Blockchain applications for secured and resilient supply chains: A systematic literature review and future research agenda

RK Singh, R Mishra, S Gupta, AA Mukherjee - Computers & Industrial …, 2023 - Elsevier
Firms are using blockchain technology to prevent fraudulent activities through consensus
mechanisms and help identify data tampering through its underlying characteristics, such as …

[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Semi-supervised few-shot learning approach for plant diseases recognition

Y Li, X Chao - Plant Methods, 2021 - Springer
Background Learning from a few samples to automatically recognize the plant leaf diseases
is an attractive and promising study to protect the agricultural yield and quality. The existing …

Technology assessment: Enabling Blockchain in hospitality and tourism sectors

M Sharma, R Sehrawat, T Daim, A Shaygan - … Forecasting and Social …, 2021 - Elsevier
The tourism and hospitality sector's inequitable environment demands an unassailable and
disruptive technology that optimizes its operational efficiencies. Thus, this paper aims to …

Leveraging blockchain to improve nutraceutical supply chain resilience under post-pandemic disruptions

S Datta, SK Jauhar, SK Paul - Computers & Industrial Engineering, 2023 - Elsevier
Due to the pandemic, there has been an increase in the use of dietary supplements to boost
the body's immune system. A demand–supply mismatch exists as a result of the unexpected …

[HTML][HTML] Entropy-based redundancy analysis and information screening

Y Li, J Yang, J Wen - Digital Communications and Networks, 2023 - Elsevier
The ongoing data explosion introduced unprecedented challenges to the information
security of communication networks. As images are one of the most commonly used …

Privacy in targeted advertising on mobile devices: a survey

I Ullah, R Boreli, SS Kanhere - International Journal of Information …, 2023 - Springer
Targeted advertising has transformed the marketing landscape for a wide variety of
businesses, by creating new opportunities for advertisers to reach prospective customers by …

Differential game model of information sharing among supply chain finance based on blockchain technology

M Xu, S Ma, G Wang - Sustainability, 2022 - mdpi.com
In the development of traditional supply-chain finance, the information asymmetry of all
parties in the supply chain has become the primary problem hindering its development …

A time-saving path planning scheme for autonomous underwater vehicles with complex underwater conditions

J Yang, J Huo, M **, J He, Z Li… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Autonomous underwater vehicle (AUV) shows great potential in the Internet of Underwater
Things (IoUT) system, in which the path planning algorithm plays a fundamental role …

Few-shot imbalanced classification based on data augmentation

X Chao, L Zhang - Multimedia Systems, 2023 - Springer
Few-shot imbalanced classification tasks are commonly faced in the real-world applications
due to the unbalanced data distribution and few samples of rare classes. As known, the …