Security challenges and solutions using healthcare cloud computing

M Mehrtak, SA SeyedAlinaghi… - Journal of medicine …, 2021‏ - pmc.ncbi.nlm.nih.gov
Cloud computing is among the most beneficial solutions to digital problems. Security is one
of the focal issues in cloud computing technology, and this study aims at investigating …

Gait recognition based on deep learning: a survey

C Filipi Gonçalves dos Santos, DDS Oliveira… - ACM Computing …, 2022‏ - dl.acm.org
In general, biometry-based control systems may not rely on individual expected behavior or
cooperation to operate appropriately. Instead, such systems should be aware of malicious …

Analysis of artificial intelligence-based technologies and approaches on sustainable entrepreneurship

BB Gupta, A Gaurav, PK Panigrahi, V Arya - Technological Forecasting and …, 2023‏ - Elsevier
Research in the field of entrepreneurship has grown dramatically in the last decade and
currently covers a wide variety of topics and concerns. Development in the field of artificial …

A detection algorithm for cherry fruits based on the improved YOLO-v4 model

R Gai, N Chen, H Yuan - Neural computing and applications, 2023‏ - Springer
Abstract" Digital" agriculture is rapidly affecting the value of agricultural output. Robotic
picking of the ripe agricultural product enables accurate and rapid picking, making …

Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model

GN Nguyen, NH Le Viet, M Elhoseny, K Shankar… - Journal of parallel and …, 2021‏ - Elsevier
Cyber–physical system (CPS) is the incorporation of physical processes with processing
and data transmission. Cybersecurity is a primary and challenging issue in healthcare due …

Face recognition systems under morphing attacks: A survey

U Scherhag, C Rathgeb, J Merkle, R Breithaupt… - IEEE …, 2019‏ - ieeexplore.ieee.org
Recently, researchers found that the intended generalizability of (deep) face recognition
systems increases their vulnerability against attacks. In particular, the attacks based on …

Exploiting semi-tensor product compressed sensing and hybrid cloud for secure medical image transmission

X Chai, J Fu, Z Gan, Y Lu, Y Zhang… - IEEE Internet of Things …, 2022‏ - ieeexplore.ieee.org
With the development of telemedicine diagnosis technology, the collection, storage, and
transmission of medical data has become a pivotal problem. To solve these problems, in …

A novel chaotic image encryption technique based on multiple discrete dynamical maps

M Khan, F Masood - Multimedia Tools and Applications, 2019‏ - Springer
The propagation of information over insecure communication system is one of the most
important aspect of digitally advance era. The electronic information is travels in form of …

Convergence of blockchain and IoT for secure transportation systems in smart cities

K Abbas, LAA Tawalbeh, A Rafiq… - Security and …, 2021‏ - Wiley Online Library
Smart cities provide citizens with smart and advanced services to improve their quality of life.
However, it has been observed that the collection, storage, processing, and analysis of …

[HTML][HTML] Deep face recognition using imperfect facial data

A Elmahmudi, H Ugail - Future Generation Computer Systems, 2019‏ - Elsevier
Today, computer based face recognition is a mature and reliable mechanism which is being
practically utilised for many access control scenarios. As such, face recognition or …