Results 31 to 40 of about 13,332,800 (308)
Speaker Anonymization for Personal Information Protection Using Voice Conversion Techniques
As speech-based user interfaces integrated in the devices such as AI speakers become ubiquitous, a large amount of user voice data is being collected to enhance the accuracy of speech recognition systems.
In-Chul Yoo +5 more
semanticscholar +1 more source
Development of Approaches and Schemes for Proactive Information Protection in Computer Networks
This paper proposes approaches to protecting information from the standpoint of the paradigm of their proactive security and a method for proactively protecting information from malicious code based on expert assessments.
M. Karimov +2 more
semanticscholar +1 more source
It is established that the security of information and telecommunication systems depends significantly on the high level of efficiency of the access control and data protection systems.
O.S. Boichenko +3 more
doaj +1 more source
The digital economy includes a variety of economic processes carried out using information technology. Digital transformation processes, including those associated with the fourth industrial revolution, open up new paradigms for the use of information ...
Arslan G. Mustafaev / Арслан Г. Мустафаев +2 more
doaj +1 more source
Information flows in the world are growing very quickly. The exchange of information is growing rapidly. In connection with this fact, the existing mathematical apparatus and its practical application are constantly developing.
Volodymyr Khoroshko +3 more
doaj +1 more source
Models of interaction of cryptography and chaotic dynamics
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova +3 more
doaj +1 more source
The mobility of users, signal transmission through open cyberspace, and the need for low energy consumption in mobile devices lead to numerous new challenges related to information protection in wireless mobile networks.
Yuliia Kostiuk +6 more
semanticscholar +1 more source
The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by ...
Vasyl Trysnyuk +4 more
doaj +1 more source
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi +5 more
doaj +1 more source
Analysis and protection of IoT systems: Edge computing and decentralized decision-making
This article presents a detailed analysis of the Internet of Things (IoT) systems and the methods used to protect them. The article highlights the potential of edge computing to minimize traffic transmission and the decentralization of decision-making ...
Nadiia M. Lobanchykova +2 more
doaj +1 more source

