[PDF][PDF] PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud

JK Dawson, F Twum, J Benjamin… - Security and …, 2023 - academia.edu
Industries have embraced cloud computing for their daily operations due to the volume of
data they create. As data generation and consumption have increased, the challenges and …

Robust searching-based gradient collaborative management in intelligent transportation system

H Shi, H Wang, R Ma, Y Hua, T Song, H Gao… - ACM Transactions on …, 2023 - dl.acm.org
With the rapid development of big data and the Internet of Things (IoT), traffic data from an
Intelligent Transportation System (ITS) is becoming more and more accessible. To …

PRISMA Archetype‐Based Systematic Literature Review of Security Algorithms in the Cloud

J Kwao Dawson, F Twum… - Security and …, 2023 - Wiley Online Library
Industries have embraced cloud computing for their daily operations due to the volume of
data they create. As data generation and consumption have increased, the challenges and …

Searchable encryption: a survey on privacy‐preserving search schemes on encrypted outsourced data

R Handa, CR Krishna… - … and Computation: Practice …, 2019 - Wiley Online Library
Outsourcing confidential data to cloud storage leads to privacy challenges that can be
reduced using encryption. However, with encryption in place, the utilization of the data is …

An efficient deep learning approach to IoT intrusion detection

J Cao, L Lin, R Ma, H Guan, M Tian… - The Computer …, 2022 - academic.oup.com
With the rapid development of the Internet of Things (IoT), network security challenges are
becoming more and more complex, and the scale of intrusion attacks against the network is …

Edge caching placement strategy based on evolutionary game for conversational information seeking in edge cloud computing

H Shi, M Zhang, RH Ma, L Lin, R Zhang… - ACM Transactions on the …, 2024 - dl.acm.org
In Internet applications, network conversation is the primary communication between the
user and server. The server needs to efficiently and quickly return the corresponding service …

Perceptual data augmentation for biomedical coronary vessel segmentation

Y Ma, S Wang, Y Hua, R Ma, T Song… - IEEE/ACM …, 2022 - ieeexplore.ieee.org
Sufficient annotated data is critical to the success of deep learning methods. Annotating for
vessel segmentation in X-ray coronary angiograms is extremely difficult because of the small …

MultiPLZW: A novel multiple pattern matching search in LZW-compressed data

M Aldwairi, AY Hamzah, M Jarrah - Computer Communications, 2019 - Elsevier
Searching encrypted or compressed data provides security and privacy without sacrificing
efficiency. It has many applications in cloud storage, bioinformatics, IoT, unmanned aerial …

Deep Convolutional Linear Precoder Neural Network for Rate Splitting Strategy of Aerial Computing Networks

Z Wang, R Ma, H Shi, Z Cai, L Lin… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Aerial computing networks arefacing the challenge of massive node access, where user
devices generally have stringent latency and robustness requirements. Rate Splitting …

Document clustering for efficient and secure information retrieval from cloud

R Handa, CR Krishna… - … and Computation: Practice …, 2019 - Wiley Online Library
Organizations prefer using cloud for storing their data due to availability of cost‐effective
storage. The outsourced data include sensitive information, so data is encrypted as …