Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

Distinctive measurement scheme for security and privacy in internet of things applications using machine learning algorithms

W Alhalabi, A Al-Rasheed, H Manoharan… - Electronics, 2023 - mdpi.com
More significant data are available thanks to the present Internet of Things (IoT) application
trend, which can be accessed in the future using some platforms for data storage. An …

Advanced security and privacy technique for digital text in smart grid communications

U Khadam, MM Iqbal, S Saeed, SH Dar… - Computers & Electrical …, 2021 - Elsevier
In the current era of technology, digital contents copyright protection is a significant issue in
the Internet of Things and smart grid. Digital contents are distributed, reproduced, and …

Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text

FN Al-Wesabi, F Alrowais, HG Mohamed… - IEEE …, 2023 - ieeexplore.ieee.org
Text information is a natural language dependent, which enhances reliability and security of
text data exchanged through Internet networks and is becoming main concern for …

A fine-grained system driven of attacks over several new representation techniques using machine learning

MA Al Ghamdi - IEEE Access, 2023 - ieeexplore.ieee.org
Machine Learning (ML) techniques, especially deep learning, are crucial to many
contemporary real world systems that use Computational Intelligence (CI) as their core …

Exponential fractional cat swarm optimization for video steganography

M Suresh, IS Sam - Multimedia Tools and Applications, 2021 - Springer
In this paper, an effective method named Exponential Fractional-Cat Swarm Optimization
(Exponential Fractional-CSO) along with multi-objective cost function is proposed. The …

Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing

SH Almotiri - PloS one, 2024 - journals.plos.org
The introduction of quantum computing has transformed the setting of information
technology, bringing both unprecedented opportunities and significant challenges. As …

On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks

Z Liu, T Cong, X He, Q Li - arxiv preprint arxiv:2407.04794, 2024 - arxiv.org
Large Language Models (LLMs) excel in various applications, including text generation and
complex tasks. However, the misuse of LLMs raises concerns about the authenticity and …

[PDF][PDF] Fortifying textual integrity: Evolutionary optimization-powered watermarking for tampering attack detection in digital documents

R Shkilev, A Kormiltseva, M Achaeva, A Tarasova… - Fusion: Practice and …, 2024 - kpfu.ru
Digital document helps as the lifeblood of present communication, yet their vulnerability to
tampering poses major safety anxieties. Digital text watermarking is an effective mechanism …

[PDF][PDF] MEKDA: multilevel ECC Based Key Distribution And Authentication In Internet of Things

MG Padmashree, JP Mallikarjun, JS Arunalatha… - 2021 - academia.edu
ABSTRACT The Internet of Things (IoT) is an extensive system of networks and connected
devices with minimal human interaction and swift growth. The constraints of the System and …