|
|
|
Ying-Hsun Lai, Shin-Yeh Chen, Wen-Chi Chou, Hua-Yang Hsu and Han-Chieh Chao
Federated learning trains a neural network model using the client?s data to maintain the benefits of centralized model training while maintaining their privacy. However, if the client data are not independently and identically distributed (non-IID) becau...
ver más
|
|
|
|
|
|
|
Anas A. Makki and Ammar Y. Alqahtani
This study analyzes the barriers to developing smart cities (SCs) using the decision-making trial and evaluation laboratory (DEMATEL) approach. The primary objective is to identify, classify, and assess the main barriers hindering the progress of SCs. Th...
ver más
|
|
|
|
|
|
|
Beibei Song, Dehua Zhou, Jiahe Wu, Xiaowei Yuan, Yiming Zhu and Chuansheng Wang
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs. In outsourcing th...
ver más
|
|
|
|
|
|
|
Yuanzhe Yang, Zhiyi Niu, Yuying Qiu, Biao Song, Xinchang Zhang and Yuan Tian
The widespread application of multimedia technologies such as video surveillance, online meetings, and drones facilitates the acquisition of a large amount of data that may contain facial features, posing significant concerns with regard to privacy. Prot...
ver más
|
|
|
|
|
|
|
Jinhong Wu, Konstantinos Plataniotis, Lucy Liu, Ehsan Amjadian and Yuri Lawryshyn
Synthetic data, artificially generated by computer programs, has become more widely used in the financial domain to mitigate privacy concerns. Variational Autoencoder (VAE) is one of the most popular deep-learning models for generating synthetic data. Ho...
ver más
|
|
|
|
|
|
|
Yarajarla Nagasree, Chiramdasu Rupa, Ponugumati Akshitha, Gautam Srivastava, Thippa Reddy Gadekallu and Kuruva Lakshmanna
Privacy preservation of image data has been a top priority for many applications. The rapid growth of technology has increased the possibility of creating fake images using social media as a platform. However, many people, including researchers, rely on ...
ver más
|
|
|
|
|
|
|
Olurotimi Oguntola and Steven Simske
This study proposes a framework for a systems engineering-based approach to context-aware personalization, which is applied to e-commerce through the understanding and modeling of user behavior from their interactions with sales channels and media. The f...
ver más
|
|
|
|
|
|
|
Yang Yang and Guanghua Song
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing...
ver más
|
|
|
|
|
|
|
Serio Agriesti, Claudio Roncoli and Bat-hen Nahmias-Biran
Agent-based modeling has the potential to deal with the ever-growing complexity of transport systems, including future disrupting mobility technologies and services, such as automated driving, Mobility as a Service, and micromobility. Although different ...
ver más
|
|
|
|
|
|
|
Jiafu Liu, Zhiyuan Yao, Shirui Guo, Hongjun Xie and Genke Yang
Image classification is widely used in industrial defect detection, medical diagnosis, social welfare, and other fields, in which privacy and security of models and data must be involved. For example, in diamond synthesis, the diamond substrate image ann...
ver más
|
|
|
|