Anonymization techniques for privacy preserving data publishing: A comprehensive survey
A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …
owners such as hospitals, banks, social network (SN) service providers, and insurance …
Distinctive measurement scheme for security and privacy in internet of things applications using machine learning algorithms
More significant data are available thanks to the present Internet of Things (IoT) application
trend, which can be accessed in the future using some platforms for data storage. An …
trend, which can be accessed in the future using some platforms for data storage. An …
Advanced security and privacy technique for digital text in smart grid communications
In the current era of technology, digital contents copyright protection is a significant issue in
the Internet of Things and smart grid. Digital contents are distributed, reproduced, and …
the Internet of Things and smart grid. Digital contents are distributed, reproduced, and …
Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text
Text information is a natural language dependent, which enhances reliability and security of
text data exchanged through Internet networks and is becoming main concern for …
text data exchanged through Internet networks and is becoming main concern for …
A fine-grained system driven of attacks over several new representation techniques using machine learning
MA Al Ghamdi - IEEE Access, 2023 - ieeexplore.ieee.org
Machine Learning (ML) techniques, especially deep learning, are crucial to many
contemporary real world systems that use Computational Intelligence (CI) as their core …
contemporary real world systems that use Computational Intelligence (CI) as their core …
Exponential fractional cat swarm optimization for video steganography
M Suresh, IS Sam - Multimedia Tools and Applications, 2021 - Springer
In this paper, an effective method named Exponential Fractional-Cat Swarm Optimization
(Exponential Fractional-CSO) along with multi-objective cost function is proposed. The …
(Exponential Fractional-CSO) along with multi-objective cost function is proposed. The …
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing
SH Almotiri - PloS one, 2024 - journals.plos.org
The introduction of quantum computing has transformed the setting of information
technology, bringing both unprecedented opportunities and significant challenges. As …
technology, bringing both unprecedented opportunities and significant challenges. As …
On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks
Large Language Models (LLMs) excel in various applications, including text generation and
complex tasks. However, the misuse of LLMs raises concerns about the authenticity and …
complex tasks. However, the misuse of LLMs raises concerns about the authenticity and …
[PDF][PDF] Fortifying textual integrity: Evolutionary optimization-powered watermarking for tampering attack detection in digital documents
R Shkilev, A Kormiltseva, M Achaeva, A Tarasova… - Fusion: Practice and …, 2024 - kpfu.ru
Digital document helps as the lifeblood of present communication, yet their vulnerability to
tampering poses major safety anxieties. Digital text watermarking is an effective mechanism …
tampering poses major safety anxieties. Digital text watermarking is an effective mechanism …
[PDF][PDF] MEKDA: multilevel ECC Based Key Distribution And Authentication In Internet of Things
MG Padmashree, JP Mallikarjun, JS Arunalatha… - 2021 - academia.edu
ABSTRACT The Internet of Things (IoT) is an extensive system of networks and connected
devices with minimal human interaction and swift growth. The constraints of the System and …
devices with minimal human interaction and swift growth. The constraints of the System and …