Search

Your search keyword '"privacy-preserving"' showing total 570 results

Search Constraints

Start Over You searched for: Descriptor "privacy-preserving" Remove constraint Descriptor: "privacy-preserving" Database Complementary Index Remove constraint Database: Complementary Index
570 results on '"privacy-preserving"'

Search Results

1. An IoMT image crypto-system based on spatial watermarking and asymmetric encryption.

2. Fusion of machine learning and blockchain-based privacy-preserving approach for healthcare data in the Internet of Things.

3. A Blockchain and Zero Knowledge Proof Based Data Security Transaction Method in Distributed Computing.

4. Secure electronic medical records sharing scheme based on blockchain by using proxy re-encryption.

5. Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database.

6. The blockchain‐based privacy‐preserving searchable attribute‐based encryption scheme for federated learning model in IoMT.

7. Privacy-Preserving Large-Scale AI Models for Intelligent Railway Transportation Systems: Hierarchical Poisoning Attacks and Defenses in Federated Learning.

8. Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems.

9. Privacy-Preserving and Diversity-Aware Trust-based Team Formation in Online Social Networks.

10. A Privacy-Preserving and Quality-Aware User Selection Scheme for IoT.

11. Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning.

12. Analyzing Machine Learning Models for Activity Recognition Using Homomorphically Encrypted Real-World Smart Home Datasets: A Case Study.

13. Physics-Driven Spectrum-Consistent Federated Learning for Palmprint Verification.

14. Privacy-preserving algorithm based on vulnerable nodes for social relationships.

15. Privacy‐preserving‐based fuzzy filtering for nonlinear networked systems with adaptive‐event‐triggered mechanism and FDI attacks.

16. A Privacy-Preserving Electromagnetic-Spectrum-Sharing Trading Scheme Based on ABE and Blockchain.

17. High‐degree penalty based global statistical network embedding for name disambiguation in anonymized graph.

18. SiSMA‐SWMS: Signature‐based Secure Monitoring Approach for Smart Waste Monitoring Systems.

19. Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication.

20. pFind: Privacy-preserving lost object finding in vehicular crowdsensing.

21. Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption.

22. Privacy-preserving medical diagnosis system with Gaussian kernel-based support vector machine.

23. Privacy-preserving Cross-domain Recommendation with Federated Graph Learning.

24. Genomic privacy preservation in genome-wide association studies: taxonomy, limitations, challenges, and vision.

25. SPEI-FL: Serverless Privacy Edge Intelligence-Enabled Federated Learning in Smart Healthcare Systems.

26. Dual-branch networks for privacy-preserving cross-modal retrieval in cloud computing.

27. PPFLV: privacy-preserving federated learning with verifiability.

28. A Federated Learning Protocol for Spiking Neural Membrane Systems.

29. SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse.

30. Privacy-Preserving Breast Cancer Classification: A Federated Transfer Learning Approach.

31. EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation.

32. FedSteg: Coverless Steganography‐Based Privacy‐Preserving Decentralized Federated Learning.

33. Survey and open problems in privacy-preserving knowledge graph: merging, query, representation, completion, and applications.

34. Lightweight and privacy-preserving hierarchical federated learning mechanism for artificial intelligence-generated image content.

35. Semantic IoT Transformation: Elevating Wireless Networking Performance through Innovative Communication Paradigms.

36. A Privacy Recommending Data Processing Model for Internet of Vehicles (IoV) Services.

37. Evaluating the Efficiency of zk-SNARK, zk-STARK, and Bulletproof in Real-World Scenarios: A Benchmark Study.

38. Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions.

39. PARE: Privacy-Preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things.

40. An Efficient Cross-Modal Privacy-Preserving Image–Text Retrieval Scheme.

41. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud.

42. Computation Offloading with Privacy-Preserving in Multi-Access Edge Computing: A Multi-Agent Deep Reinforcement Learning Approach.

43. Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks.

44. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples.

45. FedLens: federated learning-based privacy-preserving mobile crowdsensing for virtual tourism.

46. 梯度隐藏的安全聚类与隐私保护联邦学习.

47. A Survey on Blockchain-Based Federated Learning: Categorization, Application and Analysis.

48. Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum.

49. Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes.

50. Survey: federated learning data security and privacy-preserving in edge-Internet of Things.

Catalog

Books, media, physical & digital resources