Preserving privacy in speaker and speech characterisation
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
A lightweight privacy-preserving CNN feature extraction framework for mobile sensing
The proliferation of various mobile devices equipped with cameras results in an exponential
growth of the amount of images. Recent advances in the deep learning with convolutional …
growth of the amount of images. Recent advances in the deep learning with convolutional …
Exploiting mobile big data: Sources, features, and applications
The worldwide rollout of 4G LTE mobile communication networks has accelerated the
proliferation of the mobile Internet and spurred a new wave of mobile applications on …
proliferation of the mobile Internet and spurred a new wave of mobile applications on …
Mobile big data: The fuel for data-driven wireless
In the past decade, the smart phone evolution has accelerated the proliferation of the mobile
Internet and spurred a new wave of mobile applications, leading to an unprecedented …
Internet and spurred a new wave of mobile applications, leading to an unprecedented …
Continuous user identification in distance learning: a recent technology perspective
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …
COVID-19 global pandemic has raised several concerns about the credibility of online …
Protection of privacy in biometric data
Biometrics is commonly used in many automated verification systems offering several
advantages over traditional verification methods. Since biometric features are associated …
advantages over traditional verification methods. Since biometric features are associated …
Privacy-preserving implicit authentication protocol using cosine similarity for Internet of Things
Internet of Things provides complicated value-added services to mobile intelligent terminal
users. Different sensors collect various data from the users and transmit the data to the …
users. Different sensors collect various data from the users and transmit the data to the …
PeGraph: A system for privacy-preserving and efficient search over encrypted social graphs
With the widespread adoption of cloud computing, it is increasingly popular for online social
network (OSN) service providers to leverage the public cloud as a back-end to manage their …
network (OSN) service providers to leverage the public cloud as a back-end to manage their …
A cloud-aided privacy-preserving multi-dimensional data comparison protocol
With the emergence of mobile social networks, users can make friends or negotiate projects
at any time and anywhere in social communities through their mobile devices (such as …
at any time and anywhere in social communities through their mobile devices (such as …