Search Results - "Security and Privacy in Computing and Communications"

Refine Results
  1. 1

    A blockchain-based secure storage scheme for medical information by Sun, Zhijie, Han, Dezhi, Li, Dun, Wang, Xiangsheng, Chang, Chin-Chen, Wu, Zhongdai

    ISSN: 1687-1499, 1687-1472, 1687-1499
    Published: Cham Springer International Publishing 25.04.2022
    “… However, current medical information is subject to the risk of privacy leakage and difficult to share…”
    Get full text
    Journal Article
  2. 2

    The analysis of financial market risk based on machine learning and particle swarm optimization algorithm by Liu, Tao, Yu, Zhongyang

    ISSN: 1687-1499, 1687-1472, 1687-1499
    Published: Cham Springer International Publishing 02.04.2022
    “…The financial industry is a key to promoting the development of the national economy, and the risk it takes is also the largest hidden risk in the financial…”
    Get full text
    Journal Article
  3. 3

    Heuristic approaches for the car sequencing problems with block batches by Yu, Yingjie, Lu, Xiaochun, Zhao, Tao, Cheng, Minjiao, Liu, Lin, Wei, Wenchao

    ISSN: 1687-1499, 1687-1472, 1687-1499
    Published: Cham Springer International Publishing 28.03.2022
    “…) that minimizes the conflicts occur when sequentially manufacturing cars on an assembly line. The CSP is a well-established problem, subject to the paint batching constraints…”
    Get full text
    Journal Article
  4. 4

    Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things by Dimitrakos, Theo, Dilshener, Tezcan, Kravtsov, Alexander, La Marra, Antonio, Martinelli, Fabio, Rizos, Athanasios, Rosetti, Alessandro, Saracino, Andrea

    ISSN: 2324-9013
    Published: IEEE 01.12.2020
    “… That is, mutable attributes about subjects, resources and environment as well as trust levels that are continuously…”
    Get full text
    Conference Proceeding
  5. 5

    Securing the Internet of Things (IoT): A Security Taxonomy for IoT by Rizvi, Syed, Kurtz, Andrew, Pfeffer, Joseph, Rizvi, Mohammad

    ISSN: 2324-9013
    Published: IEEE 01.08.2018
    “…In Internet of Things (IoT), there is a vast number of connected devices that exist. These devices are collecting and transmitting great volumes of data from…”
    Get full text
    Conference Proceeding
  6. 6

    A formalization-based vulnerability detection method for cross-subject network components by Chen, Jinfu, Xie, Haodi, Cai, Saihua, Geng, Ye, Yin, Yemin, Zhang, Zikang

    ISSN: 2324-9013
    Published: IEEE 01.12.2022
    “…With the rapid development of computer technology, the cross-subject network components (CSNC…”
    Get full text
    Conference Proceeding
  7. 7

    A Generic Information and Consent Framework for the IoT by Morel, Victor, Cunche, Mathieu, Le Metayer, Daniel

    ISSN: 2324-9013
    Published: IEEE 01.08.2019
    “… In this paper, we propose a generic framework for information and consent in the IoT which is protective both for data subjects and for data controllers…”
    Get full text
    Conference Proceeding
  8. 8

    LUCON: Data Flow Control for Message-Based IoT Systems by Schuette, Julian, Brost, Gerd Stefan

    ISSN: 2324-9013
    Published: IEEE 01.08.2018
    “… Traditional access and usage control mechanisms are only able to determine if data may be used by a subject, but lack an understanding of how it…”
    Get full text
    Conference Proceeding
  9. 9

    Survey on Recognition of Privacy Risk from Responding on Twitter by Nakamura, Toru, Sawaya, Yukiko, Isohara, Takamasa

    ISSN: 2324-9013
    Published: IEEE 01.11.2023
    “…Social networking services (SNS) are often the subject of privacy concerns. Hence users should be careful not to post content with unacceptable privacy risks…”
    Get full text
    Conference Proceeding
  10. 10

    A Comparative Analysis of Federated Learning Techniques on On-Demand Platforms in Supporting Modern Web Browser Applications by Brennaf, Muhammad Senoyodha, Yang, Po, Lanfranchi, Vitaveska

    ISSN: 2324-9013
    Published: IEEE 01.11.2023
    “…On-device learning, such as federated learning, is gaining more popularity. It benefits users with faster inference and privacy preservation. However, the…”
    Get full text
    Conference Proceeding
  11. 11

    CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem by Micale, Davide, Costantino, Gianpiero, Matteucci, Ilaria, Fenzl, Florian, Rieke, Roland, Patane, Giuseppe

    ISSN: 2324-9013
    Published: IEEE 01.12.2022
    “…Software in modern vehicles is becoming increasingly complex and subject to vulnerabilities that an intruder can exploit to alter the functionality of vehicles…”
    Get full text
    Conference Proceeding
  12. 12

    Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites by Li, Jinzhou, Lv, Shouye, Yang, Liu, Wu, Sheng, Liu, Yang, Luan, Qijun

    ISSN: 2324-9013
    Published: IEEE 01.01.2022
    “… Electronic reconnaissance using satellites group is easy to implement. Bearings-only geolocation is an important research subject in the electronic reconnaissance field…”
    Get full text
    Conference Proceeding
  13. 13

    Ergonomic Design of Precise Percutaneous Robot for Substantial Organs Based on JACK Simulation by Sun, Bowen, Peng, Xin, Li, SaiSai, Sun, Jiaxin, Tian, Haochuan

    ISSN: 2324-9013
    Published: IEEE 01.11.2023
    “…To improve the comfort of surgeons during the use of minimally invasive surgical robots and reduce occupational hazards, the precise puncture robot for vital organs was selected as the research subject…”
    Get full text
    Conference Proceeding
  14. 14

    Towards Trust-Centric Networking: A General Model for Trust Evaluation by Murillo, Andres F., Messous, Ayoub, Otung, Andikan, Sekiya, Motoyoshi

    ISSN: 2324-9013
    Published: IEEE 01.11.2023
    “…Advances in networking and computing are moving society towards a cyber space, in which more aspects of our daily lives are being conducted over the Internet…”
    Get full text
    Conference Proceeding
  15. 15

    On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic by Zhao, Hongce, Zhang, Shunliang, Qiao, Zhuang, Huang, Xianjin, Zhang, Xiaohui

    ISSN: 2324-9013
    Published: IEEE 01.12.2022
    “… However, the encryption proxies used by some projects may be subject to configuration error or adversary attack makes the encryption ineffective…”
    Get full text
    Conference Proceeding
  16. 16

    A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environment by Liu, Ruixuan, Lyu, Muyang, Yang, Jiangrong

    ISSN: 2324-9013
    Published: IEEE 01.12.2022
    “…In this study, we combined the advantages of two spontaneous brain-computer interface instruction paradigms, conceptual imagery and motor imagery, to develop a…”
    Get full text
    Conference Proceeding
  17. 17

    Automated Breast Cancer Detection Using Machine Learning Techniques by Extracting Different Feature Extracting Strategies by Hussain, Lal, Aziz, Wajid, Saeed, Sharjil, Rathore, Saima, Rafique, Muhammad

    ISSN: 2324-9013
    Published: IEEE 01.08.2018
    “…) kernels and Decision Tree to distinguish cancer mammograms from normal subjects. Different features are proposed such as texture, morphological entropy based, scale invariant feature transform (SIFT…”
    Get full text
    Conference Proceeding
  18. 18

    An Intelligent Charging Service Selection Scheme Under the Cross-Area Consensus of Blockchain for the IoV by Xiong, Shuming, Zhu, Junfeng, Xu, Qiqi

    ISSN: 2324-9013
    Published: IEEE 17.12.2024
    “… factors of vehicle charging service and the subject tendency of users to each factor, and recommends the optimal charging pile to meet the subjective needs of users. Compared with similar work, it has a great improvement in shortening the driving distance to a charging pile, reducing the time spent waiting for charging and reducing the charging cost…”
    Get full text
    Conference Proceeding
  19. 19

    Designing Secret Embedding Scheme Based on Bitcoin Transactions Pattern Controlling by Feng, Zheng, Xing, Chunyu, Liang, Chen

    ISSN: 2324-9013
    Published: IEEE 17.12.2024
    “… be ignored, and may be subject to BGP hijacking attacks, distributed denial of service attacks, and node vulnerability attacks, which will bring greater risks to some private information, so an important…”
    Get full text
    Conference Proceeding
  20. 20

    SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel by Zhong, Bingnan, Zeng, Qingkai

    ISSN: 2324-9013
    Published: IEEE 01.10.2021
    “… However, the page tables are fundamental weakness of operating system because they share the same address space with the vulnerable kernel, and thus subject to kernel data-only attack…”
    Get full text
    Conference Proceeding