CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review
This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities,
mitigation approaches on the power electronics and the security challenges for the smart …
mitigation approaches on the power electronics and the security challenges for the smart …
Virtual-reality interpromotion technology for metaverse: A survey
The metaverse aims to build an immersive virtual reality world to support the daily life, work,
and recreation of people. In this survey, the status quo of the metaverse is investigated, and …
and recreation of people. In this survey, the status quo of the metaverse is investigated, and …
Design of privacy preserving model based on clustering involved anonymization along with feature selection
Healthcare services has become a hug transformation due to the number of disease
emerging at presently. Accordingly, enormous amount of data is generated regarding on the …
emerging at presently. Accordingly, enormous amount of data is generated regarding on the …
An intelligent quantum cyber-security framework for healthcare data management
Digital healthcare is essential to facilitate consumers to access and disseminate their
medical data easily for enhanced medical care services. However, the significant concern …
medical data easily for enhanced medical care services. However, the significant concern …
RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection
Mobile devices furnish users with various services while on the move, but also raise public
concerns about trajectory privacy. Unfortunately, traditional privacy protection methods, such …
concerns about trajectory privacy. Unfortunately, traditional privacy protection methods, such …
[HTML][HTML] Friendship links-based privacy-preserving algorithm against inference attacks
J Shen, J Tian, Z Wang, H Cai - Journal of King Saud University-Computer …, 2022 - Elsevier
Directly publishing the original data of social networks may compromise personal privacy
because social relationship data contain sensitive information about users. To protect the …
because social relationship data contain sensitive information about users. To protect the …
JEDI: Joint and Effective Privacy Preserving Outsourced Set Intersection and Data Integration Protocols
YC Chen, KC Huang - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
In the era of big data with an ever-increasing amount of data, the demand for data
processing is increasing, and various computing service agreements have also been …
processing is increasing, and various computing service agreements have also been …
Privacy-preserving algorithm based on vulnerable nodes for social relationships
J Shen, J Tian, Z Wang - The Journal of Supercomputing, 2024 - Springer
In the contemporary era, online social networks have become the prevalent medium for
interpersonal interactions, encompassing a multitude of virtual social relationships. To …
interpersonal interactions, encompassing a multitude of virtual social relationships. To …
PRIMϵ: Novel Privacy-Preservation Model With Pattern Mining and Genetic Algorithm
This paper proposes a novel agglomerated privacy-preservation model integrated with data
mining and evolutionary Genetic Algorithm (GA). Privacy-pReservIng with Minimum Epsilon …
mining and evolutionary Genetic Algorithm (GA). Privacy-pReservIng with Minimum Epsilon …
PD-PAn: Prefix- and Distribution-Preserving Internet of Things Traffic Anonymization
X Gu, K Dong - Electronics, 2023 - mdpi.com
One of the features of network traffic in Internet of Things (IoT) environments is that various
IoT devices periodically communicate with their vendor services by sending and receiving …
IoT devices periodically communicate with their vendor services by sending and receiving …