Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

A lightweight privacy-preserving CNN feature extraction framework for mobile sensing

K Huang, X Liu, S Fu, D Guo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The proliferation of various mobile devices equipped with cameras results in an exponential
growth of the amount of images. Recent advances in the deep learning with convolutional …

Exploiting mobile big data: Sources, features, and applications

X Cheng, L Fang, X Hong, L Yang - IEEE Network, 2017 - ieeexplore.ieee.org
The worldwide rollout of 4G LTE mobile communication networks has accelerated the
proliferation of the mobile Internet and spurred a new wave of mobile applications on …

Mobile big data: The fuel for data-driven wireless

X Cheng, L Fang, L Yang, S Cui - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
In the past decade, the smart phone evolution has accelerated the proliferation of the mobile
Internet and spurred a new wave of mobile applications, leading to an unprecedented …

Continuous user identification in distance learning: a recent technology perspective

D Portugal, JN Faria, M Belk, P Martins… - Smart Learning …, 2023 - Springer
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …

Protection of privacy in biometric data

I Natgunanathan, A Mehmood, Y **ang… - IEEE …, 2016 - ieeexplore.ieee.org
Biometrics is commonly used in many automated verification systems offering several
advantages over traditional verification methods. Since biometric features are associated …

Privacy-preserving implicit authentication protocol using cosine similarity for Internet of Things

F Wei, P Vijayakumar, N Kumar… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things provides complicated value-added services to mobile intelligent terminal
users. Different sensors collect various data from the users and transmit the data to the …

PeGraph: A system for privacy-preserving and efficient search over encrypted social graphs

S Wang, Y Zheng, X Jia, X Yi - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the widespread adoption of cloud computing, it is increasingly popular for online social
network (OSN) service providers to leverage the public cloud as a back-end to manage their …

A cloud-aided privacy-preserving multi-dimensional data comparison protocol

H Shen, M Zhang, H Wang, F Guo, W Susilo - Information Sciences, 2021 - Elsevier
With the emergence of mobile social networks, users can make friends or negotiate projects
at any time and anywhere in social communities through their mobile devices (such as …