AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems
Internet of things (IoT) is one of the most emerging technologies nowadays and it is one of
the key enablers of industrial cyber physical system (CPSs). It has started to participate in …
the key enablers of industrial cyber physical system (CPSs). It has started to participate in …
Novel Architecture for Image Classification Based on Rough Set
Abstract The Computed Tomography (CT) scan images classification problem is one of the
most challenging problems in recent years. Different medical treatments have been …
most challenging problems in recent years. Different medical treatments have been …
Information Security: A Review on Steganography with Cryptography for Genetic Algorithm (GA) Transaction
The Most multimedia files, especially those containing private information are images. Since
multimedia transmission takes place on public communication channels, it is more …
multimedia transmission takes place on public communication channels, it is more …
Text embedding in image using an optimisation-based key generation method
Data hiding capacity and image quality of the cover object are important factors in text
steganography, and data encryption is being widely employed to secure data in order to …
steganography, and data encryption is being widely employed to secure data in order to …
Learning without looking: similarity preserving hashing and its potential for machine learning in privacy critical domains
M Eleks, J Rebstadt, P Fukas, O Thomas - 2022 - dl.gi.de
Machine Learning is frequently ranked as one of the most promising technologies in several
application domains but falls short when the data necessary for training is privacy-sensitive …
application domains but falls short when the data necessary for training is privacy-sensitive …
PPNNBP: A Third Party Privacy-Preserving Neural Network With Back-Propagation Learning
With the advances in machine learning techniques and the potency of cloud computing
there is an increasing adoption of third party cloud services for outsourcing training and …
there is an increasing adoption of third party cloud services for outsourcing training and …
Novel Adaptive Histogram Binning-Based Lesion Segmentation for Discerning Severity in COVID-19 Chest CT Scan Images
Abstract Coronavirus sickness (COVID-19) recently adversely disrupted the medical care
system and the entire economy. Doctors, researchers, and specialists are working on new …
system and the entire economy. Doctors, researchers, and specialists are working on new …
Fully Homomorphic Encryption for Data Security Over Cloud
AV Kumar, K Bhavana, C Yamini - 2022 6th International …, 2022 - ieeexplore.ieee.org
From the past few years cloud services are so popular and are being used by many people
from various domains for various purposes such as data storage, e-mails, backing up data …
from various domains for various purposes such as data storage, e-mails, backing up data …
Novel Hybrid Genetic Arithmetic Optimization for Feature Selection and Classification of Pulmonary Disease Images
The difficulty in predicting early cancer is due to the lack of early illness indicators.
Metaheuristic approaches are a family of algorithms that seek to find the optimal values for …
Metaheuristic approaches are a family of algorithms that seek to find the optimal values for …
全同态加密文献计量分析研究.
陈智罡, 宋新霞, 郑梦策… - Journal of Computer …, 2022 - search.ebscohost.com
全同态加密在不解密的情况下, 能够对密文数据进行任意处理. 这种特殊的性质能够立竿见影地
解决数据隐私安全问题. 目前全同态加密已经成为学术界, 工业界乃至商业界的热门话题 …
解决数据隐私安全问题. 目前全同态加密已经成为学术界, 工业界乃至商业界的热门话题 …