Results 1 to 10 of about 828,554 (261)
Security Implications of AI Chatbots in Health Care
Journal of Medical Internet Research, 2023Artificial intelligence (AI) chatbots like ChatGPT and Google Bard are computer programs that use AI and natural language processing to understand customer questions and generate natural, fluid, dialogue-like responses to their inputs. ChatGPT,
Jingquan Li
doaj +2 more sources
PPCA: Privacy-preserving Principal Component Analysis Using Secure Multiparty Computation(MPC) [PDF]
arXiv, 2021Privacy-preserving data mining has become an important topic. People have built several multi-party-computation (MPC)-based frameworks to provide theoretically guaranteed privacy, the poor performance of real-world algorithms have always been a challenge.
Fan, Xiaoyu+4 more
arxiv +3 more sources
An Overview on Data Security in Cloud Computing [PDF]
arXiv.org, 2018Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and managed by third parts. This paper is an overview of data security issues in the cloud computing.
Lynda Kacha, Abdelhafid Zitouni
arxiv +2 more sources
An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System
IEEE AccessWith the increase of cyber-attacks and security threats in the recent decade, it is necessary to safeguard sensitive data and provide robust protection to information systems and computer networks.
Omar Alghushairy+6 more
doaj +2 more sources
Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems [PDF]
IEEE Transactions on Sustainable Computing, 2021Cyber-physical-social systems (CPSS) are revolutionizing the relationships between humans, computers, and things. Outsourcing computation to the cloud can offer resources-constrained enterprises and consumers sustainable computing in CPSS. However, ensuring the security of data in such an outsourced environment remains a research challenge.
Jun Feng+5 more
openaire +4 more sources
Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security? [PDF]
Energy Informatics, 2021AbstractDistributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements.
Sampath Kumar Venkatachary+2 more
openaire +4 more sources
Voice Feature Extraction for Gender and Emotion Recognition [PDF]
ITM Web of Conferences, 2021Voice recognition plays a key function in spoken communication that facilitates identifying the emotions of a person that reflects within the voice. Gender classification through speech is a popular Human Computer Interaction (HCI) method on account that
Nashipudimath Madhu M.+4 more
doaj +1 more source
Network intrusion detection using oversampling technique and machine learning algorithms [PDF]
PeerJ Computer Science, 2022The expeditious growth of the World Wide Web and the rampant flow of network traffic have resulted in a continuous increase of network security threats. Cyber attackers seek to exploit vulnerabilities in network architecture to steal valuable information
Hafiza Anisa Ahmed+2 more
doaj +2 more sources
SAFE: Security Door Lock System Using Haar-Cascade and LBPH Method
Applied and Computational Engineering, 2023Door lock provides numerous benefits and has become indispensable in daily life as it acts as a security guard to prevent burglars and protect home belonging safely.
Jing-Han Leim+4 more
semanticscholar +1 more source
European Journal of Artificial Intelligence and Machine Learning, 2022
Over the years, malware (malicious software) has become a major challenge for computer users, organizations, and even countries. In particular, a compromise of a set of inflamed hosts (aka zombies or bots) is one of the severe threats to Internet ...
O. Taylor, P. S. Ezekiel
semanticscholar +1 more source
Over the years, malware (malicious software) has become a major challenge for computer users, organizations, and even countries. In particular, a compromise of a set of inflamed hosts (aka zombies or bots) is one of the severe threats to Internet ...
O. Taylor, P. S. Ezekiel
semanticscholar +1 more source