A survey on differential privacy for unstructured data content
Huge amounts of unstructured data including image, video, audio, and text are ubiquitously
generated and shared, and it is a challenge to protect sensitive personal information in …
generated and shared, and it is a challenge to protect sensitive personal information in …
Modern privacy-preserving record linkage techniques: An overview
Record linkage is the challenging task of deciding which records, coming from disparate
data sources, refer to the same entity. Established back in 1946 by Halbert L. Dunn, the area …
data sources, refer to the same entity. Established back in 1946 by Halbert L. Dunn, the area …
Safe: Synergic data filtering for federated learning in cloud-edge computing
With the increasing data scale in the Industrial Internet of Things, edge computing
coordinated with machine learning is regarded as an effective way to raise the novel latency …
coordinated with machine learning is regarded as an effective way to raise the novel latency …
Blockchain based data and energy trading in internet of electric vehicles
The drastic increase in real-time vehicle generated data of various types has imparted a
great concept of data trading in vehicular networks. Whereas immense usage of Electric …
great concept of data trading in vehicular networks. Whereas immense usage of Electric …
Privacy-preserving deep learning based record linkage
Deep learning-based linkage of records across different databases is becoming increasingly
useful in data integration and mining applications to discover new insights from multiple data …
useful in data integration and mining applications to discover new insights from multiple data …
SNN-PPRL: A secure record matching scheme based on siamese neural network
With the rapid development of IoT, data from various devices is increasing exponentially. To
better apply and analyze IoT data, it is necessary to integrate them from different parties …
better apply and analyze IoT data, it is necessary to integrate them from different parties …
Fairness and cost constrained privacy-aware record linkage
Record linkage algorithms match and link records from different databases that refer to the
same real-world entity based on direct and/or quasi-identifiers, such as name, address, age …
same real-world entity based on direct and/or quasi-identifiers, such as name, address, age …
Inaudiblekey: Generic inaudible acoustic signal based key agreement protocol for mobile devices
Secure Device-to-Device (D2D) communication is becoming increasingly important with the
ever-growing number of Internet-of-Things (IoT) devices in our daily life. To achieve secure …
ever-growing number of Internet-of-Things (IoT) devices in our daily life. To achieve secure …
Self-supervised Locality-Sensitive Deep Hashing for the Robust Retrieval of Degraded Images
L **ang, H Hu, Q Li, H Yu… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
Recently, numerous degraded images have flooded search engines and social networks,
finding extensive and practical applications in the real world. However, these images have …
finding extensive and practical applications in the real world. However, these images have …
CCF-LRU: hybrid storage cache replacement strategy based on counting cuckoo filter hot-probe method
In recent years, the massive increase in the data generation has given rise to enormous
challenges in storage systems. Single storage media, such as hard disk drives (HDDs) or …
challenges in storage systems. Single storage media, such as hard disk drives (HDDs) or …