Results 61 to 70 of about 25,084,029 (287)

FL-GUARD: A Holistic Framework for Run-Time Detection and Recovery of Negative Federated Learning

open access: yesData Science and Engineering
Federated learning (FL) is a promising approach for learning a model from data distributed on massive clients without exposing data privacy. It works effectively in the ideal federation where clients share homogeneous data distribution and learning ...
Hong Lin   +4 more
doaj   +1 more source

DPENet: Dual-path extraction network based on CNN and transformer for accurate building and road extraction

open access: yesInternational Journal of Applied Earth Observations and Geoinformation, 2023
The acceleration of urbanization and the increasing demand for precise city planning have made the extraction of buildings and roads from remote sensing images crucial.
Ziyi Chen   +5 more
doaj  

Lightweight Data-Security Ontology for IoT †

open access: yesItalian National Conference on Sensors, 2020
Although current estimates depict steady growth in Internet of Things (IoT), many works portray an as yet immature technology in terms of security. Attacks using low performance devices, the application of new technologies and data analysis to infer ...
Pedro Gonzalez-Gil   +2 more
semanticscholar   +1 more source

Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing

open access: yesApplied Sciences, 2023
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt   +2 more
doaj   +1 more source

Data security and privacy in the cloud [PDF]

open access: yesMobile Multimedia/Image Processing, Security, and Applications 2019, 2019
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati   +3 more
openaire   +1 more source

Data, Data Banks and Security [PDF]

open access: yesEuropean Journal for Security Research, 2020
AbstractThe article discusses different examples of data-driven policing, its legal provisions and effects on a society’s understanding of public security. It distinguishes between (a) the collection of classical data such as fingerprints or DNA, which serve to identify suspects and to collect evidence, (b) the processes and the impetus of big data ...
openaire   +2 more sources

Enhancing Data Security with Secure FTP

open access: yes, 2022
Secure FTP (File Transfer Protocol) stands as a cornerstone in modern data exchange, providing a robust mechanism for secure file transfers over networks. This abstract delves into the fundamental principles and key features of Secure FTP, shedding light on its pivotal role in safeguarding data integrity and confidentiality. Secure FTP encompasses two
openaire   +1 more source

Combination of Hiding and Encryption for Data Security

open access: yesInternational Journal of Interactive Mobile Technologies, 2020
One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm
Ibtisam A. Aljazaery   +2 more
semanticscholar   +1 more source

Graph Neural Networks in Point Clouds: A Survey

open access: yesRemote Sensing
With the advancement of 3D sensing technologies, point clouds are gradually becoming the main type of data representation in applications such as autonomous driving, robotics, and augmented reality. Nevertheless, the irregularity inherent in point clouds
Dilong Li   +5 more
doaj   +1 more source

Dynamic service migration in ultra-dense multi-access edge computing network for high-mobility scenarios

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
The multi-access edge computing (MEC) has higher computing power and lower latency than user equipment and remote cloud computing, enabling the continuing emergence of new types of services and mobile application.
Haowei Lin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy