|
|
|
Danilo Pau, Andrea Pisani and Antonio Candelieri
In the context of TinyML, many research efforts have been devoted to designing forward topologies to support On-Device Learning. Reaching this target would bring numerous advantages, including reductions in latency and computational complexity, stronger ...
ver más
|
|
|
|
|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
|
Mira Lee and Minhye Seo
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This...
ver más
|
|
|
|
|
|
|
Harshvardhan J. Pandit
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c...
ver más
|
|
|
|
|
|
|
Veronika Belcheva, Tatiana Ermakova and Benjamin Fabian
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases conc...
ver más
|
|
|
|
|
|
|
Ching-Nam Hang, Yi-Zhen Tsai, Pei-Duo Yu, Jiasi Chen and Chee-Wei Tan
The rapid global spread of the coronavirus disease (COVID-19) has severely impacted daily life worldwide. As potential solutions, various digital contact tracing (DCT) strategies have emerged to mitigate the virus?s spread while maintaining economic and ...
ver más
|
|
|
|
|
|
|
Abubakar Ahmad Musa, Adamu Hussaini, Cheng Qian, Yifan Guo and Wei Yu
The Internet of Things (IoT) constitutes a vast network comprising various components such as physical devices, vehicles, buildings, and other items equipped with sensors, actuators, and software. These components are interconnected, facilitating the col...
ver más
|
|
|
|
|
|
|
Wenbin Li, Hakim Hacid, Ebtesam Almazrouei and Merouane Debbah
The union of Edge Computing (EC) and Artificial Intelligence (AI) has brought forward the Edge AI concept to provide intelligent solutions close to the end-user environment, for privacy preservation, low latency to real-time performance, and resource opt...
ver más
|
|
|
|
|
|
|
Karl van der Schyff, Greg Foster, Karen Renaud and Stephen Flowerday
Online users are responsible for protecting their online privacy themselves: the mantra is custodiat te (protect yourself). Even so, there is a great deal of evidence pointing to the fact that online users generally do not act to preserve the privacy of ...
ver más
|
|
|
|
|
|
|
Peng Xi, Xinglong Zhang, Lian Wang, Wenjuan Liu and Shaoliang Peng
Medical data contains multiple records of patient data that are important for subsequent treatment and future research. However, it needs to be stored and shared securely to protect the privacy of the data. Blockchain is widely used in the management of ...
ver más
|
|
|
|