Botnets unveiled: A comprehensive survey on evolving threats and defense strategies

M Asadi, MAJ Jamali, A Heidari… - Transactions on …, 2024 - Wiley Online Library
Botnets have emerged as a significant internet security threat, comprising networks of
compromised computers under the control of command and control (C&C) servers. These …

Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation

GS Kumar, K Premalatha, GU Maheshwari… - … Applications of Artificial …, 2024 - Elsevier
Mountainous amounts of information are now available in hospitals, finance, counter-
terrorism, education and many other sectors. Those information can offer a rich source for …

Privacy-Preserving Network Traffic Analysis Using Homomorphic Encryption

SEVS Pillai, K Polimetla - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
Privacy and Homomorphic Encryption are effective ways for securely evaluating network
records by encrypting them with a sophisticated cryptographic algorithm. This method …

An automated privacy-preserving self-supervised classification of COVID-19 from lung CT scan images minimizing the requirements of large data annotation

SS Chowa, MRI Bhuiyan, MS Tahosin, A Karim… - Scientific Reports, 2025 - nature.com
This study presents a novel privacy-preserving self-supervised (SSL) framework for COVID-
19 classification from lung CT scans, utilizing federated learning (FL) enhanced with Paillier …

Addressing Bias and Fairness Using Fair Federated Learning: A Synthetic Review

D Kim, H Woo, Y Lee - Electronics, 2024 - search.proquest.com
The rapid increase in data volume and variety within the field of machine learning
necessitates ethical data utilization and adherence to strict privacy protection standards. Fair …

[PDF][PDF] Security challenges in cloud computing: A comprehensive analysis

JJ Ang'udi - World Journal of Advanced Engineering …, 2023 - pdfs.semanticscholar.org
The security issues surrounding cloud computing, a quickly develo** technology that is
now essential to both personal and business computing, are thoroughly examined in this …

Exploring the landscape of network security: a comparative analysis of attack detection strategies

P Rajesh Kanna, P Santhi - Journal of Ambient Intelligence and …, 2024 - Springer
The field of computer networking is experiencing rapid growth, accompanied by the swift
advancement of internet tools. As a result, people are becoming more aware of the …

Enhancing protection in high-dimensional data: Distributed differential privacy with feature selection

IM Putrama, P Martinek - Information Processing & Management, 2024 - Elsevier
The computational cost for implementing data privacy protection tends to rise as the
dimensions increase, especially on correlated datasets. For this reason, a faster data …

Efficient federated learning for pediatric pneumonia on chest X-ray classification

Z Pan, H Wang, J Wan, L Zhang, J Huang, Y Shen - Scientific Reports, 2024 - nature.com
Abstract According to the World Health Organization (WHO), pneumonia kills about 2 million
children under the age of 5 every year. Traditional machine learning methods can be used …

Protecting your online persona: a preferential selective encryption approach for enhanced privacy in tweets, images, memes, and metadata

NP Shetty, B Muniyal, A Priyanshu, D Kumar… - IEEE …, 2024 - ieeexplore.ieee.org
The proliferation of online social networking websites has resulted in the growth of online
communities and increased communication among users. However, sharing personal …