An automated deep learning based anomaly detection in pedestrian walkways for vulnerable road users safety
Anomaly detection in pedestrian walkways is an important research topic, commonly used to
improve the safety of pedestrians. Due to the wide utilization of video surveillance systems …
improve the safety of pedestrians. Due to the wide utilization of video surveillance systems …
Privacy-preservation techniques for IoT devices: a systematic map** study
D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
Mathematical approaches transform cybersecurity from protoscience to science
The area of cybersecurity problems has reached the stage of becoming a science. This
raises questions about the connection between the mathematical theories used in …
raises questions about the connection between the mathematical theories used in …
Deep anomaly detection: A linear one-class SVM approach for high-dimensional and large-scale data
Anomaly detection plays a crucial role in various fields including cyber security, finance,
healthcare, and industrial monitoring. Traditional methods in anomaly detection often face …
healthcare, and industrial monitoring. Traditional methods in anomaly detection often face …
Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey
With the rapid development of artificial intelligence and a new generation of network
technologies, the Internet of Things (IoT) is expanding worldwide. Malicious agents …
technologies, the Internet of Things (IoT) is expanding worldwide. Malicious agents …
Evaluating the privacy and utility of time-series data perturbation algorithms
AS Roman - Mathematics, 2023 - mdpi.com
Data collected from sensor-rich systems may reveal user-related patterns that represent
private information. Sensitive patterns from time-series data can be protected using diverse …
private information. Sensitive patterns from time-series data can be protected using diverse …
A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions
J Hao, W Wu, S Wang, X Zhong, G Chu, F Shao - Mathematics, 2022 - mdpi.com
Attribute-based signature (ABS) assures the verifier that the message is endorsed by a
signer whose attributes satisfy the claimed attribute policy (predicate); thus, it can provide …
signer whose attributes satisfy the claimed attribute policy (predicate); thus, it can provide …
[PDF][PDF] An extensive analysis of security based solutions using image encryption techniques
T Ganesh - International Journal of Information Technology (IJIT), 2021 - ijitjournal.org
The security of data or images is most important feature from enormous and till increasing
field of digital transfer. Encryption of images is most distinguished model for preserving …
field of digital transfer. Encryption of images is most distinguished model for preserving …
[PDF][PDF] Performance analysis of state of art clustering approaches in data mining
GA Toma - Int J Inf Technol (IJIT), 2021 - ijitjournal.org
Clustering is the separation of data as to sets of same objects. In clustering, a few particulars
are unnoticed from interchange to data simplification. Clustering is regarded as data …
are unnoticed from interchange to data simplification. Clustering is regarded as data …
[PDF][PDF] A study on state of art approaches of brain tumor diagnosis and classification
S Gupta - International Journal of Information Technology (IJIT), 2021 - academia.edu
Brain cancer segmentation and recognition is the common stimulating and time taking
process in medicinal imaging process. The MRI is a medicinal method, mostly utilized as …
process in medicinal imaging process. The MRI is a medicinal method, mostly utilized as …