Security and privacy in metaverse: A comprehensive survey
Metaverse describes a new shape of cyberspace and has become a hot-trending word since
2021. There are many explanations about what Meterverse is and attempts to provide a …
2021. There are many explanations about what Meterverse is and attempts to provide a …
Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
Artificial intelligence, systemic risks, and sustainability
Automated decision making and predictive analytics through artificial intelligence, in
combination with rapid progress in technologies such as sensor technology and robotics are …
combination with rapid progress in technologies such as sensor technology and robotics are …
SoK: Fully homomorphic encryption compilers
Fully Homomorphic Encryption (FHE) allows a third party to perform arbitrary computations
on encrypted data, learning neither the inputs nor the computation results. Hence, it provides …
on encrypted data, learning neither the inputs nor the computation results. Hence, it provides …
[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
Design of personnel big data management system based on blockchain
J Chen, Z Lv, H Song - Future generation computer systems, 2019 - Elsevier
With the continuous development of information technology, enterprises, universities and
governments are constantly step** up the construction of electronic personnel information …
governments are constantly step** up the construction of electronic personnel information …
[PDF][PDF] Blockchain-enabled wireless communications: a new paradigm towards 6G
With the deployment of fifth-generation (5G) wireless networks worldwide, research on sixth-
generation (6G) wireless communications has commenced. It is expected that 6G networks …
generation (6G) wireless communications has commenced. It is expected that 6G networks …
Privacy in deep learning: A survey
The ever-growing advances of deep learning in many areas including vision,
recommendation systems, natural language processing, etc., have led to the adoption of …
recommendation systems, natural language processing, etc., have led to the adoption of …
Human factor, a critical weak point in the information security of an organization's Internet of things
K Hughes-Lartey, M Li, FE Botchey, Z Qin - Heliyon, 2021 - cell.com
Abstract Internet of Things (IoT) presents opportunities for designing new technologies for
organizations. Many organizations are beginning to accept these technologies for their daily …
organizations. Many organizations are beginning to accept these technologies for their daily …
Data pollution
O Ben-Shahar - Journal of Legal Analysis, 2019 - academic.oup.com
Digital information is the fuel of the new economy. But like the old economy's carbon fuel, it
also pollutes. Harmful “data emissions” are leaked into the digital ecosystem, disrupting …
also pollutes. Harmful “data emissions” are leaked into the digital ecosystem, disrupting …