The general data protection regulation in the age of surveillance capitalism
Clicks, comments, transactions, and physical movements are being increasingly recorded
and analyzed by Big Data processors who use this information to trace the sentiment and …
and analyzed by Big Data processors who use this information to trace the sentiment and …
EdgeCare: Leveraging edge computing for collaborative data management in mobile healthcare systems
With the wide application of mobile healthcare systems, the total amount of healthcare data
is ever increasing rapidly as users interact with healthcare service providers frequently. This …
is ever increasing rapidly as users interact with healthcare service providers frequently. This …
Community-structured evolutionary game for privacy protection in social networks
Social networks have attracted billions of users and supported a wide range of interests and
practices. Users of social networks can be connected with each other by different …
practices. Users of social networks can be connected with each other by different …
Trust-based collaborative privacy management in online social networks
Online social networks have now become the most popular platforms for people to share
information with others. Along with this, there is a serious threat to individuals' privacy. One …
information with others. Along with this, there is a serious threat to individuals' privacy. One …
Adaptive k-Anonymity Approach for Privacy Preserving in Cloud
K Arava, S Lingamgunta - Arabian Journal for Science and Engineering, 2020 - Springer
Data privacy is very essential attribute for information sharing in cloud applications. Many
end users find it challenging to adopt advanced technologies of cloud services, such as …
end users find it challenging to adopt advanced technologies of cloud services, such as …
Integration of data mining and business intelligence in big data analytics: A research agenda on scholarly publications
A Kulakli - … Challenges for Analytics, Business Intelligence, and …, 2021 - igi-global.com
The purpose of this chapter is to analyze and explore the research studies for scholarly
publication trends and patterns related to the integration of data mining in particular …
publication trends and patterns related to the integration of data mining in particular …
Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards
Recently, the conflict between exploiting the value of personal data and protecting
individuals' privacy has attracted much attention. Personal data market provides a promising …
individuals' privacy has attracted much attention. Personal data market provides a promising …
A multifactor ring signature based authentication scheme for quality assessment of iomt environment in covid-19 scenario
K Chatterjee, A Singh, Neha, K Yu - ACM Journal of Data and …, 2023 - dl.acm.org
The quality of the healthcare environment has become an essential factor for healthcare
users to access quality services. Smart healthcare systems use the Internet of Medical …
users to access quality services. Smart healthcare systems use the Internet of Medical …
Human-in-the-loop mobile networks: A survey of recent advancements
Recent developments of smart devices and mobile applications have significantly increased
the level at which human users interact with mobile systems. As a result, human activities …
the level at which human users interact with mobile systems. As a result, human activities …
Check in or not? A stochastic game for privacy preserving in point-of-interest recommendation system
With the growing popularity of mobile social networks, point-of-interest (POI)
recommendation, which utilizes users' check-in data to suggest interesting places for users …
recommendation, which utilizes users' check-in data to suggest interesting places for users …