Security, privacy, and robustness for trustworthy AI systems: A review

MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …

Secure pharmaceutical supply chain using blockchain in IoT cloud systems

N Mangala, DR Naveen, BE Reddy, R Buyya… - Internet of Things, 2024 - Elsevier
Abstract Supply Chain Management (SCM) systems require time sequencing, coordination
and tracking the movement of goods and processes. Internet of Things (IoT) and Blockchain …

“Will artificial intelligence platforms replace designers in the future?” analyzing the impact of artificial intelligence platforms on the engineering design industry through …

Y Li - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
This research investigates the impact of artificial intelligence platforms on the engineering
design industry by analyzing the perceptions of color and views on artificial intelligence …

The implementation of polynomial multiplication for lattice-based cryptography: A survey

C Zeng, D He, Q Feng, C Peng, M Luo - Journal of Information Security and …, 2024 - Elsevier
The advent of quantum computing threatens the security of traditional public-key
cryptography. Algorithms for quantum computing have the ability to solve the large prime …

Secure workflow scheduling algorithm utilizing hybrid optimization in mobile edge computing environments

DK Sajnani, X Li, AR Mahesar - Computer Communications, 2024 - Elsevier
The rapid advancement of mobile communication technology and devices has greatly
improved our way of life. It also presents a new possibility that data sources can be used to …

[HTML][HTML] Modeling and simulation of a double DQN algorithm for dynamic obstacle avoidance in autonomous vehicle navigation

K Sivayazi, G Mannayee - e-Prime-Advances in Electrical Engineering …, 2024 - Elsevier
Develo** an autonomous vehicle in safe navigated open environments through self-
learning is a formidable challenge. So, in this paper, an autonomous navigation …

Efficient multi-party Psi and its application in Port Management

M Qiao, L Wei, D Han, H Wu - Computer Standards & Interfaces, 2025 - Elsevier
Abstract Private Set Intersection (PSI) technology is a cryptographic tool that allows the
parties holding private data to determine the intersection of sets in a joint computation …

Privacy-preserving top-k spatio-temporal keyword preference query

X Zhao, J Yu - Computer Standards & Interfaces, 2025 - Elsevier
With the rapid advancement of location-based services and mobile devices, spatial keyword
query attracts increasing attention. In this paper, we focus on a new query type known as top …

Asynchronous verifiable information dispersal protocol of achieving optimal communication

Z Pang, L Shi, H **ang - Computer Networks, 2024 - Elsevier
The evolution of distributed systems necessitates robust protocols to facilitate secure and
efficient data storage and retrieval amid challenges like asynchronous communication and …

LPHD: A low power and high diffusion lightweight block cipher

R Xu, L Li, X Huang - International Journal of Circuit Theory …, 2024 - Wiley Online Library
Smart door locks pose a large number of threats such as network attacks. Its storage area
and power of cipher are severely limited because the wireless nodes of smart door locks are …