Results 21 to 30 of about 3,206,915 (290)
On the Need for a General REST-Security Framework
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept.
Luigi Lo Iacono +2 more
doaj +1 more source
Securing a Local Training Dataset Size in Federated Learning
Federated learning (FL) is an emerging paradigm that helps to train a global machine learning (ML) model by utilizing decentralized data among clients without sharing them.
Young Ah Shin +3 more
doaj +1 more source
Time-Sensitive and Sybil-Proof Incentive Mechanisms for Mobile Crowdsensing via Social Network
Mobile crowdsensing (MCS) has become a popular and promising paradigm in various sensing applications in urban scenarios. In recent years, some social network-based MCS systems, which utilizing the social relationship to recruit participants or perform ...
Lingyun Jiang +5 more
doaj +1 more source
Use of graph-structured data models is on the rise - in graph databases, in representing biological and healthcare data as well as geographical data. In order to secure graph-structured data, and develop cryptographically secure schemes for graph databases, it is essential to formally define and develop suitable collision resistant one-way hashing ...
Arshad, Muhammad U. +4 more
openaire +3 more sources
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection [PDF]
Most of the MANET security research has so far focused on providing routing security and confidentiality to the data packets, but less has been done to ensure privacy and anonymity of the communicating entities.
Hota, C. +3 more
core +1 more source
Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core +2 more sources
Designing privacy for scalable electronic healthcare linkage [PDF]
A unified electronic health record (EHR) has potentially immeasurable benefits to society, and the current healthcare industry drive to create a single EHR reflects this.
Ajayi, O. +3 more
core +2 more sources
Multi-Features Refinement and Aggregation for Medical Brain Segmentation
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu +4 more
doaj +1 more source
Security and Privacy Issues of Big Data [PDF]
This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy.
Moura, Jose, Serrao, Carlos
core +2 more sources
Surface defect detection plays a crucial role in ensuring the quality standards of hot-rolled steel strips. To meet the demands for high precision and real-time performance in industrial defect detection, this paper introduces an improved one-stage ...
Yunfei Ma +4 more
doaj +1 more source

