Big privacy: Challenges and opportunities of privacy study in the age of big data

S Yu - IEEE access, 2016 - ieeexplore.ieee.org
One of the biggest concerns of big data is privacy. However, the study on big data privacy is
still at a very early stage. We believe the forthcoming solutions and theories of big data …

Machine learning in marketing: Recent progress and future research directions

D Herhausen, SF Bernritter, EWT Ngai, A Kumar… - Journal of Business …, 2024 - Elsevier
Decision-making in marketing has changed dramatically in the past decade. Companies
increasingly use algorithms to generate predictions for marketing decisions, such as which …

Trustworthy ai: A computational perspective

H Liu, Y Wang, W Fan, X Liu, Y Li, S Jain, Y Liu… - ACM Transactions on …, 2022 - dl.acm.org
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …

[書籍][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Biometric template protection: Bridging the performance gap between theory and practice

K Nandakumar, AK Jain - IEEE Signal Processing Magazine, 2015 - ieeexplore.ieee.org
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …

Content based image retrieval using deep learning process

RR Saritha, V Paul, PG Kumar - Cluster Computing, 2019 - Springer
Content-based image retrieval (CBIR) uses image content features to search and retrieve
digital images from a large database. A variety of visual feature extraction techniques have …

Privacy preserving face recognition utilizing differential privacy

MAP Chamikara, P Bertok, I Khalil, D Liu… - Computers & Security, 2020 - Elsevier
Facial recognition technologies are implemented in many areas, including but not limited to,
citizen surveillance, crime control, activity monitoring, and facial expression evaluation …

Tinygarble: Highly compressed and scalable sequential garbled circuits

EM Songhori, SU Hussain, AR Sadeghi… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
We introduce Tiny Garble, a novel automated methodology based on powerful logic
synthesis techniques for generating and optimizing compressed Boolean circuits used in …

Multi-biometric template protection based on homomorphic encryption

M Gomez-Barrero, E Maiorana, J Galbally, P Campisi… - Pattern Recognition, 2017 - Elsevier
In spite of the advantages of biometrics as an identity verification technology, some concerns
have been raised due to the high sensitivity of biometric data: any information leakage …

Security, privacy, and usability in continuous authentication: A survey

AF Baig, S Eskeland - Sensors, 2021 - mdpi.com
Continuous authentication has been proposed as a possible approach for passive and
seamless user authentication, using sensor data comprising biometric, behavioral, and …