Research Projects Ideas Information Privacy

Information Privacy Research Projects Ideas, Topics, and Areas

Here, i am sharing with you a list of Information Privacy Research Topics ideas MS Ph.D.

1. Privacy preserving data aggregation with fault tolerance in fog-enabled smart grids
2. A multi-dimensional index for privacy-preserving queries in cloud computing
3. Patient privacy and autonomy: a comparative analysis of cases of ethical dilemmas in China and the United States
4. Towards a Blockchain and Smart Contracts-Based Privacy Framework for Decentralized Data Processing
5. Jellyfish dynamic routing protocol with mobile sink for location privacy and congestion avoidance in wireless sensor networks
6. Wavelet-based dynamic and privacy-preserving similitude data models for edge computing
7. Privacy Impact on Generalized Nash Equilibrium in Peer-to-Peer Electricity Market
8. The Right to Customization: Conceptualizing the Right to Repair for Informational Privacy
9. Integrated Security and Privacy Framework for Big Data in Hadoop MapReduce Framework
10. Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids
11. The INSESS-COVID19 Project. Evaluating the Impact of the COVID19 in Social Vulnerability While Preserving Privacy of Participants from Minority Subpopulations
12. A critical overview of privacy-preserving approaches for collaborative forecasting
13. A Systematic Literature Review of Data Privacy Issues in Cloud BI
14. Transforming Data Flow Diagrams for Privacy Compliance.
15. Dynamic encryption method of user privacy data based on association rules hiding
16. Regulatory Responses to Data Privacy Crises and Their Ongoing Impact on E-Discovery
17. Designing privacy-aware intelligent transport systems: a roadmap for identifying the major privacy concepts
18. Differential Privacy Meets Federated Learning under Communication Constraints
19. Distributed economic dispatch via a predictive scheme: heterogeneous delays and privacy preservation
20. Digital Privacy in the Mainstream of Education
21. Data Privacy in Bid-Price Control for Network Revenue Management
22. Privacy, adoption, and truthful reporting: a simple theory of contact tracing applications
23. Theoretical analysis on applications aspects of smart materials preserving the security and privacy in medical big data and cloud
24. Consortium Blockchain for Cooperative Location Privacy Preservation in 5G-enabled Vehicular Fog Computing
25. Certified Robustness to Word Substitution Attack with Differential Privacy
26. A New Decentralized Certification Verification Privacy Control Protocol
27. Citizen-centered, auditable and privacy-preserving population genomics
28. Differential privacy applied to smart meters: a mapping study
29. Randori: Local Differential Privacy for All
30. Privacy in the Era of Big Data: Unlocking the Blue Oceans of Data Paradigm in Malaysia
31. Privacy-Preserving RFID-Based Search System. Electronics 2021, 10, 599
32. Privacy And Personal Data Protection: Uses And Misuses Of Personal Data Under Brazilian Law
33. CPPA-D: Efficient Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs
34. Blockchain-based privacy preservation for 5g-enabled drone communications
35. Privacy in Cloud Healthcare Data
36. Privacy-Preserving Non-Participatory Surveillance System for COVID-19-Like Pandemics
37. Privacy-preserving incentive mechanism for multi-leader multi-follower iot-edge computing market: A reinforcement learning approach
38. CEEP-FL: A comprehensive approach for communication efficiency and enhanced privacy in federated learning
39. An Auditability, Transparent, and Privacy-Preserving for Supply Chain Traceability Based on Blockchain
40. On the security and privacy challenges of virtual assistants
41. PPT: A Privacy-Preserving Global Model Training Protocol for Federated Learning in P2P Networks
42. Covid notions: Towards formal definitions–and documented understanding–of privacy goals and claimed protection in proximity-tracing services
43. DDUO: General-Purpose Dynamic Analysis for Differential Privacy
44. Privacy-Preserving Pandemic Monitoring
45. Can Competition Protect Privacy? An Analysis Based on the German Facebook Case
46. On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance
47. Privacy-Preserving and Verifiable Electronic Voting Scheme Based on Smart Contract of Blockchain
48. Fog computing security and privacy for the Internet of Thing applications: State-of-the-art
49. WeStat: a Privacy-Preserving Mobile Data Usage Statistics System
50. Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges
51. Fair payments for privacy-preserving aggregation of mobile crowdsensing data
52. Amplifying Privacy: Scaling Up Transparency Research Through Delegated Access Requests
53. Evaluating Privacy Risks of Deep Learning Based General-Purpose Language Models
54. A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment
55. Measuring the impact of spatial perturbations on the relationship between data privacy and validity of descriptive statistics
56. An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions
57. Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks
58. ppAUC: Privacy Preserving Area Under the Curve with Secure 3-Party Computation
59. 2. Defining Privacy
60. On Non-monotone Payments in Privacy-Based Screening
61. Is Bloom Filter a Bad Choice for Security and Privacy?
62. Circular interpolation and chronological-whale optimization based privacy preservation in cloud
63. How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free
64. Protecting Source Location Privacy in IoT Enabled Wireless Sensor Networks: the Case of Multiple Assets
66. EREBOTS: privacy-compliant agent-based platform for multi-scenario personalized health-assistant chatbots
67. An optimal scheduling scheme for smart home electricity considering demand response and privacy protection
68. Government and corporate surveillance: moral discourse on privacy in the civil sphere
69. Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols
70. Combining Forensics and Privacy Requirements for Digital Images
71. Regulating Disinformation in Europe: Implications for Speech and Privacy
72. EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network
73. Privacy reinforcement learning for faults detection in the smart grid
74. Consent in privacy laws: Analysis of India’s PDPB, ECPA of USA and GDPR of EU
75. Location Privacy-Preserving Task Recommendation with Geometric Range Query in Mobile Crowdsensing
76. PPNS: A Privacy-Preserving Node Selection Scheme in Crowdsensing Based on Blockchain
77. A One-Dimensional Non-Intrusive and Privacy-Preserving Identification System for Households
78. Towards Transparent and Accountable Privacy Preserving Data Classification
79. IEEE 802.11 CSI randomization to preserve location privacy: An empirical evaluation in different scenarios
80. AggFT: Low-Cost Fault-Tolerant Smart Meter Aggregation with Proven Termination and Privacy
81. Preserving Privacy of Data in Distributed Systems Using Homomorphic Encryption
82. Privacy leakage of sift features via deep generative model based image reconstruction
83. Local Differential Privacy Is Equivalent to Contraction of -Divergence
84. DNet: An Efficient Privacy-Preserving Distributed Learning Framework for Healthcare Systems
85. A Novel Authentication Framework with Conditional Privacy Preservation and Non-Repudiation for Fog-Vanet
86. Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties
87. Proactive Privacy-preserving Learning for Retrieval
88. Federated Multi-task Image Classification on Heterogeneous Medical data with Privacy Perversing
89. From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR
90. Regionalized location obfuscation mechanism with personalized privacy levels
91. Preserving Privacy in Personalized Models for Distributed Mobile Services
92. HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
93. Conclusion and Future Research Issues
94. Implications of COVID-19 for privacy at work
95. Information Privacy Law. Aspen casebook series
96. Instagram’s Latest Lawsuit: Examining Data Privacy in Big Tech
97. Privacy-preserving cloud-fog–based traceable road condition monitoring in VANET
98. Differential privacy in the 2020 Census will distort COVID-19 rates
99. Privacyflash pro: automating privacy policy generation for mobile apps
100. Privacy-Preserving Infection Exposure Notification without Trust in Third Parties
101. Privacy-Preserving Search for a Similar Genomic Makeup in the Cloud
102. A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography
103. The right of privacy for a patient with Coronavirus between protection and violation
104. IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings?
105. Sacrificing Privacy in the Fight Against Pandemics: How Far Is Too Far? Examples from Bosnia and Herzegovina and Montenegro
106. FedPS: A Privacy Protection Enhanced Personalized Search Framework
107. Histogram Publication over Numerical Values under Local Differential Privacy
108. Security and Privacy-Awareness in a Software-Defined Fog Computing Network for the Internet of Things
109. No Privacy, No Peace? Technological Surveillance and the Spatial Struggle of Black Lives Matter Protests
110. Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain
111. An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs
112. DAP 2 CMH: Deep Adversarial Privacy-Preserving Cross-Modal Hashing
113. Protecting Big Data Privacy Using Randomized Tensor Network Decomposition and Dispersed Tensor Computation
114. Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption
115. Privacy Law’s Third Wave
116. A survey on privacy and access control schemes in fog computing
117. A survey on security and privacy of federated learning
118. Legal Grounds For Privacy
119. Artificial Intelligence and the Right to Privacy in Times of Terrorism
120. Data Security and Sensitive Data Protection using Privacy by Design Technique
121. Privacy-preserving data mining for open government data from heterogeneous sources
122. Comparison of Privacy Consciousness Between Younger and Older Adults
123. Privacy-Preserving Analytics for Data Markets Using MPC
124. Systematic evaluation of privacy risks of machine learning models
125. Privacy, Regulations, and Cybersecurity: The Essential Business Guide
126. P2GT: Fine-Grained Genomic Data Access Control with Privacy-Preserving Testing in Cloud Computing
127. Efficient Privacy-Aware Federated Learning by Elimination of Downstream Redundancy
128. Achieving Efficient and Privacy-Preserving Set Containment Search over Encrypted Data
129. Private Life and Privacy in Nazi Germany ed. by Elizabeth Harvey et al.
130. The problem of privacy in Mediterranean anthropology
131. A privacy-aware data aggregation scheme for smart grid based on elliptic curve cryptography with provable security against internal attacks
132. Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic Encryption.
133. The Role of Privacy in Digitalization-Analyzing Perspectives of German Farmers.
134. Network Consensus with Privacy: A Secret Sharing Method
136. Biometric Based User Authentication and Privacy Preserving In Cloud Environment
137. Local Privacy-Preserving Dynamic Worker Locations in Spatial Crowdsourcing
138. Children’s privacy in lockdown: intersections between privacy, participation and protection rights in a pandemic
139. Privacy-Preserving Self-Taught Federated Learning for Heterogeneous Data
140. PDS2: A user-centered decentralized marketplace for privacy preserving data processing
142. Privacy preservation of data using modified rider optimization algorithm: Optimal data sanitization and restoration model
143. PyFF: A Fog-Based Flexible Architecture for Enabling Privacy-by-Design IoT-Based Communal Smart Environments
144. Understanding the Tradeoffs in Client-Side Privacy for Speech Recognition
145. Federated Learning with Local Differential Privacy: Trade-Offs Between Privacy, Utility, and Communication
146. Privacy preserving distributed machine learning with federated learning
147. Critical success factors to create 5G networks in the smart cities of India from the security and privacy perspectives
148. Outsourced attribute-based signatures with perfect privacy for circuits in cloud computing
149. A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid
150. The Democratic Impact of Strengthening European Fundamental Rights in the Digital Age: The Example of Privacy Protection
151. A false promise of COVID-19 ‘big’health data? Health data integrity and the ethics and realities of Australia’s health information management practice
152. Quantum-based privacy-preserving sealed-bid auction on the blockchain
153. ( lp 1 , … , lpn )-Privacy: privacy preservation models for numerical quasi-identifiers and multiple …
154. Blockchain: A Privacy Centered Standard for Corporate Compliance
155. Mobile Handset Privacy: Measuring The Data iOS and Android Send to Apple And Google
156. Private Largess in the Digital Age: Privacy in Reich’s The New Propery
157. Sequential Patterns, Trends and Privacy
158. Understanding privacy risks in typical deep learning models for medical image analysis
159. Estimating smooth GLM in non-interactive local differential privacy model with public unlabeled data
160. Heath Device Security and Privacy: A Comparative Analysis of Fitbit, Jawbone, Google Glass and Samsung Galaxy Watch
161. Privacy-preserving Analytics for Data Markets using MPC
162. Review on Block Chain based Privacy-Preserving Authentication Scheme for VANETS
163. Privacy policy clauses: Exploitation by unfair trading conditions under Article 102 (a) TFEU?
164. Privacy-preserving and bandwidth-efficient federated learning: an application to in-hospital mortality prediction
165. Outed by Advertisements: How LGBTQ Internet Users Present a Case for Federal Data Privacy Legislation
166. A Quick Survey of Security and Privacy Issues in Cloud and a Proposed Data-Centric Security Model for Data Security
167. On the Renyi Differential Privacy of the Shuffle Model
168. Calpric: Automated Classification of Privacy Policy Using Deep Active Learning and Crowdsourcing Techniques
169. Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters
170. Google as a de facto privacy regulator: analysing the Privacy Sandbox from an antitrust perspective
171. A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things
172. Privacy Compliance: Can Technology Come to the Rescue?
173. Accurate and Efficient Suffix Tree Based Privacy-Preserving String Matching
174. Protecting the Right to Privacy in a Digital Era
175. Private and Utility Enhanced Recommendations with Local Differential Privacy and Gaussian Mixture Model
176. Fearn v Tate Galleries: Privacy and the law of nuisance
177. TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning
178. Privacy-preserving data splitting: a combinatorial approach
179. Towards Greater Respect for the Users Privacy in communication technologies.
180. The History of Micro-Organisms, Black Genealogies, and the Matter of Privacy
181. User and infrastructure security and privacy with regard to compliance
182. Data Linkages and Privacy Regulation
183. Differential Privacy using Fuzzy Convolution Neural Network (DP-FCNN) with Laplace Mechanism and Authenticated Access in Edge Computing
184. Comprehensive Study of Security and Privacy of Emerging Non-Volatile Memories
185. A Privacy and Integrity Preserving Framework For Incorporating Intelligence In Digital Forensics
186. Information Security and Cybersecurity Management: A Case Study with SMEs in Portugal
187. Emerging Technologies in a Modern Competitive Scenario: Understanding the Panorama for Security and Privacy Requirements
188. Framework towards Higher Data Privacy by Novel Data Integrity Scheme
189. Kant and Privacy
190. PBTM: A Privacy-Preserving Announcement Protocol With Blockchain-Based Trust Management for IoV
191. Transparency reporting: Considerations for the review of the privacy guidelines
192. Striking a Balance Between Personalised Genetics and Privacy Protection from the Perspective of GDPR
193. COVID-19 Tests Gone Rogue: Privacy, Efficacy, Mismanagement and Misunderstandings
194. Stability and Differential Privacy of Stochastic Gradient Descent for Pairwise Learning with Non-Smooth Loss
195. Personalized Location Privacy Protection Based on Vehicle Movement Regularity in Vehicular Networks
196. Privacy-preserving quality prediction for edge-based IoT services
197. Three variants of differential privacy: Lossless conversion and applications
198. Owning and Sharing: Privacy Perceptions of Smart Speaker Users
199. Privacy Technologies and Policy
200. GarliChain: A Privacy Preserving System for Smart Grid Consumers using Blockchain
201. ” So-called privacy breeds evil” Narrative Justifications for Intimate Partner Surveillance in Online Forums
202. End-user privacy protection scheme from cyber intrusion in smart grid advanced metering infrastructure
203. Employee Privacy Rights While Working from Home
204. Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing
205. Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies
206. Super-convergence and Differential Privacy: Training faster with better privacy guarantees
207. Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East. Future Internet 2021, 13, 10
208. The Impact of Privacy Measures on Online Advertising Markets
209. Secure and Efficient Data Privacy-preserving Scheme for Mobile Cyber Physical Systems
210. Sensitivity reduction of degree histogram publication under node differential privacy via mean filtering
211. DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy
212. Privacy-Aware Collaborative Task Offloading in Fog Computing
213. A Privacy-aware and Traceable Fine-grained Data Delivery System in Cloud-assisted Healthcare IIoT
214. Scalable and data privacy conserving controller tuning for large-scale power networks
216. PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet
217. Internet of Things Security and Privacy
218. COVID-19 & privacy: Enhancing of indoor localization architectures towards effective social distancing
219. Federated deep learning for detecting COVID-19 lung abnormalities in CT: a privacy-preserving multinational validation study
220. Federated Learning with Differential Privacy for Resilient Vehicular Cyber Physical Systems
221. How Private Individuals Maintain Privacy and Govern Their Own Health Data Cooperative
222. Machine Learning in Precision Medicine to Preserve Privacy via Encryption
223. Fuzzy Rule-Based Layered Classifier and Entropy-Based Feature Selection for Intrusion Detection System
224. A Multi-Server Authentication Protocol Achieving Privacy Protection and Traceability for 5G Mobile Edge Computing
225. Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation
226. Bounding, Concentrating, and Truncating: Unifying Privacy Loss Composition for Data Analytics
227. Researching COVID-19 tracing app acceptance: incorporating theory from the technological acceptance model
228. Evolutionary Encryption Algorithm Ensuring Privacy in Video Surveillance
229. Privacy Rights
230. International law, surveillance and the protection of privacy
231. 22 E-Money and Data Privacy
232. Synthetic data
233. Privacy-Preserving Deep Speaker Separation for Smartphone-Based Passive Speech Assessment
234. Covert Embodied Choice: Decision-Making and the Limits of Privacy Under Biometric Surveillance
235. Privacy Preserving Domain Adaptation for Semantic Segmentation of Medical Images
236. Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management
237. Detection and Prediction of Spam Emails Using Machine Learning Models
238. On atypical approaches for privacy preserving using multi-dimensional geometric object based intelligent cryptography for modern applications
239. Enhanced Privacy Duties for Dominant Technology Companies
240. An efficient privacy-preserving data publishing in health care records with multiple sensitive attributes
241. Data Privacy Based on IoT Device Behavior Control Using Blockchain
242. Autonomy Loss, Privacy Invasion and Data Misuse as Psychological Barriers to Peer-to-Peer Collaborative Car Use
243. Privacy-preserving evaluation for support vector clustering
244. On the Practicality of Differential Privacy in Federated Learning by Tuning Iteration Times
245. Thwarting Traffic Classification for Privacy Preservation
246. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
247. Effects and Projections of the Brazilian General Data Protection Law (LGPD) Application and the Role of the DPO
248. Finding location of fake and phantom source for source location privacy in wireless sensor network
249. Defensive Technology Use by Political Activists During the Sudanese Revolution
250. Overdue improvements needed: Canada’s public sector Privacy Act (Submission to the Department of Justice, Canada)
251. Microdata access and privacy: What have we learned over twenty years?
252. A method for measuring urban space density of people and deliver notification, with respect to privacy
253. Privacy and Border Controls in the Fight against Terrorism: A Fundamental Rights Analysis of Passenger Data Sharing
254. Anonymization as homeomorphic data space transformation for privacy-preserving deep learning
255. A Profit-Maximizing Mechanism for Query-Based Data Trading with Personalized Differential Privacy
256. Issues and Challenges (Privacy, Security, and Trust) in Blockchain-Based Applications
257. Privacy Preserving Verification Scheme for Cloud Platform Using DML
258. Differentially private normalizing flows for privacy-preserving density estimation
260. COVID-19 vs Social Media Apps: Does Privacy Really Matter?
261. From privacy to data protection: the road ahead for the Inter-American System of human rights
262. DSVD-autoencoder: A scalable distributed privacy-preserving method for one-class classification
263. Privacy-preserving string search on encrypted genomic data using a generalized suffix tree
264. Fortified-Chain: A Blockchain Based Framework for Security and Privacy Assured Internet of Medical Things with Effective Access Control
265. Privacy preserving-probabilistic record linkage to assess cancer outcomes in people living with HIV in South Africa
266. Gone, But Not” Forgotten”—Technical & Practical Challenges In Operationalizing Modern Privacy Rights
267. Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks
268. Preventing fake information generation against media clone attacks
269. 8 Decentralized solutions for data collection and privacy in healthcare
270. Longitudinal Collection and Analysis of Mobile Phone Data with Local Differential Privacy
271. Privacy-aware VR streaming
272. Construction of Perioperative Preoperative Evaluation Platform Based on Privacy Protection
273. Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X
274. Blockchain Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices
275. Researching the tension between privacy and inclusion in organisations: Promises and pitfalls of a transdisciplinary approach
276. Reply to:“Discussing sexuality in cancer care: towards personalized information for cancer patients and survivors”
277. Microsoft SmartNoise Differential Privacy Machine Learning Case Studies
278. Entity set expansion in knowledge graph: a heterogeneous information network perspective
279. Drivers and Inhibitors for Organizations’ Intention to Adopt Artificial Intelligence as a Service
280. Legal and Regulatory Implications of Telemedicine
281. e-Privacy: Theorie und Dogmatik eines europäischen Privatheitsschutzes im Internet-Zeitalter
282. Legal Challenges of Big Data
283. Knowledge and Information as an Object of Criminal Law Protection
284. A Privacy-Aware PUFs-Based Multi-Server Authentication Protocol in Cloud-Edge IoT Systems Using Blockchain
285. A Public Platform for Virtual IoT-Based Monitoring and Tracking of COVID-19
286. Provably Secure Symmetric Private Information Retrieval with Quantum Cryptography
287. Group Data Sharing and Auditing While Securing Sensitive Information
288. A proposal for a new risk-based licensing approach to disclosing anonymised data under the (UK) Freedom of Information Act 2000
289. Building Information Modelling in Transport Infrastructure Sector
290. Non-Intrusive, Privacy Preserving Occupancy Estimation
291. Awakening the Web’s Sleeper Agents: Misusing Service Workers for Privacy Leakage
292. Multipath Routing on Anonymous Communication Systems: Enhancing Privacy and Performance
293. Profile Information Analysis of Twitter Social Network
294. Blockchain-based secure information sharing for supply chain management: Optimization assisted data sanitization process
295. Tree diversity in the Brazilian Atlantic Forest: biases and general patterns using different sources of information
296. Software License Audit and Security Implications
297. Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme
298. Privacy Preserving and Resilient RPKI
299. New Methodology and Framework Information Science-Assisted Analysis of FMO Results for Drug Design
300. Two-Level Private Information Retrieval
301. Corporate digital responsibility
302. Location Privacy in the Era of 5G
303. Secure Data Collaborative Computing Scheme Based on Blockchain
304. BE-RAN: Blockchain-enabled Open RAN with Decentralized Identity Management and Privacy-Preserving Communication
305. Deployment of Building Information Modelling (BIM) for Energy Efficiency in the UK
306. Take Back Control: User Privacy and Transparency Concerns in Personalized Conversational Agents
307. RL-PDNN: Reinforcement Learning for Privacy-Aware Distributed Neural Networks in IoT Systems
308. An optimal (?, d)-differentially private learning of distributed deep fuzzy models
309. Top-k Queries for Two-Tiered Sensor Networks
310. Security and Privacy of the Internet of Things
311. Construction of a Medical Resource Sharing Mechanism Based on Blockchain Technology: Evidence from the Medical Resource Imbalance of China. Healthcare …
312. The meaning of Freedom after Covid-19
313. Anulación del privacy shield en las transferencias internacionales de datos:¿ presenciamos un desplazamiento fáctico de la responsabilidad?
314. Efficient dummy generation for considering obstacles and protecting user location
315. Securing Media Information Using Hybrid Transposition Using Fisher Yates Algorithm and RSA Public Key Algorithm Using Pell’s Cubic Equation
316. Ethics and informatics in the age of COVID-19: Challenges and recommendations for public health organization and public policy
317. SoK: Security and Privacy in the Age of Commercial Drones
318. COVID-19 vaccination hesitancy in the United States: a rapid national assessment
319. Understanding information and communication technology use in workplace romance escalation and de-escalation
320. Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce
321. Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing
322. Organizational aspects of care associated with mortality in critically ill COVID-19 patients
323. A trustworthiness-based vehicular recruitment scheme for information collections in distributed networked systems
324. Information retrieval
325. ReLink: Open Information Extraction by Linking Phrases and Its Applications
326. Comment on the editorial relating to: Transversus abdominis plane block compared with wound infiltration for postoperative analgesia following Cesarean delivery: a …
327. Publishing volumes in major databases related to Covid-19
328. Migration of existing software systems to mobile computing platforms: a systematic mapping study
329. An LSH-based Offloading Method for IoMT Services in Integrated Cloud-Edge Environment
330. Difference of coagulation features between severe pneumonia induced by SARS-CoV2 and non-SARS-CoV2
331. Shot Boundary Detection Using Artificial Neural Network
332. Predatory publishing and journals: how to address a profitable and ubiquitous business
334. Bioethicists should be helping scientists think about race
335. An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey
336. Blinding, pragmatism, and the PRECIS-2 tool for designing and assessing randomized trials
337. Artificial Intelligence Based Electronic Healthcare Solution
338. Mindful parenting: perspectives on the heart of the matter
339. Shoulder kinematics plus contextual target information enable control of multiple distal joints of a simulated prosthetic arm and hand
340. Pre-verification of Data in Electronic Trade Blockchain Platform
341. Management privacy dalam penggunaan fitur “close friend” di Instagram
342. Impact of late administration of corticosteroids in COVID-19 ARDS
343. The experience of contact tracing in Singapore in the control of COVID-19: highlighting the use of digital technology
344. SimBle: Generating privacy preserving real-world BLE traces with ground truth
345. The discovery and early study of acidification of lakes in Sweden
346. An exploratory empirical analysis of willingness to hire and pay for flying taxis and shared flying car services
347. Learning Differentially Private Mechanisms
348. Information Technologies Significance in Higher Education in Context of Its Digitalization
349. Retrieval Mechanisms of Data Linked to Virtual Servers Using Metaheuristic Technique
350. The impact of information disclosure on consumer purchase behavior on sharing economy platform Airbnb
351. Data Protection Around the World: Belgium
352. Should everolimus be stopped after radiological progression in metastatic insulinoma? A “pro” point of view
353. Application of a convolutional neural network for detection of ignition sources and smoke
354. Automated malware identifier and analyzer
355. SARS-CoV-2 and male infertility: possible multifaceted pathology
356. Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption
357. SSDBA: the stretch shrink distance based algorithm for link prediction in social networks
358. Tusen: A thousand lakes in the Norwegian landscape
359. COVID-19 and ARDS: the baby lung size matters
360. Ethertwin: Blockchain-based secure digital twin information management
361. Survey on Graphical Password Authentication System
362. LoBAC: A Secure Location-Based Access Control Model for E-Healthcare System
363. Capturing Marketing Information to Fuel Growth
364. Light-Weight Key Establishment Mechanism for Secure Communication Between IoT Devices and Cloud
365. A distributed robust optimization approach for the economic dispatch of flexible resources
366. The Impact of WhatsApp on Employees in Higher Education
367. Information; Convergence of Science and Philosophy
368. Secure Transactions Management Using Blockchain as a Service Software for the Internet of Things
369. Incorum: A Citizen-Centric Sensor Data Marketplace for Urban Participation
370. Epilogue: Does Artificial Intelligence Make God Redundant?
371. The Art of the Newly Possible: Transforming Health with Emerging Technology and Federated Learning
372. Predatory publishing in India: has the system failed us?
373. Associations between COVID-19 related media consumption and symptoms of anxiety, depression and COVID-19 related fear in the general population in …
374. Heterogeneous deniable authenticated encryption for location-based services
375. Acoustic radiation force impulse imaging: normal values of spleen stiffness in healthy children
376. Diagnosis and Treatment of Photosensitive Patients in Daily Practice: A Nationwide Inventory
377. The silent spring of Sargassum
378. Corroborating evidence refutes batch effect as explanation for fetal bacteria
379. Technology and Think Tanks: Survived the First Wave; Might not Survive the Second


Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top