Data protection in AI services: A survey

C Meurisch, M Mühlhäuser - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Advances in artificial intelligence (AI) have shaped today's user services, enabling
enhanced personalization and better support. As such AI-based services inevitably require …

Digital technologies and adherence in respiratory diseases: the road ahead

JD Blakey, BG Bender, AL Dima… - European …, 2018 - publications.ersnet.org
Outcomes for patients with chronic respiratory diseases remain poor despite the
development of novel therapies. In part, this reflects the fact that adherence to therapy is low …

IoT-KEEPER: Detecting malicious IoT network activity using online traffic analysis at the edge

I Hafeez, M Antikainen, AY Ding… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
IoT devices are notoriously vulnerable even to trivial attacks and can be easily
compromised. In addition, resource constraints and heterogeneity of IoT devices make it …

Personal data stores (PDS): a review

KU Fallatah, M Barhamgi, C Perera - Sensors, 2023 - mdpi.com
Internet services have collected our personal data since their inception. In the beginning, the
personal data collection was uncoordinated and was limited to a few selected data types …

[HTML][HTML] Avoiding the internet of insecure industrial things

L Urquhart, D McAuley - Computer law & security review, 2018 - Elsevier
Security incidents such as targeted distributed denial of service (DDoS) attacks on power
grids and hacking of factory industrial control systems (ICS) are on the increase. This paper …

Building accountability into the Internet of Things: the IoT Databox model

A Crabtree, T Lodge, J Colley, C Greenhalgh… - Journal of Reliable …, 2018 - Springer
This paper outlines the IoT Databox model as a means of making the Internet of Things (IoT)
accountable to individuals. Accountability is a key to building consumer trust and is …

What the fog? edge computing revisited: Promises, applications and future challenges

J Gedeon, F Brandherm, R Egert, T Grube… - IEEE …, 2019 - ieeexplore.ieee.org
Edge computing brings computing and storage resources closer to (mobile) end users and
data sources, thus bypassing expensive and slow links to distant cloud computing …

Flock: A Framework for Deploying {On-Demand} Distributed Trust

D Kaviani, S Tan, PG Kannan, RA Popa - 18th USENIX Symposium on …, 2024 - usenix.org
Recent years have exhibited an increase in applications that distribute trust across n servers
to protect user data from a central point of attack. However, these deployments remain …

A survey on solutions to support developers in privacy-preserving IoT development

P Kühtreiber, V Pak, D Reinhardt - Pervasive and Mobile Computing, 2022 - Elsevier
Abstract Internet-of-Things (IoT) devices are rising in popularity and their usefulness often
stems from the amount of data they collect. Data regulations such as the European General …

Rationalizing dark patterns: Examining the process of designing privacy UX through speculative enactments

LGM Nelissen, M Funk - International journal of design, 2022 - research.tue.nl
Connected products and applications increasingly leverage users' personal data in their
core functions. Designing privacy-sensitive interfaces for such data-related applications is a …