[1] MUNCEY S. AI and data privacy in big-tech: A new frontier in the digital market[J]. Journal of Data Protection & Privacy, 2024,6(3):256-265.
[2] D'ACQUISTO G. Synthetic data and data protection laws[J]. Journal of Data Protection & Privacy, 2024,6(3):227-239.
[3] WANG B Q, YANG F L. Lightweight and privacy-preserving hierarchical federated learning mechanism for artificial intelligence-generated image content[J]. Journal of Real-Time Image Processing, 2024,21(4):149-149.
[4] LI F Y ,GE J , WANG X J , et al. Privacy-preserving vertical federated broad learning system for artificial intelligence generated image content[J].Journal of Real-Time Image Processing, 2024,21(14):1-11.
[5] BARCENA J L C,DUCANGE P,MARCELLONI F, et al.Increasing trust in AI through privacy preservation and model explainability: Federated learning of fuzzy regression trees[J]. Information Fusion,2025,113. DOI: 10.1016/j.inffus.2024.102598.
[6] XU Z, CAO S X.Multi-source data privacy protection method based on homomorphic encryption and blockchain[J]. Computer Modeling in Engineering & Sciences,2023,136(1):861-881.
[7] HE Y J, OUYANG W H, LI S L, et al. Cloud computing data privacy protection method based on blockchain[J]. International Journal of Grid and Utility Computing,2023,14(5):480-492.
[8] HAN X Y, MU C X, ZHU J B, et al. A safe virtual machine scheduling strategy for energy conservation and privacy protection of server clusters in cloud data centers[J].IEEE Transactions on Sustainable Computing,2024,9(1):46-60.
[9] YUAN L Q, ERDT M, LI R, et al. Data privacy protection domain adaptation by roughing and finishing stage[J]. The Visual Computer, 2024,40(2):471-488.
[10] GAAGOUCH A.The protection of personal data according to the civil and criminal Moroccan laws in light of jurisprudence[J]. Journal of Data Protection & Privacy, 2024,6(3):240-255.
[11] VIRADIYA P J,MAVANI C C, PATEL R N. Balancing progress and privacy: Exploring the societal implications of artificial intelligence in the digital era[J]. Journal of Advancements in Robotics, 2024,11(1):15-19.
[12] LAKSHMANAN M, ANANDHA MALA G. S. Merkle tree-blockchain-assisted privacy preservation of electronic medical records on offering medical data protection through hybrid heuristic algorithm[J].Knowledge and Information Systems, 2023,66(1):481-509.
[13] CHEMLALI L, SALMI A, BENSEDDIK L. A reflection on the UAE’s new data protection law: A comparative approach with GDPR[J].Journal of Data Protection & Privacy, 2023,6(1):24-36.
[14] ANTONIEWSKA J. Key considerations for companies in the rapid adoption of IoT technologies and its impact on privacy and the data protection of consumers[J]. Journal of Data Protection & Privacy, 2023,5(4):337-346.
[15] DANG Q, QIU Y, SUN B Y, et al. Blockchain data privacy protection modeling based on CP-ABE algorithm[J].International Journal of Emerging Electric Power Systems,2023,24(5):681-691.
[16] CHACKO M, MISHRA S. Benchmarking the Indian Digital Personal Data Protection Act 2023 against data protection frameworks in Singapore, the EU, US and Australia[J].Journal of Data Protection & Privacy, 2023,6(2):110-119.
[17] TIWARI D, MONDAL B, SINGH S K, et al. Lightweight encryption for privacy protection of data transmission in cyber physical systems[J]. Cluster Computing,2023,26(4):2351-2365.
[18] CALIFANO B.Privacy and data protection in Latin America: Regulatory initiatives and collisions with the right to freedom of expression on the internet[J]. Journal of Digital Media & Policy,2023,14(2):207-224.
[19] DA L M, LIANG H, DING Y, et al. Blockchain-based data acquisition with privacy protection in UAV cluster network[J]. Computer Modeling in Engineering and Sciences,2023,137(1):879-902.
[20] CHEN G P, WANG H. Research on the privacy protection model of government cyber security in smart cities based on big data[J].International Journal of Web Engineering and Technology, 2023,18(3):202-220.
[21] WU X, ZHANG Y T, WANG A, et al. MNSSp3: Medical big data privacy protection platform based on Internet of things[J].Neural Computing and Applications,2022,34(14):11491-11505.
[22] HUANG C X, CHEN S R, ZHANG Y Q, et al. A robust approach for privacy data protection: IoT security assurance using generative adversarial imitation learning[J]. IEEE Internet of Things Journal, 2022,9(18):17089-17097.
[23] JIA B, ZHANG X S, LIU J W, et al. Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT[J]. IEEE Transactions on Industrial Informatics,2022,18(6):4049-4058.