Results 1 to 10 of about 25,084,029 (287)

Secure data deduplication

open access: yesProceedings of the 4th ACM international workshop on Storage security and survivability, 2008
As the world moves to digital storage for archival purposes, there is an increasing demand for systems that can provide secure data storage in a cost-effective manner. By identifying common chunks of data both within and between files and storing them only once, deduplication can yield cost savings by increasing the utility of a given amount of storage.
Storer, Mark W   +3 more
openaire   +4 more sources

Securing a Local Training Dataset Size in Federated Learning

open access: yesIEEE Access, 2022
Federated learning (FL) is an emerging paradigm that helps to train a global machine learning (ML) model by utilizing decentralized data among clients without sharing them.
Young Ah Shin   +3 more
doaj   +1 more source

On the Need for a General REST-Security Framework

open access: yesFuture Internet, 2019
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept.
Luigi Lo Iacono   +2 more
doaj   +1 more source

Time-Sensitive and Sybil-Proof Incentive Mechanisms for Mobile Crowdsensing via Social Network

open access: yesIEEE Access, 2018
Mobile crowdsensing (MCS) has become a popular and promising paradigm in various sensing applications in urban scenarios. In recent years, some social network-based MCS systems, which utilizing the social relationship to recruit participants or perform ...
Lingyun Jiang   +5 more
doaj   +1 more source

Leveraging Artificial Intelligence to Enhance Data Security and Combat Cyber Attacks

open access: yesJournal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
This research paper examines the potential of artificial intelligence (AI) in strengthening data security and mitigating the growing threat of cyber-attacks.
Yijie Weng, Jianhao Wu
semanticscholar   +1 more source

Deep neural network-aided design of terahertz bifunctional metasurface

open access: yesResults in Physics, 2023
Based on the insulator-to-metal phase transition of vanadium dioxide (VO2), we present a bifunctional metasurface (MS), which can be switched between the two working states, i.e., a broadband absorber and a broadband polarization converter.
Yisong Lv   +5 more
doaj  

Multi-Features Refinement and Aggregation for Medical Brain Segmentation

open access: yesIEEE Access, 2020
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu   +4 more
doaj   +1 more source

Understanding the infection severity and epidemiological characteristics of mpox in the UK

open access: yesNature Communications
In May 2022, individuals infected with the monkeypox virus were detected in the UK without clear travel links to endemic areas. Understanding the clinical characteristics and infection severity of mpox is necessary for effective public health policy. The
Thomas Ward   +5 more
doaj   +1 more source

Data Security

open access: yesData Science Journal, 2013
There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.).
openaire   +4 more sources

Data Security

open access: yes, 2023
Data security has become a significant concern in recent times, with the increasing amount of sensitive data being stored and transferred through digital channels. This paper explores the various aspects of data security, including the threats, vulnerabilities, and countermeasures.
openaire   +2 more sources

Home - About - Disclaimer - Privacy