|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Josue-Rafael Montes-Martínez, Hugo Jiménez-Hernández, Ana-Marcela Herrera-Navarro, Luis-Antonio Díaz-Jiménez, Jorge-Luis Perez-Ramos and Julio-César Solano-Vargas
Artificial vision system applications have generated significant interest as they allow information to be obtained through one or several of the cameras that can be found in daily life in many places, such as parks, avenues, squares, houses, etc. When th...
ver más
|
|
|
|
|
|
|
Jean-Sébastien Dessureault, Félix Clément, Seydou Ba, François Meunier and Daniel Massicotte
The field of interior home design has witnessed a growing utilization of machine learning. However, the subjective nature of aesthetics poses a significant challenge due to its variability among individuals and cultures. This paper proposes an applied ma...
ver más
|
|
|
|
|
|
|
Yankai Lv, Haiyan Ding, Hao Wu, Yiji Zhao and Lei Zhang
Federated learning (FL) is an emerging decentralized machine learning framework enabling private global model training by collaboratively leveraging local client data without transferring it centrally. Unlike traditional distributed optimization, FL trai...
ver más
|
|
|
|
|
|
|
Mario Alviano
Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values wi...
ver más
|
|
|
|
|
|
|
Muhammad Mateen Yaqoob, Muhammad Nazir, Muhammad Amir Khan, Sajida Qureshi and Amal Al-Rasheed
One of the deadliest diseases, heart disease, claims millions of lives every year worldwide. The biomedical data collected by health service providers (HSPs) contain private information about the patient and are subject to general privacy concerns, and t...
ver más
|
|
|
|
|
|
|
Mira Lee and Minhye Seo
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This...
ver más
|
|
|
|
|
|
|
Hendrik Ballhausen and Ludwig Christian Hinske
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulat...
ver más
|
|
|
|
|
|
|
Liangkun Yu, Xiang Sun, Rana Albelaihi and Chen Yi
Federated learning (FL) is a collaborative machine-learning (ML) framework particularly suited for ML models requiring numerous training samples, such as Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and Random Forest, in the co...
ver más
|
|
|
|
|
|
|
Luzhi Li, Yuhong Zhao, Jingyu Wang and Chuanting Zhang
Wireless traffic prediction is critical to the intelligent operation of cellular networks, such as load balancing, congestion control, value-added service promotion, etc. However, the BTS data in each region has certain differences and privacy, and centr...
ver más
|
|
|
|