Big privacy: Challenges and opportunities of privacy study in the age of big data
S Yu - IEEE access, 2016 - ieeexplore.ieee.org
One of the biggest concerns of big data is privacy. However, the study on big data privacy is
still at a very early stage. We believe the forthcoming solutions and theories of big data …
still at a very early stage. We believe the forthcoming solutions and theories of big data …
Machine learning in marketing: Recent progress and future research directions
Decision-making in marketing has changed dramatically in the past decade. Companies
increasingly use algorithms to generate predictions for marketing decisions, such as which …
increasingly use algorithms to generate predictions for marketing decisions, such as which …
Trustworthy ai: A computational perspective
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …
developments, changing everyone's daily life and profoundly altering the course of human …
[書籍][B] Handbook of fingerprint recognition
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
Biometric template protection: Bridging the performance gap between theory and practice
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …
control systems. Due to the strong and permanent link between individuals and their …
Content based image retrieval using deep learning process
RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …
digital images from a large database. A variety of visual feature extraction techniques have …
Privacy preserving face recognition utilizing differential privacy
Facial recognition technologies are implemented in many areas, including but not limited to,
citizen surveillance, crime control, activity monitoring, and facial expression evaluation …
citizen surveillance, crime control, activity monitoring, and facial expression evaluation …
Tinygarble: Highly compressed and scalable sequential garbled circuits
We introduce Tiny Garble, a novel automated methodology based on powerful logic
synthesis techniques for generating and optimizing compressed Boolean circuits used in …
synthesis techniques for generating and optimizing compressed Boolean circuits used in …
Multi-biometric template protection based on homomorphic encryption
In spite of the advantages of biometrics as an identity verification technology, some concerns
have been raised due to the high sensitivity of biometric data: any information leakage …
have been raised due to the high sensitivity of biometric data: any information leakage …
Security, privacy, and usability in continuous authentication: A survey
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …
seamless user authentication, using sensor data comprising biometric, behavioral, and …