At the confluence of artificial intelligence and edge computing in iot-based applications: A review and new perspectives
Given its advantages in low latency, fast response, context-aware services, mobility, and
privacy preservation, edge computing has emerged as the key support for intelligent …
privacy preservation, edge computing has emerged as the key support for intelligent …
[HTML][HTML] Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …
health, are generating big data that are widely distributed on the internet. IoT (Internet of …
Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining
The confidential data is mainly managed by creating passwords, tokens, and unique
identifiers in an authorized manner. These records must be kept in a safe location away from …
identifiers in an authorized manner. These records must be kept in a safe location away from …
A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment
The massive upsurge in computational and storage has driven the local data and machine
learning applications to the cloud environment. The owners may not fully trust the cloud …
learning applications to the cloud environment. The owners may not fully trust the cloud …
Application layer security for internet communications: A comprehensive review, challenges, and future trends
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
Data security and privacy in cloud computing: concepts and emerging trends
Millions of users across the world leverages data processing and sharing benefits from
cloud environment. Data security and privacy are inevitable requirement of cloud …
cloud environment. Data security and privacy are inevitable requirement of cloud …
[HTML][HTML] Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN
The increased usage of IoT networks brings about new privacy risks, especially when
intrusion detection systems (IDSs) rely on large datasets for machine learning (ML) tasks …
intrusion detection systems (IDSs) rely on large datasets for machine learning (ML) tasks …
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues
Abstract Mobile Edge Computing (MEC) is a modern paradigm that involves moving
computing and storage resources closer to the network edge, reducing latency, and …
computing and storage resources closer to the network edge, reducing latency, and …
Differential privacy location protection method based on the Markov model
H Li, Y Wang, F Guo, J Wang… - … and Mobile Computing, 2021 - Wiley Online Library
Location‐based services (LBS) have become an important research area with the rapid
development of mobile Internet technology, GPS positioning technology, and the …
development of mobile Internet technology, GPS positioning technology, and the …
Have the cake and eat it too: Differential Privacy enables privacy and precise analytics
R Subramanian - Journal of Big Data, 2023 - Springer
Existing research in differential privacy, whose applications have exploded across functional
areas in the last few years, describes an intrinsic trade-off between the privacy of a dataset …
areas in the last few years, describes an intrinsic trade-off between the privacy of a dataset …