Results 121 to 130 of about 2,486,163 (328)
Special issue on cloud, wireless and e-commerce security [PDF]
Fang‐Yie Leu+2 more
openalex +1 more source
Fairness in Federated Learning: Trends, Challenges, and Opportunities
This survey delves into the intricate issues pertinent to fairness in federated learning , where various biasing factors can skew model performance. By systematically analyzing fairness‐aware strategies, evaluation metrics, and future directions, this work identifies pivotal research gaps in existing approaches and sheds light on both challenges and ...
Noorain Mukhtiar+2 more
wiley +1 more source
Mission‐centric decision support in cybersecurity via Bayesian Privilege Attack Graph
We propose a mission‐centric approach to assessing the risks of cyber attacks on the organization's mission and provide decision support to network security administrators. Our approach uses a unique stochastic model that connects vulnerability impacts to the mission's security requirements and allows selecting the most resilient configuration of ...
Michal Javorník, Martin Husák
wiley +1 more source
Using cloud computing technology, a telerehabilitation application allows patients to perform exercises remotely. Sensor data from a textile‐based IoT glove is processed in the cloud and transmitted as exercise commands to an actuating T‐IoT glove worn by patients.
Kadir Ozlem+5 more
wiley +1 more source
Abstract The International League Against Epilepsy/American Epilepsy Society (ILAE/AES) Joint Translational Task Force established the TASK3 working groups to create common data elements (CDEs) for various preclinical epilepsy research disciplines.
Laura Bindila+11 more
wiley +1 more source
UP3: Unsupervised Predictive Path Planner for Mobile Robots in Unknown Environment
In this article, an unsupervised learning‐based predictive path planning framework UP3 for mobile robots is introduced. The framework employs attention‐based path optimization, control barrier functions, and a deep constraint correction module. UP3 allows the robot to use local observation to generate smooth, safe, and collision‐free path points toward
Jianing Luo+4 more
wiley +1 more source
Data Security and Privacy Protection Data Security and Privacy Protection in Public Cloud [PDF]
This paper discusses about the challenges, advantages and shortcomings of existing solutions in data security and privacy in public cloud computing. As in cloud computing, oceans of data will be stored. Data stored in public cloud would face both outside attacks and inside attacks since public cloud provider themselves are untrusted.
arxiv
Security Analysis in the Migration to Cloud Environments [PDF]
David G. Rosado+3 more
openalex +1 more source
ABSTRACT A significant proportion of young people exiting Out‐of‐Home Care (OOHC) encounter substantial challenges in securing housing, often leading to homelessness within a few months after leaving care. All Australian jurisdictions have now approved extended care programs up to 21 years; however, none of them currently offer these young people ...
Yujie Zhao, Jacinta Waugh
wiley +1 more source
Cloud Security and Security Challenges Revisited [PDF]
In recent years, Cloud Computing has transformed local businesses and created new business models on the Internet- and Cloud services are still flourishing. But after the emphatic hype in the early years, a more realistic perception of Cloud services has emerged.
arxiv