Results 51 to 60 of about 24,321 (191)

Lifecycle‐Based Governance to Build Reliable Ethical AI Systems

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

Fully Homomorphic Encryption

open access: yes, 2022
AbstractIn 1978, Rivest et al. (1978) proposed the concepts of data bank and fully homomorphic encryption. Some individuals and organizations encrypt the original data and store them in the data bank for privacy protection. Data bank is also called data cloud. Therefore, the cloud stores a large amount of original data, which is obviously a huge wealth.
Zhiyong Zheng, Kun Tian, Fengxia Liu
openaire   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

Encrypted data processing with Homomorphic Re-Encryption

open access: yesInformation Sciences, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ding, Wenxiu   +3 more
openaire   +3 more sources

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Simulation-Based Performance Validation of Homomorphic Encryption Algorithms in the Internet of Things

open access: yesFuture Internet, 2019
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms.
Johannes Kölsch   +3 more
doaj   +1 more source

HOMOMORPHIC ENCRYPTION: CLOUD COMPUTING SECURITY AND OTHER APPLICATIONS (A SURVEY)

open access: yesInformatika, 2016
Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on cipher text and to obtain an encrypted result which matches the result of operations performed on the plain text. The article presents a basic
A. I. Trubei
doaj  

Enabling Secure Database as a Service using Fully Homomorphic Encryption: Challenges and Opportunities [PDF]

open access: yes, 2013
The database community, at least for the last decade, has been grappling with querying encrypted data, which would enable secure database as a service solutions.
Gunda, Manikanta   +2 more
core  

Encrypted LQG using labeled homomorphic encryption [PDF]

open access: yesProceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019
We consider the problem of implementing a Linear Quadratic Gaussian (LQG) controller on a distributed system, while maintaining the privacy of the measurements, state estimates, control inputs and system model. The component sub-systems and actuator outsource the LQG computation to a cloud controller and encrypt their signals and matrices.
Andreea B. Alexandru, George J. Pappas
openaire   +1 more source

Home - About - Disclaimer - Privacy