You are currently on the new version of our website. Access the old version .

161 Results Found

  • Article
  • Open Access
15 Citations
3,938 Views
22 Pages

PRIPRO—Privacy Profiles: User Profiling Management for Smart Environments

  • Jonas Cesconetto,
  • Luís Augusto Silva,
  • Fabricio Bortoluzzi,
  • María Navarro-Cáceres,
  • Cesar A. Zeferino and
  • Valderi R. Q. Leithardt

17 September 2020

Smart environments are pervasive computing systems that provide higher comfort levels on daily routines throughout interactions among smart sensors and embedded computers. The lack of privacy within these interactions can lead to the exposure of sens...

  • Review
  • Open Access
1 Citations
5,666 Views
16 Pages

1 October 2024

Users are usually required to share several types of data, including their personal data, as different providers strive to offer high-quality services that are often tailored to end-users’ preferences. However, when it comes to personalizing se...

  • Review
  • Open Access
34 Citations
8,114 Views
23 Pages

Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review

  • Luis Hernández-Álvarez,
  • José María de Fuentes,
  • Lorena González-Manzano and
  • Luis Hernández Encinas

25 December 2020

Ensuring the confidentiality of private data stored in our technological devices is a fundamental aspect for protecting our personal and professional information. Authentication procedures are among the main methods used to achieve this protection an...

  • Article
  • Open Access
20 Citations
8,163 Views
46 Pages

21 March 2014

Recommendation systems are information-filtering systems that tailor information to users on the basis of knowledge about their preferences. The ability of these systems to profile users is what enables such intelligent functionality, but at the same...

  • Article
  • Open Access
1 Citations
5,421 Views
16 Pages

On the Anonymity Risk of Time-Varying User Profiles

  • Silvia Puglisi,
  • David Rebollo-Monedero and
  • Jordi Forné

26 April 2017

Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions are therefore aggregated and a...

  • Article
  • Open Access
2 Citations
1,333 Views
20 Pages

Power Profiling of Smart Grid Users Using Dynamic Time Warping

  • Minchang Kim,
  • Mahdi Daghmehchi Firoozjaei,
  • Hyoungshick Kim and
  • Mohamad El-Hajj

Power consumption data play a crucial role in demand management and abnormality detection in smart grids. Despite its management benefits, analyzing power consumption data leads to profiling consumers and opens privacy issues. To demonstrate this, we...

  • Article
  • Open Access
19 Citations
8,765 Views
34 Pages

Entropy-Based Privacy against Profiling of User Mobility

  • Alicia Rodriguez-Carrion,
  • David Rebollo-Monedero,
  • Jordi Forné,
  • Celeste Campo,
  • Carlos Garcia-Rubio,
  • Javier Parra-Arnau and
  • Sajal K. Das

10 June 2015

Location-based services (LBSs) flood mobile phones nowadays, but their use poses an evident privacy risk. The locations accompanying the LBS queries can be exploited by the LBS provider to build the user profile of visited locations, which might disc...

  • Feature Paper
  • Article
  • Open Access
6 Citations
3,041 Views
16 Pages

Framework Integrating Lossy Compression and Perturbation for the Case of Smart Meter Privacy

  • Maik Plenz,
  • Chaoyu Dong,
  • Florian Grumm,
  • Marc Florian Meyer,
  • Marc Schumann,
  • Malcom McCulloch,
  • Hongjie Jia and
  • Detlef Schulz

The encoding of high-resolution energy profile datasets from end-users generated by smart electricity meters while maintaining the fidelity of relevant information seems to be one of the backbones of smart electrical markets. In the end-user sphere o...

  • Article
  • Open Access
3 Citations
5,335 Views
19 Pages

16 March 2022

Information Communication Technology (ICT) and social networks have significant impact on everyday life. One the one hand, Internet users enjoy promoting themselves and feel free to disseminate information about themselves through websites and social...

  • Article
  • Open Access
7 Citations
4,616 Views
25 Pages

Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles

  • Gianmarco Baldini,
  • José L. Hernandez-Ramos,
  • Slawomir Nowak,
  • Ricardo Neisse and
  • Mateusz Nowak

22 September 2020

It has been proven in research literature that the analysis of encrypted traffic with statistical analysis and machine learning can reveal the type of activities performed by a user accessing the network, thus leading to privacy risks. In particular,...

  • Article
  • Open Access
716 Views
18 Pages

Digital Safety and Risk Perception in Higher Education: Insights from Spanish University Students with Intellectual Disabilities

  • Joanne Mampaso-Desbrow,
  • Margarita Alonso-Criado,
  • María Dolores López-Salmerón and
  • Ángel Vicario-Merino

As digital technologies become increasingly integrated into daily life, individuals with intellectual disabilities face both opportunities and risks in virtual environments. Despite widespread internet access and frequent use of digital devices among...

  • Article
  • Open Access
18 Citations
4,016 Views
19 Pages

1 October 2018

Recently, the number of people who are members of multiple online social networks simultaneously has increased. However, if these people share everything with others, they risk their privacy. Users may be unaware of the privacy risks involved with sh...

  • Article
  • Open Access
11 Citations
5,374 Views
23 Pages

Users' awareness of the extent of information implicit in their geo-profiles on social networks is limited. This questions the validity of their consent to the collection, storage and use of their data. Tools for location privacy awareness are need...

  • Article
  • Open Access
8 Citations
4,872 Views
18 Pages

Determining the Role of Social Identity Attributes to the Protection of Users’ Privacy in Social Media

  • Katerina Vgena,
  • Angeliki Kitsiou,
  • Christos Kalloniatis and
  • Stefanos Gritzalis

24 August 2022

Drawing on digital identity theories, social software engineering theory (SSE), and the Privacy Safeguard (PriS) methodology, we examined the way that personal information uploaded on social media (SM) imposes privacy issues. Throughout a review on u...

  • Article
  • Open Access
3 Citations
4,043 Views
17 Pages

The integration of connected autonomous vehicles (CAVs) has significantly enhanced driving convenience, but it has also raised serious privacy concerns, particularly regarding the personal identifiable information (PII) stored on infotainment systems...

  • Article
  • Open Access
15 Citations
1,992 Views
16 Pages

7 February 2023

Demand response modeling in smart grids plays a significant role in analyzing and shaping the load profiles of consumers. This approach is used in order to increase the efficiency of the system and improve the performance of energy management. The us...

  • Review
  • Open Access
5 Citations
5,084 Views
20 Pages

Data generated by Internet of Things devices enable the design of new business models and services, improving user experience and satisfaction. This data also serve as an essential information source for many fields, including disaster management, bi...

  • Article
  • Open Access
7 Citations
3,603 Views
19 Pages

11 May 2018

A new collaborative filtered recommendation strategy was proposed for existing privacy and security issues in location services. In this strategy, every user establishes his/her own position profiles according to their daily position data, which is p...

  • Article
  • Open Access
2 Citations
872 Views
29 Pages

Self-Adaptive Privacy in Cloud Computing Environments: Developing an Integrated Framework and a Beta Tool for Social Media Platforms

  • Angeliki Kitsiou,
  • Michail Pantelelis,
  • Panagis-Angelos Mazarakis,
  • Aikaterini-Georgia Mavroeidi,
  • Stavros Simou,
  • Eleni Tzortzaki,
  • Stavros Stavridis,
  • Giannis Koutzamanis and
  • Christos Kalloniatis

This study addresses the growing complexity of privacy protection in cloud computing environments (CCEs) by introducing a comprehensive socio-technical framework for self-adaptive privacy, complemented by an AI-driven beta tool designed for social me...

  • Review
  • Open Access
12 Citations
7,638 Views
14 Pages

17 June 2023

The COVID-19 pandemic spurred older adults to use information and communication technology (ICT) for maintaining connections and engagement during social distancing. This trend raises concerns about privacy and data safety for older individuals with...

  • Article
  • Open Access
5 Citations
4,822 Views
14 Pages

2 March 2023

With the rapid growth of web networks, the security and privacy of online users are becoming more compromised. Especially, the use of third-party services to track users’ activities and improve website performance. Therefore, it is unavoidable...

  • Article
  • Open Access
2,021 Views
23 Pages

Quantifying Privacy Risks for Continuous Trait Data

  • Muqing He,
  • Deqing Zou,
  • Weizhong Qiang,
  • Shouhuai Xu,
  • Wenbo Wu and
  • Hai Jin

20 October 2022

In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data shar...

  • Article
  • Open Access
2 Citations
2,503 Views
15 Pages

14 July 2020

Users pay increasing attention to their data privacy in online social networks, resulting in hiding personal information, such as profile attributes and social connections. While network representation learning (NRL) is widely effective in social net...

  • Article
  • Open Access
420 Views
43 Pages

21 December 2025

The exponential growth in the usage of textual data across industries and data sharing across institutions underscores the critical need for frameworks that effectively balance data utility and privacy. This paper proposes an innovative agentic AI-ba...

  • Article
  • Open Access
848 Views
21 Pages

17 September 2025

Differential privacy (DP) has become a cornerstone for privacy-preserving machine learning, yet its application to high-resolution satellite imagery remains underexplored. Existing DP algorithms, such as DP-SGD, often rely on static noise levels and...

  • Feature Paper
  • Review
  • Open Access
23 Citations
11,440 Views
26 Pages

Biometric Systems De-Identification: Current Advancements and Future Directions

  • Md Shopon,
  • Sanjida Nasreen Tumpa,
  • Yajurv Bhatia,
  • K. N. Pavan Kumar and
  • Marina L. Gavrilova

31 August 2021

Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applic...

  • Article
  • Open Access
14 Citations
4,215 Views
15 Pages

Graph Convolutional Networks for Privacy Metrics in Online Social Networks

  • Xuefeng Li,
  • Yang Xin,
  • Chensu Zhao,
  • Yixian Yang and
  • Yuling Chen

15 February 2020

In recent years, privacy leakage events in large-scale social networks have become increasingly frequent. Traditional methods relying on operators have been unable to effectively curb this problem. Researchers must turn their attention to the privacy...

  • Review
  • Open Access
31 Citations
14,528 Views
28 Pages

Trustworthy AI: Securing Sensitive Data in Large Language Models

  • Georgios Feretzakis and
  • Vassilios S. Verykios

6 December 2024

Large language models (LLMs) have transformed Natural Language Processing (NLP) by enabling robust text generation and understanding. However, their deployment in sensitive domains like healthcare, finance, and legal services raises critical concerns...

  • Article
  • Open Access
13 Citations
11,827 Views
20 Pages

A Privacy-by-Design Contextual Suggestion System for Tourism

  • Pavlos S. Efraimidis,
  • George Drosatos,
  • Avi Arampatzis,
  • Giorgos Stamatelatos and
  • Ioannis N. Athanasiadis

We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we call Pythia, exploits the compu...

  • Feature Paper
  • Article
  • Open Access
9 Citations
3,976 Views
18 Pages

Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid

  • Daniele Croce,
  • Fabrizio Giuliano,
  • Ilenia Tinnirello and
  • Laura Giarré

16 April 2020

In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with en...

  • Article
  • Open Access
28 Citations
13,119 Views
14 Pages

Users share vast amounts of personal information online, but are they fully aware of what information they are sharing and with whom? In this paper, we focused on Facebook apps and set out to understand how concerned users are about privacy and how w...

  • Article
  • Open Access
898 Views
25 Pages

Email continues to serve as a primary vector for cyber-attacks, with phishing, spoofing, and polymorphic malware evolving rapidly to evade traditional defences. Conventional email security systems, often reliant on static, signature-based detection s...

  • Article
  • Open Access
4 Citations
3,789 Views
31 Pages

5 July 2025

Federated Learning (FL), a key paradigm in privacy-preserving and distributed machine learning (ML), enables collaborative model training across decentralized data sources without requiring raw data exchange. FL enables collaborative model training a...

  • Article
  • Open Access
23 Citations
4,241 Views
20 Pages

23 September 2020

This study explores the overall picture of how people perceive the importance level and urgency level regarding issues associated with automated vehicles, by sorting out ten issues, developing a questionnaire with 66 measurement items, and investigat...

  • Article
  • Open Access
6 Citations
7,371 Views
27 Pages

10 October 2024

This paper presents an innovative methodology for enhancing museum visitor experiences through personalized content delivery using a combination of explicit and implicit visitor profiling. The approach integrates Bluetooth Low Energy (BLE) smart badg...

  • Feature Paper
  • Article
  • Open Access
9 Citations
4,899 Views
14 Pages

The evolution of digital advertising, which is aimed at a mass audience, to programmatic advertising, which is aimed at individual users depending on their profile, has raised concerns about the use of personal data and invasion of user privacy on th...

  • Article
  • Open Access
1 Citations
1,684 Views
35 Pages

A Data-Driven Approach for Generating Synthetic Load Profiles with GANs

  • Tsvetelina Kaneva,
  • Irena Valova,
  • Katerina Gabrovska-Evstatieva and
  • Boris Evstatiev

13 July 2025

The generation of realistic electrical load profiles is essential for advancing smart grid analytics, demand forecasting, and privacy-preserving data sharing. Traditional approaches often rely on large, high-resolution datasets and complex recurrent...

  • Article
  • Open Access
18 Citations
4,092 Views
19 Pages

10 May 2023

To ensure the success of energy transition and achieve the target of reducing the carbon footprint of energy systems, the management of energy systems needs to be decentralized. Public blockchains offer favorable features to support energy sector dem...

  • Article
  • Open Access
1,066 Views
17 Pages

Electric vehicle (EV) charging infrastructures raise significant concerns about data security and user privacy because traditional centralized authorization and billing frameworks expose sensitive information to breaches and profiling. To address the...

  • Review
  • Open Access
6 Citations
3,323 Views
27 Pages

A Rigorous Standalone Literature Review of Residential Electricity Load Profiles

  • Angreine Kewo,
  • Pinrolinvic D. K. Manembu and
  • Per Sieverts Nielsen

13 May 2023

The introduction of smart meters and time-use survey data is helping decision makers to understand the residential electricity consumption behaviour behind load profiles. However, it can be difficult to obtain the actual detailed consumption data due...

  • Article
  • Open Access
19 Citations
15,248 Views
27 Pages

11 October 2011

Constructing a personal identity is an activity much more complex than elaborating a series of online profiles, which are only digital hints of the Self. The construction of our personal identity is a context-mediated activity. Our hypothesis is that...

  • Systematic Review
  • Open Access
88 Citations
18,873 Views
18 Pages

A Systematic Literature Review of Information Security in Chatbots

  • Jing Yang,
  • Yen-Lin Chen,
  • Lip Yee Por and
  • Chin Soon Ku

23 May 2023

Chatbots have become increasingly popular in recent years, but they also present security risks and vulnerabilities that need to be addressed. This systematic literature review examines the existing research relating to information security in chatbo...

  • Article
  • Open Access
11 Citations
7,589 Views
30 Pages

Extended Reality (XR), encompassing Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), enables immersive experiences across various fields, including entertainment, healthcare, and education. However, its data-intensive and interac...

  • Article
  • Open Access
19 Citations
5,740 Views
19 Pages

A Novel Homomorphic Approach for Preserving Privacy of Patient Data in Telemedicine

  • Yasir Iqbal,
  • Shahzaib Tahir,
  • Hasan Tahir,
  • Fawad Khan,
  • Saqib Saeed,
  • Abdullah M. Almuhaideb and
  • Adeel M. Syed

11 June 2022

Globally, the surge in disease and urgency in maintaining social distancing has reawakened the use of telemedicine/telehealth. Amid the global health crisis, the world adopted the culture of online consultancy. Thus, there is a need to revamp the con...

  • Article
  • Open Access
26 Citations
6,388 Views
18 Pages

PRISER: Managing Notification in Multiples Devices with Data Privacy Support

  • Luis Augusto Silva,
  • Valderi Reis Quietinho Leithardt,
  • Carlos O. Rolim,
  • Gabriel Villarrubia González,
  • Cláudio F. R. Geyer and
  • Jorge Sá Silva

13 July 2019

With the growing number of mobile devices receiving daily notifications, it is necessary to manage the variety of information produced. New smart devices are developed every day with the ability to generate, send, and display messages about their sta...

  • Article
  • Open Access
18 Citations
3,795 Views
22 Pages

A Novel Data-Energy Management Algorithm for Smart Transformers to Optimize the Total Load Demand in Smart Homes

  • Claude Ziad El-Bayeh,
  • Ursula Eicker,
  • Khaled Alzaareer,
  • Brahim Brahmi and
  • Mohamed Zellagui

22 September 2020

The increased integration of Electric Vehicles (EVs) into the distribution network can create severe issues—especially when demand response programs and time-varying electricity prices are applied, EVs tend to charge during the off-peak time to...

  • Article
  • Open Access
5 Citations
4,717 Views
21 Pages

A Cluster Analysis of the Acceptance of a Contact Tracing App—The Identification of Profiles for the Italian Immuni Contact Tracing App

  • Marcello Sarini,
  • Rossana Actis Grosso,
  • Maria Elena Magrin,
  • Silvia Mari,
  • Nadia Olivero,
  • Giulia Paganin and
  • Silvia Simbula

Digital contact tracing apps have been introduced by governments as a strategy to limit the spread of the COVID-19 pandemic. Digital contact tracking is an alternative to traditional contact tracing performed by human tracers who have to reconstruct...

  • Article
  • Open Access
15 Citations
4,274 Views
11 Pages

Adolescent Profiles According to Their Beliefs and Affinity to Sexting. A Cluster Study

  • Encarnación Soriano-Ayala,
  • Verónica C. Cala and
  • Rachida Dalouh

Sexting consists of sending, receiving, and distributing images of sexually suggestive content through electronic devices. This practice is one of the new ways of linking sex affectively through virtual environments, especially in adolescence. Howeve...

  • Feature Paper
  • Article
  • Open Access
4 Citations
2,678 Views
13 Pages

A Graph-Based Differentially Private Algorithm for Mining Frequent Sequential Patterns

  • Miguel Nunez-del-Prado,
  • Yoshitomi Maehara-Aliaga,
  • Julián Salas,
  • Hugo Alatrista-Salas and
  • David Megías

18 February 2022

Currently, individuals leave a digital trace of their activities when they use their smartphones, social media, mobile apps, credit card payments, Internet surfing profile, etc. These digital activities hide intrinsic usage patterns, which can be ext...

of 4