Sign Up to like & get
recommendations!
0
Published in 2021 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-10134-x
Abstract: The challenge of COVID-19 has become more prevalent across the world. It is highly demanding an intelligent strategy to outline the precaution measures until the clinical trials find a successful vaccine. With technological advancement, Wireless…
read more here.
Keywords:
point care;
chaotic map;
privacy preservation;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Digital Communications and Networks"
DOI: 10.1016/j.dcan.2020.05.008
Abstract: Abstract Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain has shown a good application prospect in many fields, from the…
read more here.
Keywords:
privacy;
privacy preservation;
permissionless blockchain;
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2019.12.008
Abstract: Abstract Recently, the progression in Internet of Thing (IoT) has extensively influenced the model of wireless networking. As numerous wireless devices were emerged, the new Medium Access Control (MAC) and routing protocols has been introduced…
read more here.
Keywords:
key;
algorithm;
data privacy;
preservation mac ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of King Saud University - Computer and Information Sciences"
DOI: 10.1016/j.jksuci.2020.10.015
Abstract: Abstract The rising volume of sensitive and personal data being harvested by data controllers has increased the security essentials in the cloud system. The cloud module is not used just to store the data, but…
read more here.
Keywords:
privacy preservation;
shark smell;
preservation;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2822693
Abstract: Privacy in social networks is a large and growing concern in recent times. It refers to various issues in a social network which include privacy of users, links, and their attributes. Each privacy component of…
read more here.
Keywords:
network;
social networks;
empirical study;
privacy preservation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3154826
Abstract: Enhancing the privacy of machine learning (ML) algorithms has become crucial with the presence of different types of attacks on AI applications. Continual learning (CL) is a branch of ML with the aim of learning…
read more here.
Keywords:
differential privacy;
privacy;
continual learning;
robust continual ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3175219
Abstract: With the continuous increase in avenues of personal data generation, privacy protection has become a hot research topic resulting in various proposed mechanisms to address this social issue. The main technical solutions for guaranteeing a…
read more here.
Keywords:
clustering based;
privacy;
anonymization;
privacy preservation ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3235016
Abstract: Personal data have been increasingly used in data-driven applications to improve quality of life. However, privacy preservation of personal data while sharing it with analysts/ researchers has become an essential requirement to be met by…
read more here.
Keywords:
using machine;
quantifying vulnerability;
machine learning;
privacy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3245524
Abstract: The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life. The objective of IoT is to provide ubiquitous access to numerous devices and machines on service providers. However, IoT-based devices may…
read more here.
Keywords:
techniques iot;
preservation techniques;
iot devices;
privacy preservation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Journal of Biomedical and Health Informatics"
DOI: 10.1109/jbhi.2022.3181823
Abstract: Recent advances in electronic devices and communication infrastructure have revolutionized the traditional healthcare system into a smart healthcare system by using internet of medical things (IoMT) devices. However, due to the centralized training approach of…
read more here.
Keywords:
federated learning;
privacy;
smart healthcare;
privacy preservation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Network"
DOI: 10.1109/mnet.002.2100312
Abstract: The emerging collaborative authentication schemes are capable of outperforming the conventional isolated methods as a benefit of their multi-dimensional data/information gleaned, but they face new challenges in the sixth generation (6G) wireless networks owing to…
read more here.
Keywords:
authentication;
information;
collaborative authentication;
privacy ... See more keywords