An automated deep learning based anomaly detection in pedestrian walkways for vulnerable road users safety

IV Pustokhina, DA Pustokhin, T Vaiyapuri, D Gupta… - Safety science, 2021 - Elsevier
Anomaly detection in pedestrian walkways is an important research topic, commonly used to
improve the safety of pedestrians. Due to the wide utilization of video surveillance systems …

Privacy-preservation techniques for IoT devices: a systematic map** study

D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …

Mathematical approaches transform cybersecurity from protoscience to science

I Trenchev, W Dimitrov, G Dimitrov, T Ostrovska… - Applied Sciences, 2023 - mdpi.com
The area of cybersecurity problems has reached the stage of becoming a science. This
raises questions about the connection between the mathematical theories used in …

Deep anomaly detection: A linear one-class SVM approach for high-dimensional and large-scale data

K Suresh, KJ Velmurugan, R Vidhya, V Kavitha - Applied Soft Computing, 2024 - Elsevier
Anomaly detection plays a crucial role in various fields including cyber security, finance,
healthcare, and industrial monitoring. Traditional methods in anomaly detection often face …

Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey

A Vyas, PC Lin, RH Hwang, M Tripathi - IEEE Access, 2024 - ieeexplore.ieee.org
With the rapid development of artificial intelligence and a new generation of network
technologies, the Internet of Things (IoT) is expanding worldwide. Malicious agents …

Evaluating the privacy and utility of time-series data perturbation algorithms

AS Roman - Mathematics, 2023 - mdpi.com
Data collected from sensor-rich systems may reveal user-related patterns that represent
private information. Sensitive patterns from time-series data can be protected using diverse …

A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions

J Hao, W Wu, S Wang, X Zhong, G Chu, F Shao - Mathematics, 2022 - mdpi.com
Attribute-based signature (ABS) assures the verifier that the message is endorsed by a
signer whose attributes satisfy the claimed attribute policy (predicate); thus, it can provide …

[PDF][PDF] An extensive analysis of security based solutions using image encryption techniques

T Ganesh - International Journal of Information Technology (IJIT), 2021 - ijitjournal.org
The security of data or images is most important feature from enormous and till increasing
field of digital transfer. Encryption of images is most distinguished model for preserving …

[PDF][PDF] Performance analysis of state of art clustering approaches in data mining

GA Toma - Int J Inf Technol (IJIT), 2021 - ijitjournal.org
Clustering is the separation of data as to sets of same objects. In clustering, a few particulars
are unnoticed from interchange to data simplification. Clustering is regarded as data …

[PDF][PDF] A study on state of art approaches of brain tumor diagnosis and classification

S Gupta - International Journal of Information Technology (IJIT), 2021 - academia.edu
Brain cancer segmentation and recognition is the common stimulating and time taking
process in medicinal imaging process. The MRI is a medicinal method, mostly utilized as …