations
2,300 Views
21 Pages

19 September 2023

Deep learning has undergone significant progress for machinery fault diagnosis in the Industrial Internet of Things; however, it requires a substantial amount of labeled data. The lack of sufficient fault samples in practical applications remains a c...

  • Article
  • Open Access
17 Citations
3,737 Views
14 Pages

Examining Barriers to Medication Adherence and Retention in Care among Women Living with HIV in the Face of Homelessness and Unstable Housing

  • Sofia B. Fernandez,
  • Cindy Lopez,
  • Cynthia Ibarra,
  • Diana M. Sheehan,
  • Robert A. Ladner and
  • Mary Jo Trepka

Despite advances in biomedical treatments, women living with HIV (WLH) who experience homelessness and housing instability suffer suboptimal HIV outcomes, even when linked to treatment. The purpose of this study was to explore experiences of housing...

  • Article
  • Open Access
19 Citations
4,411 Views
18 Pages

Homomorphic Encryption-Based Robust Reversible Watermarking for 3D Model

  • Li Li,
  • Shengxian Wang,
  • Shanqing Zhang,
  • Ting Luo and
  • Ching-Chun Chang

1 March 2020

Robust reversible watermarking in an encrypted domain is a technique that preserves privacy and protects copyright for multimedia transmission in the cloud. In general, most models of buildings and medical organs are constructed by three-dimensional...

  • Article
  • Open Access
591 Views
20 Pages

This study addresses the challenge of evaluating artificial intelligence (AI) systems across heterogeneous regulatory frameworks. Although the NIST AI RMF, EU AI Act, and ISO/IEC 23894/42001 define important governance requirements, they do not provi...

  • Article
  • Open Access

Homomorphic ReLU with Full-Domain Bootstrapping

  • Yuqun Lin,
  • Yi Huang,
  • Xiaomeng Tang,
  • Jingjing Fan,
  • Qifei Xu,
  • Zoe-Lin Jiang,
  • Xiaosong Zhang and
  • Junbin Fang

Fully homomorphic encryption (FHE) offers a promising solution for privacy-preserving machine learning by enabling arbitrary computations on encrypted data. However, the efficient evaluation of non-linear functions—such as the ReLU activation f...

  • Review
  • Open Access
66 Citations
16,319 Views
44 Pages

3 March 2024

The evolution of Patient-Generated Health Data (PGHD) represents a major shift in healthcare, fueled by technological progress. The advent of PGHD, with technologies such as wearable devices and home monitoring systems, extends data collection beyond...

  • Article
  • Open Access
19 Citations
5,898 Views
22 Pages

Identification of IoT Actors

  • Suada Hadzovic,
  • Sasa Mrdovic and
  • Milutin Radonjic

17 March 2021

The Internet of Things (IoT) is a leading trend with numerous opportunities accompanied by advantages as well as disadvantages. Parallel with IoT development, significant privacy and personal data protection challenges are also growing. In this regar...

  • Article
  • Open Access
311 Views
24 Pages

Background/Objectives: Accurate brain tumor segmentation from MRI is crucial for diagnosis but faces challenges like domain shifts across medical centers, data privacy constraints, and high annotation costs. While source-free active domain adaptation...

  • Review
  • Open Access
6 Citations
4,864 Views
32 Pages

30 March 2025

As the interest in social and assistive support robots (SASRs) grows, a review of 17 systematic reviews was conducted to assess their use in healthcare, emotional well-being, and therapy for diverse populations, including older adults, children, and...

  • Article
  • Open Access
25 Citations
6,832 Views
16 Pages

Danger-Pose Detection System Using Commodity Wi-Fi for Bathroom Monitoring

  • Zizheng Zhang,
  • Shigemi Ishida,
  • Shigeaki Tagashira and
  • Akira Fukuda

20 February 2019

A bathroom has higher probability of accidents than other rooms due to a slippery floor and temperature change. Because of high privacy and humidity, we face difficulties in monitoring inside a bathroom using traditional healthcare methods based on c...

  • Article
  • Open Access
1 Citations
3,051 Views
24 Pages

Daily Living Activity Recognition with Frequency-Shift WiFi Backscatter Tags

  • Hikoto Iseda,
  • Keiichi Yasumoto,
  • Akira Uchiyama and
  • Teruo Higashino

21 May 2024

To provide diverse in-home services like elderly care, versatile activity recognition technology is essential. Radio-based methods, including WiFi CSI, RFID, and backscatter communication, are preferred due to their minimal privacy intrusion, reduced...

of 5