Security of Cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects

A Ghosh, S Gupta, A Dua, N Kumar - Journal of Network and Computer …, 2020 - Elsevier
In contemporary era of technologies, blockchain has acquired tremendous attention from
various domains. It has wide spectrum of applications ranging from finance to social services …

A new direction in social network analysis: Online social network analysis problems and applications

U Can, B Alatas - Physica A: Statistical Mechanics and its Applications, 2019 - Elsevier
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …

Trustworthy LLMs: A survey and guideline for evaluating large language models' alignment

Y Liu, Y Yao, JF Ton, X Zhang, RGH Cheng… - arxiv preprint arxiv …, 2023 - arxiv.org
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …

Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN: A social multimedia perspective

S Garg, K Kaur, N Kumar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The continuous development and usage of multi-media-based applications and services
have contributed to the exponential growth of social multimedia traffic. In this context, secure …

A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

A comprehensive analyses of intrusion detection system for IoT environment

JCS Sicato, SK Singh, S Rathore… - Journal of Information …, 2020 - koreascience.kr
Abstract Nowadays, the Internet of Things (IoT) network, is increasingly becoming a
ubiquitous connectivity between different advanced applications such as smart cities, smart …

[HTML][HTML] Early detection of cyberbullying on social media networks

MF López-Vizcaíno, FJ Nóvoa, V Carneiro… - Future Generation …, 2021 - Elsevier
Cyberbullying is an important issue for our society and has a major negative effect on the
victims, that can be highly damaging due to the frequency and high propagation provided by …

Social media bot detection with deep learning methods: a systematic review

K Hayawi, S Saha, MM Masud, SS Mathew… - Neural Computing and …, 2023 - Springer
Social bots are automated social media accounts governed by software and controlled by
humans at the backend. Some bots have good purposes, such as automatically posting …

Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems

R Denis, P Madhubala - Multimedia Tools and Applications, 2021 - Springer
The exponential rise in the development of cloud computing environments in the healthcare
field, the protection and confidentiality of the medical records become a primary concern for …

Measuring trust in social networks based on linear uncertainty theory

Z Gong, H Wang, W Guo, Z Gong, G Wei - Information Sciences, 2020 - Elsevier
In social networks, trust relationships are the basis for interactions among decision nodes.
Trust relationships are subjective and dynamic, and there are only few sample data to …