Results 61 to 70 of about 5,949,154 (313)
Integrity Auditing for Multi-Copy in Cloud Storage Based on Red-Black Tree
With the rapid development of cloud storage, cloud users are willing to store data in the cloud storage system, and at the same time, the requirements for the security, integrity, and availability of data storage are getting higher and higher.
Zhenpeng Liu +3 more
doaj +1 more source
Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung +190 more
wiley +1 more source
MAP-GAN: multi-attribute facial privacy protection model without losing identification
In recent years, the proliferation of facial image collection systems coupled with significant advancements in machine learning-driven image analysis techniques has posed formidable challenges to protecting individuals’ privacy information, raising ...
Yue Wang +5 more
doaj +1 more source
Chinese Character Components Segmentation Method Based on Faster RCNN
To solve the component segmentation problem caused by the sticking and overlapping of parts in incoherent handwritten calligraphy characters, we propose a Chinese character part segmentation method based on Faster RCNN. The method utilizes the advantages
Xiang Gao +3 more
doaj +1 more source
An examination into the role of knowledge management and computer security in organizations [PDF]
Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures.
Gururajan, Raj, Gururajan, Vijaya
core
Software for Wearable Devices: Challenges and Opportunities
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin +5 more
core +1 more source
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security +2 more
core +1 more source
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
Zephyrus: An Information Hiding Mechanism Leveraging Ethereum Data Fields
Permanent availability makes blockchain technologies a suitable alternative for building a covert channel. Previous works have analysed its feasibility in a particular blockchain technology called Bitcoin.
Mar Gimenez-Aguilar +3 more
doaj +1 more source
The byproduct of today’s massive interconnectivity is that basically nothing and no-one is immune to cyber attacks any longer. Sadly, this can be demonstrated rather trivially.
Etalle, Sandro
core +2 more sources

